SlideShare uma empresa Scribd logo
1 de 13
Baixar para ler offline
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
DOI: 10.5121/ijcnc.2016.8506 67
PERFORMANCE ASSESSMENT OF CHAOTIC
SEQUENCE DERIVED FROM BIFURCATION
DEPENDENT LOGISTIC MAP IN CDMA SYSTEM
Oluyemi E. Adetoyi1
and Solomon A. Adeniran2
1
Electrical and Electronic Engineering Department, University of Ibadan, Nigeria
2
Electronic and Electrical Engineering Department, Obafemi Awolowo University, Ile-
Ife, Nigeria
ABSTRACT
In CDMA system, m-sequence and Gold codes are often utilized for spreading-despreading and
scrambling-descrambling operations. In a previous work, a design framework was created for generating
large family of codes from logistic map, which have comparable autocorrelation and cross correlation to
m-sequence and Gold codes. The purpose of this work is to evaluate the performance of these chaotic
codes in a CDMA environment. In the bit error rate (BER) simulation, matched filter, decorrelator and
MMSE receiver have been utilized. The received signal was modelled for synchronous CDMA uplink for
simulation simplicity purpose. Additive White Gaussian Noise channel model was assumed for the
simulation.
KEYWORDS
CDMA, Chaotic codes, Linear Receivers, Logistic Map, Lyapunov exponent
1. INTRODUCTION
Code Division Multiple Access (CDMA) capacity is dependent on a number of factors, of which
spreading code plays a crucial role (Meenakshi & Chawla, 2014). Lot of efforts has been made
towards developing optimal codes both for synchronous and asynchronous CDMA. The m-
sequence, Gold sequence and Kasami sequence that are currently used asynchronously in CDMA,
all have limitations. M-sequence has small set and poor cross correlation; Gold codes have poorer
correlation than m-sequence, but larger set. Small Kasami has better correlation than Gold, but
small set; while large Kasami has poorer correlation values than Gold, but contain more
sequences (Meenakshi & Chawla, 2014) (Sawlikar & Sharma, 2011) (Pickholtz, Milstein, &
Schilling, 1982). The essence of this research work is to create a framework for generating large
sets of optimal codes for asynchronous CDMA. Recent researches have shown that apart from
linear shift registers sequences (m-sequences, gold sequences etc), chaotic sequences have good
correlation properties and large family size (Umeno & Kitayama, 1999) (Vladeanu, Banica, &
Assad, 2003) (Zhang, Guo, Wang, Ding, & Chen, 2000). The low autocorrelation side-lobes of
these chaotic sequences allow for easy synchronization with the receiver; while the low cross
correlation reduces the multiple access interference. They have been considered as good candidate
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
68
for application in DS-CDMA system. In (Adetoyi & Adeniran, 2016), we presented a method for
generating chaotic sequences by exploiting the bifurcation control of the logistic map. The BER
performance of these bifurcation dependent sequences, in a DS-CDMA environment, is exploited
in this paper.
2. RELATED WORK
In (Umeno & Kitayama, 1999), chaotic sequence was generated from second order Chebyshev
polynomial ( ܺ௝ାଵ = 2ܺ௝ − 1), which is one form of logistic map. The real valued chaotic
sequence was obtained by calculating the periodic points, which was translated to corresponding
binary sequence using the well established symbolic dynamics correspondence (ܵ௝ = ‫ܺ[݊݃ݏ‬௝ ]).
Here sgn(x) = 1 for x > 0 and sgn(x) = -1 for x < 0. Two sequences of period 15 and three
sequences of period 7 were generated using this method. The normalized autocorrelation and
cross correlation for 7-bit length was 0.5221 and 0.6757 as against 0.72143 for Gold. The 15-bit
length normalized autocorrelation and cross correlation was 0.3314 and 0.3293 as against 0.3333
and 0.4667 for small Kasami set.
The generation of OverSampled Chaotic Map binary sequences was presented in (Zhang, Guo,
Wang, Ding, & Chen, 2000), where Chebyshev map was also used. The generalized OSCM is
x = f(୮)
(x୬ ) (‫݌‬ = 2,3,4, … . ) (2.17)
where p = 1 is the parent map.
The binary sequence was obtained by using threshold and also by writing the absolute value of ‫ݔ‬
in a floating point number with m-bits:
| ‫ݔ‬ | = 0.b1(‫)ݔ‬ b1(‫)ݔ‬ b2(‫..…)ݔ‬ bi(‫…)ݔ‬ bm1(‫)ݔ‬ bi(‫)ݔ‬ ϵ {0,1} (2.18)
It was found that the balance property of the sequences produced by both methods was worse than
Gold sequences or Kasami Sequences, except the period is very large. The sequences were
considered good candidate for CDMA and W-CDMA. It is doubtful if large family can be
realized.
In (Vladeanu, Banica, & Assad, 2003), a method of selecting optimal sequences from sequences
generated in (Umeno & Kitayama, 1999) was presented. A best limit value of
݉݅݊ {݉ܽ‫ܥ{ݔ‬஺, ‫ܥ‬஼ሽሽ = 5 was imposed on the binary pn sequences; as such only chaotic sequences
that presents less than this value were selected. This produced smaller set of sequences than in
(Umeno & Kitayama, 1999).
In (Pareek, Patidar, & Sud, 2010), a method to generate random sequences from two logistic
maps connected in cross-coupled manner was presented. The bit sequence was generated by
comparing the outputs of both the logistic maps in the following way:
g(X୬ାଵ, Y୬ାଵ) = ൜
0 if X୬ାଵ > Y୬ାଵ
1 if X୬ାଵ ≤ Y୬ାଵ
(2.19)
The set of initial conditions (ܺ଴, ܻ଴ ,ϵ (0,1) and ܺ଴ ≠ ܻ଴) serves as the seed for the PRBG, it
produces the same bit sequence if exact same seed was used, due to the deterministic procedure.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
69
Two thousand sequences having one million bits length were subjected to NIST randomness test
and nine test results were presented. The proportion of sequences that passed the test at a
significant level (α) of 0.01 is at least 98.6%. The sequences are considered good enough for
secure cryptosystem.
In (Spinsante, Andrenacci, & Gambi), De Bruijn sequences generated from combinatorial
mathematics was presented. Although the family size is large, the generation process is complex.
The analysis was shown only for De Bruijn sequences with a length of 32 bits. The normalized
radar ambiguity diagrams of De Bruijn and the chaotic sequences was compared, the differences
in their performance, with respect to distance and doppler resolution determined by the main peak
level, and the sidelobes level on the plane, were not significant. Results show that in some
scenarios, and with given assumptions, De Bruijn sequences may provide improved performance
with respect to systems adopting chaotic sequences. It was suggested that it can be used in DS-
CDMA if the correlation selection criteria is defined, then its performance will be comparable to
currently used CDMA codes.
In (Suneel, 2009), the sequences generated from Henon map was considered random enough and
having large key space to be used for cryptographic applications. Henon map is a two-
dimensional discrete-time nonlinear dynamical system represented by the state equations:
x୩ାଵ = −αx୩
ଶ
+ y୩ + 1 (2.20a)
y୩ାଵ = −βx୩ (2.20b)
Generating a pseudorandom binary sequence from the orbit of a chaotic map essentially requires
mapping the state of the system to {0, 1}. The two bits ܾ௫ and ܾ௬ derived respectively from the x
and y state-variables are as follows:
b୶ = ൜
1 if x > τ୶
0 if x ≤ τ୶
(2.21)
b୷ = ቊ
1 if y > τ୷
0 if y ≤ τ୷
(2.22)
Here, ߬௫ and ߬௬ are appropriately chosen threshold values for state-variables x and y, such that the
likelihood of ‫ݔ‬ > ߬௫ is equal to that of ‫ݔ‬ ≤ ߬௫ and ‫ݕ‬ > ߬௬ is equal to that of ‫ݕ‬ ≤ ߬௬. Therefore
the median of large consecutive values of x and y were used. Thus, two streams of bits ܵ௫ =
൛ܾ௫
௜
ൟ௜ୀଵ
∞
and ܵ௬ = ൛ܾ௬
௜
ൟ௜ୀଵ
∞
were obtained from the map. Bit-streams ‫ܤ‬௫ and ‫ܤ‬௬ are formed by
choosing every Pth bit of ܵ௫ and ܵ௬ respectively and the ݆‫ݐ‬ℎ bit of these two sequences are ‫ܤ‬௫(݆)
and ‫ܤ‬௬(݆). Then, the pseudo-random output bit O is chosen as per the following rule:
ܱ(j) =
‫ە‬
ۖ
‫۔‬
ۖ
‫ۓ‬
B୶(j) if B୷(j − 2) = 0 and B୷(j − 1) = 0;
Bഥ୶(j) if B୷(j − 2) = 0 and B୷(j − 1) = 1;
B୷(j) if B୷(j − 2) = 1 and B୷(j − 1) = 0;
Bഥ୷(j) if B୷(j − 2) = 1 and B୷(j − 1) = 1;
(2.23)
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
70
A multilevel spreading codes for DS-CDMA using ternary and quaternary Gray Inverse Gray
(GIG) codes was proposed in (Usha & Sankar, 2013). The 3-level, 6-length ternary and 4-level, 8-
length quaternary GIG codes obtained have autocorrelation and cross correlation that is better
than Gold.
3. BIFURCATION DEPENDENT CHAOTIC SEQUENCES – A REVISIT
The method for generation of the bifurcation dependent sequences has been fully described in
(Adetoyi & Adeniran, 2016). The discrete form of the original logistic map was modified to
accommodate the bifurcation control in Equation 1.
‫ݔ‬௡ାଵ = ‫ݎ‬௨‫ݔ‬௡ (1 − ‫ݔ‬௡ ) (1)
where u denotes the number of sequences that take integer values; n is the length of the sequence
and also an integer and x0 is the initial condition for the special case when ݊ = 0. The real
sequences were generated using the first domain D1 of Figure 1, out of the ten purely chaotic
domains created from the chaotic region of the logistic map using Lyapunov exponent estimation.
The logistic map was iterated in the D1 domain for different values of bifurcation parameter taken
with an accuracy of 10-4
, but fixed initial condition of 0.7. The choice of the initial condition was
arbitrary, since it is fixed for all bifurcation values. Since it usually takes finite length of time for
the sequences to be uncorrelated, in this case approximately ten iterates; then to generate N-bit
length sequences, the map was iterated N + 20 times and the first twenty iterates were discarded.
Two-bit encoding of the real chaotic sequences was done, in order to reduce quantization error.
The threshold for taking encoding decision was determined by subjecting a training sequence to
Lloyd compression algorithm, which optimizes the partition quantization parameter. The
encoding of the real value sequence ‫ݔ‬௡ାଵ was done for 2-bit encoding according to the decision
‫ݔ‬௜ = ൞
00 ݂݅ ‫ݔ‬௡ାଵ ≤ ‫1ܶܮ‬
01 ݂݅ ‫1ܶܮ‬ < ‫ݔ‬௡ାଵ ≤ ‫2ܶܮ‬
10 ݂݅ ‫2ܶܮ‬ < ‫ݔ‬௡ାଵ ≤ ‫3ܶܮ‬
11 ݂݅ ‫ݔ‬௡ାଵ > ‫3ܶܮ‬
(2)
where, LT1, LT2 and LT3 are three partitions obtained from Lloyd algorithm.
The family of sequences generated, by the perturbation of the bifurcation parameter can be
represented in matrix form for k number of sequences of length n each, as
ܵ(‫)ݐ‬ = ൮
ܵଵଵ ܵଵଶ … ܵଵ௡
ܵଶଵ ܵଶଶ … ܵଶ௡
⋮ ⋮ … ⋮
ܵ௞ଵ ܵ௞ଶ … ܵ௞௡
൲ (3)
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
71
Figure 1. Chaotic domains creation based on Lyapunov exponent estimation
4. CDMA RECEIVED SIGNAL MODEL
While transmission from mobile to base station is done asynchronously, it is often the case to
model it, as synchronous CDMA for simulation and analysis purpose (Liu). A CDMA channel
with K users sharing the same bandwidth is shown in Figure 1. In this model, all the users
simultaneously access a communication channel. The users of the system are identified at the
base station by their unique spreading code Sk(t). The signal that is transmitted by any user
consists of the user’s data bk that modulates its spreading code. Baseband transmission was
employed. Then the received signal is
‫)ܜ(ܚ‬ = ∑ ‫܊‬‫ܓ‬۱‫ܓ‬‫܁‬‫ܓ‬(‫)ܜ‬ + ‫,)ܜ(ܖ‬ ‫ܜ‬ ∈ [૙, ‫]܂‬۹
‫ܓ‬ୀ૚ (4)
where, K is the total number of users, Ck is the channel attenuated amplitude, n(t) is the additive
white Gaussian noise with σ2
as variance, bk and Sk(t) are as defined above
5. LINEAR RECEIVERS
These are sub-optimal multiuser receivers. The general form of a linear receiver is given by ܾ෠ =
sgn(wT
.y). The sgn(.) function returns the sign of the operand and the filter weight vector w is
often chosen to minimize a cost function of the difference metric between the original data bit and
estimated data bit, while ܾ෠ is the estimated transmitted bit of the desired user data b and y is the
received signal. The receivers utilized in the simulation are sub-optimal multiuser receivers.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
72
Figure 2. Received signal model for forward and reverse links
5.1. Matched Filter
Matched filter bank, which is depicted in Figure 3, is the simplest receiver and usually the first
stage in the base band signal detection. Almost all modern multi-user detection techniques deal
with the output of the matched filter bank and the cross-correlation information of all users in the
system (Venkateswarlu, Sandeep, & Chakravarthy, 2012). Matched filter was designed for
orthogonal signature waveforms, which correlates the received waveform with the suitably
delayed version of the spreading code. It does not cancel the effect of interference from other
users, which is a main drawback of its use in CDMA system. Each of the filters weight is
matched to the signature waveforms assigned to the users. It is an optimum receiver of known
signal in Additive White Gaussian Noise (AWGN) environment. But in CDMA systems, matched
filter is not the optimum receiver because the power of system’s MAI signal is very high at output
of matched filter. Received signal at base band is given by Equation 1. The output of each
matched filter can be represented as y1(t), y2(t), …, yk(t). The output can be defined for the K-th
user matched filter (Liu), as
y୩ = ‫׬‬ r(t)S୩(t)dt =
୘
଴ ‫׬‬ S୩(t)ൣ∑ A୨b୨S୨(t) + n(t)୏
୨ୀଵ ൧dt
୘
଴
(5a)
= A୩b୩ + ∑ A୨b୨ ‫׬‬ S୩(t)S୨(t)dt
୘
଴
+୏
୨ୀଵ୨ஷ୩ ‫׬‬ S୩(t)n(t)dt
୘
଴
(5b)
The crosscorrelation between the kth and jth user spreading sequences can be defined as
ρ୩୨ = ‫׬‬ S୩(t)S୨(t)dt
୘
଴
(6)
S1(t) C1
d1
S2(t) C2
d2
SN(t) CN
dN
Σ
n(t)
r(t)
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
73
The decision is made by taking the signum of the matched filter output as follows
b෠୩ = sgn(y୩) (7)
From equation 5b, the outputs of the matched filters for all users in matrix form is
y = RAb + n (8)
where R is the normalized crosscorrelation matrix whose diagonal elements are equal to 1 and
non-diagonal elements is equal to the cross-correlation ρkj,
A=diag{A1, …, Ak}; y=[y1, …, yk]T
; b=[b1, …, bk]T
and n is a Gaussian random vector with zero mean and covariance matrix σ2
R.
5.2. Decorrelator
The decorrelator is shown in Figure 4. It is a linear detector which applies a linear transformation
to the matched filter output to eliminate the effect of multiple access interference, thus providing
unbiased estimates (Venkateswarlu, Sandeep, & Chakravarthy, 2012). The transformation R-1
,
which is the correlation matrix inverse, is applied (Liu). It does not require prior knowledge of the
received power and its performance is independent of the power of interfering users so that it
solves the near-far problem. The main problem in the decorrelator detector is the neglect of noise
term in the data estimate b, which leads to noise enhancement. Moreover, the structure of this
detector needs to know the entire signature codes of the system's users and this makes the
structure complex. The decision for the kth user is made based on
b෠୩ = sgn(Rିଵ
y୩) (9a)
= sgn(Rିଵ(RAb + n)୩) (9b)
= sgn((Ab + Rିଵ
n)୩) (9c)
.
5.3. MMSE Detector
The minimum mean square error (MMSE) receiver, shown in Figure 5, has simpler structure than
the decorrelator detector. The MMSE detector is an adaptive algorithm detector that compromises
between the matched filter detector and the decorrelator detector (Venkateswarlu, Sandeep, &
Chakravarthy, 2012). It solves the matched filter detector problems by minimizing the MAl
signals' powers and the noise power jointly at the output of the detector (Liu). The motivation for
the use of adaptive algorithms lies in the desire to make the individual taps of the receiver filter to
respond to changes in the communication channel. The traditional implementation of adaptive
receivers is that a sequence of a priori known training data is incorporated into the data stream at
prearranged times. However, this effectively reduces the overall data rate of the system, which is
the main drawback of this approach. The MMSE can be implemented as a receiver, with
transformation T = (R + σଶ
Aିଶ)ିଵ
at the matched filter output, in order to minimize the mean
square error between its estimated data and the original data. As the background noise goes to
zero, the MMSE detector converges in performance to the Decorrelator detector. As the noise
grows large, it is reduced to the matched filter receiver. Some other drawbacks of this receiver are
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
74
that its performance depends on the powers of the interfering users. Therefore, there is some loss
of resistance to the near-far problem as compared to the Decorrelator detector and it requires
estimation of the received amplitudes (Mahtab, Ahmed, Hussain, & Hasan, 2005). The decision
for the kth user is based on
b෠୩ = sgn((R + σଶ
Aିଶ
)ିଵ
y୩) (10a)
= sgn((R + σଶ
Aିଶ
)ିଵ(RAb + n)୩) (10b)
Figure 3. Conventional matched filter receiver for multiple user detection
Figure 4. Decorrelating detector
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
75
Figure 5. MMSE detector
Figure 5. Six users BER performance of M, Gold and Logistic sequence for matched filter receiver
6. SIMULATION RESULT
The three multiuser receivers has been chosen such that the performance of the sequences can be
accessed under varying noise and interference conditions. The matched filter is the worst case
scenario, since it does not provide means of reducing interference and noise. The decorrelator
reduces interference, but enhances noise; while the MMSE provide means for mitigating both
interference and noise. Equation 8, 9 and 10 corresponding to the mathematical model of the
matched filter, decorrelator and MMSE respectively, were implemented with MATLAB sub-
routines. All the six 63-bit M-sequences, first six out of sixty-five 63-bit Gold sequences and first
six out of two hundred and forty-nine 62-bit bifurcation dependent logistic sequences generated
Figure 6. Six users BER performance of M, Gold and Logistic sequence for decorrelator receiver
from D1 domain, were utilised for simulating six users transmission. Each of the six user
transmission consists of 100,000 bits of data spread by his respective user code. The transmitted
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
76
data are corrupted by AWGN in the channel. The BER of logistic sequence was compared to
Gold and m-sequence for the matched filter, decorrelator and MMSE receiver types, in a CDMA
environment of six users as shown in Figures 6-8 respectively. In Figure 6, logistic sequence has
worst BER performance for matched filter receiver; while it has best performance for decorrelator
and MMSE as shown in Figure 7 and 8 respectively. In Figure 9, the BER performance of logistic
sequence was considered for all the receiver types. It can be seen that decorrelator provides the
best reception for logistic sequence. The spectral analysis of random sample logistic, Gold and m-
sequences were conducted by taking the Fast Fourier Transform and shown in Figures 10-12.
Figure 7. Six users BER performance of M, Gold and Logistic sequence for MMSE receiver
Figure 8. Six users BER performance of Logistic sequence for matched filter, decorrelator and MMSE
receiver
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
77
Figure 9. Spectrum of 63-bits Gold Sequence
Figure 10. Spectrum of 63-bits Gold Sequence
Figure 11. Spectrum of 62-bits Logistic Sequence
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
78
Figure 12. Spectrum of 63-bits M-Sequence
6. CONCLUSIONS
It can be observed from the result that logistic sequences show better BER performance than Gold
and m-sequences for Decorrelator and MMSE receiver. Also, the decorrelator receiver proves to
be an optimal receiver for logistic sequences, compared to matched filter and MMSE receiver.
Furthermore the frequency spectrums of the logistic sequences are wideband, due to the low
MSAAC values. However the spectrums of the logistic sequences are not as flat as m-sequence,
but the flatness is comparable to Gold sequences.
ACKNOWLEDGEMENTS
This work was supported by the Nigerian Tertiary Education Trust Fund under academic staff
training and development programme.
REFERENCES
[1] Meenakshi and M. P. Chawla, "A review comparison of different spreading codes for DS CDMA,"
IJSRD - International Journal for Scientific Research & Development|, vol. 2, no. 2, pp. 995-999,
2014.
[2] A. Sawlikar and M. Sharma, "Analysis of different pseudo noise sequences," International Journal of
Computer Technology and Electronics Engineering (IJCTEE), vol. 1, no. 2, pp. 156-161, 2011.
[3] R. L. Pickholtz, L. B. Milstein, and D. L. Schilling, "Theory of spread-spectrum communications-A
tutorial," IEEE Transactions on Communications, vol. com-30, no. 5, pp. 855-884, May 1982.
[4] K. Umeno and K. Kitayama, "Spreading sequences using periodic orbits of chaos for CDMA,"
Electronic Letters, vol. 35, no. 7, pp. 545-546, April 1999.
[5] C. Vladeanu, I. Banica, and S.El. Assad, "Periodic chaotic spreading sequences with better correlation
properties than convectional sequences-BER performances analysis," in Signals,Circuits and Systems,
2003. SCS 2003.International Symposium on, vol. 2, Iasi,Romania, 2003, pp. 649-652.
[6] H. Zhang, J. Guo, H. Wang, R. Ding, and W Chen, "Oversample chaotic map binary sequences:
Definition, performance and realization," in Circuits and Systems, 2000. IEEE APCCAS 2000.,
Tianjin, 2000, pp. 618-621.
[7] O. E. Adetoyi and S. A. Adeniran, "Chaotic Sequence Derived from Bifurcation Dependency,"
International Journal of Scientific & Engineering Research , vol. 7, no. 4, pp. 165-169, April 2016.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016
79
[8] N. K. Pareek, V. Patidar, and K. K. Sud, "A random bit generator using chaotic maps," International
Journal of Network Security, vol. 10, no. No.1, pp. 32-38, 2010.
[9] S. Spinsante, S. Andrenacci, and E. Gambi, "De Bruijn Sequences for Spread Spectrum Applications:
Analysis and Results".
[10] M. Suneel, "Cryptographic pseudo-random sequences from the chaotic," Sadhana, vol. 34, no. 5, pp.
689-701, October 2009.
[11] K. Usha and K. J. Sankar, "New Multi Level Spreading Codes for DS CDMA Communication," in
Conference on Advances in Communication and Control Systems (CAC2S 2013), 2013, pp. 154-159.
[12] Y. Liu. Simulation Comparison of Multiuser Receivers in DS/CDMA Systems. [Online].
http://plaza.ufl.edu/yongliu/projectreport.PDF
[13] Y. Venkateswarlu, K. Sandeep, and A.S.N. Chakravarthy, "CDMA and MAI problem elimination
methods," International Journal of Scientific and Research Publications, vol. 2, no. 7, pp. 1-13, 2012.
[14] Z. Mahtab, S.J. Ahmed, S.S. Hussain, and S. Hasan, "CDMA based wireless transceiver system
matlab simulation and FPGA implementation," in Engineering Sciences and
Technology,2005.SCONEST 2005. Student conference on, Karachi, August 2005, pp. 1-9.
AUTHORS
Oluyemi Adetoyi obtained her B.Sc. degree in Electrical and Electronic
Engineering from University of Ibadan, Nigeria. Her M.Sc. degree in Electronic
and Electrical Engineering was obtained from Obafemi Awolowo University, Ile-
Ife, Nigeria. She was a lecturer at different time at Adekunle Ajasin University in
Nigeria and at Babcock University between. Currently, she is a lecturer with
University of Ibadan, Nigeria. She is currently pursuing her PhD in
Communication Engineering at Obafemi Awolowo University, Ile-Ife, Nigeria.
Her research interest is in wireless communication and data security.
Solomon Adeniran is a lecturer with the Department of Electronic and Electrical Engineering, Obafemi
Awolowo University, Nigeria. His area of research work spans passive components for microwave
networks, DSP and communication systems.

Mais conteúdo relacionado

Mais procurados

Unsupervised multispectral image Classification By fuzzy hidden Markov chains...
Unsupervised multispectral image Classification By fuzzy hidden Markov chains...Unsupervised multispectral image Classification By fuzzy hidden Markov chains...
Unsupervised multispectral image Classification By fuzzy hidden Markov chains...CSCJournals
 
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...Waqas Tariq
 
Improvement of chaotic secure communication scheme based on steganographic me...
Improvement of chaotic secure communication scheme based on steganographic me...Improvement of chaotic secure communication scheme based on steganographic me...
Improvement of chaotic secure communication scheme based on steganographic me...Massoud Khodadadzadeh
 
STUDY ANALYSIS ON TRACKING MULTIPLE OBJECTS IN PRESENCE OF INTER OCCLUSION IN...
STUDY ANALYSIS ON TRACKING MULTIPLE OBJECTS IN PRESENCE OF INTER OCCLUSION IN...STUDY ANALYSIS ON TRACKING MULTIPLE OBJECTS IN PRESENCE OF INTER OCCLUSION IN...
STUDY ANALYSIS ON TRACKING MULTIPLE OBJECTS IN PRESENCE OF INTER OCCLUSION IN...aciijournal
 
On image intensities, eigenfaces and LDA
On image intensities, eigenfaces and LDAOn image intensities, eigenfaces and LDA
On image intensities, eigenfaces and LDARaghu Palakodety
 
Image Processing
Image ProcessingImage Processing
Image ProcessingTuyen Pham
 
A Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPA Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPIOSRJVSP
 
Lecture 8 (Stereo imaging) (Digital Image Processing)
Lecture 8 (Stereo imaging) (Digital Image Processing)Lecture 8 (Stereo imaging) (Digital Image Processing)
Lecture 8 (Stereo imaging) (Digital Image Processing)VARUN KUMAR
 
Lecture 9 (Digital Image Processing)
Lecture 9 (Digital Image Processing)Lecture 9 (Digital Image Processing)
Lecture 9 (Digital Image Processing)VARUN KUMAR
 
3 d active meshes for cell tracking
3 d active meshes for cell tracking3 d active meshes for cell tracking
3 d active meshes for cell trackingPrashant Pal
 
2012 mdsp pr11 ica part 2 face recognition
2012 mdsp pr11 ica part 2 face recognition2012 mdsp pr11 ica part 2 face recognition
2012 mdsp pr11 ica part 2 face recognitionnozomuhamada
 
6. 7772 8117-1-pb
6. 7772 8117-1-pb6. 7772 8117-1-pb
6. 7772 8117-1-pbIAESIJEECS
 
AN ADAPTIVE MESH METHOD FOR OBJECT TRACKING
AN ADAPTIVE MESH METHOD FOR OBJECT TRACKING AN ADAPTIVE MESH METHOD FOR OBJECT TRACKING
AN ADAPTIVE MESH METHOD FOR OBJECT TRACKING ijp2p
 

Mais procurados (18)

Unsupervised multispectral image Classification By fuzzy hidden Markov chains...
Unsupervised multispectral image Classification By fuzzy hidden Markov chains...Unsupervised multispectral image Classification By fuzzy hidden Markov chains...
Unsupervised multispectral image Classification By fuzzy hidden Markov chains...
 
M0174491101
M0174491101M0174491101
M0174491101
 
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
 
I3602061067
I3602061067I3602061067
I3602061067
 
Improvement of chaotic secure communication scheme based on steganographic me...
Improvement of chaotic secure communication scheme based on steganographic me...Improvement of chaotic secure communication scheme based on steganographic me...
Improvement of chaotic secure communication scheme based on steganographic me...
 
STUDY ANALYSIS ON TRACKING MULTIPLE OBJECTS IN PRESENCE OF INTER OCCLUSION IN...
STUDY ANALYSIS ON TRACKING MULTIPLE OBJECTS IN PRESENCE OF INTER OCCLUSION IN...STUDY ANALYSIS ON TRACKING MULTIPLE OBJECTS IN PRESENCE OF INTER OCCLUSION IN...
STUDY ANALYSIS ON TRACKING MULTIPLE OBJECTS IN PRESENCE OF INTER OCCLUSION IN...
 
On image intensities, eigenfaces and LDA
On image intensities, eigenfaces and LDAOn image intensities, eigenfaces and LDA
On image intensities, eigenfaces and LDA
 
Image Processing
Image ProcessingImage Processing
Image Processing
 
D143136
D143136D143136
D143136
 
J0535964
J0535964J0535964
J0535964
 
A Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPA Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAP
 
Lecture 8 (Stereo imaging) (Digital Image Processing)
Lecture 8 (Stereo imaging) (Digital Image Processing)Lecture 8 (Stereo imaging) (Digital Image Processing)
Lecture 8 (Stereo imaging) (Digital Image Processing)
 
Lecture 9 (Digital Image Processing)
Lecture 9 (Digital Image Processing)Lecture 9 (Digital Image Processing)
Lecture 9 (Digital Image Processing)
 
3 d active meshes for cell tracking
3 d active meshes for cell tracking3 d active meshes for cell tracking
3 d active meshes for cell tracking
 
Fuzzy c-means
Fuzzy c-meansFuzzy c-means
Fuzzy c-means
 
2012 mdsp pr11 ica part 2 face recognition
2012 mdsp pr11 ica part 2 face recognition2012 mdsp pr11 ica part 2 face recognition
2012 mdsp pr11 ica part 2 face recognition
 
6. 7772 8117-1-pb
6. 7772 8117-1-pb6. 7772 8117-1-pb
6. 7772 8117-1-pb
 
AN ADAPTIVE MESH METHOD FOR OBJECT TRACKING
AN ADAPTIVE MESH METHOD FOR OBJECT TRACKING AN ADAPTIVE MESH METHOD FOR OBJECT TRACKING
AN ADAPTIVE MESH METHOD FOR OBJECT TRACKING
 

Destaque

ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...IJCNCJournal
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKIJCNCJournal
 
Using spectral radius ratio for node degree
Using spectral radius ratio for node degreeUsing spectral radius ratio for node degree
Using spectral radius ratio for node degreeIJCNCJournal
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...IJCNCJournal
 
Assessment of health monitoring
Assessment of health monitoringAssessment of health monitoring
Assessment of health monitoringIJCNCJournal
 
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...IJCNCJournal
 
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITSHIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITSIJCNCJournal
 
Qos evaluation of heterogeneous
Qos evaluation of heterogeneousQos evaluation of heterogeneous
Qos evaluation of heterogeneousIJCNCJournal
 
A predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsA predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsIJCNCJournal
 
Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensorIJCNCJournal
 
A NOVEL METHOD TO TEST DEPENDABLE COMPOSED SERVICE COMPONENTS
A NOVEL METHOD TO TEST DEPENDABLE COMPOSED SERVICE COMPONENTSA NOVEL METHOD TO TEST DEPENDABLE COMPOSED SERVICE COMPONENTS
A NOVEL METHOD TO TEST DEPENDABLE COMPOSED SERVICE COMPONENTSIJCNCJournal
 
The comparison of immunization
The comparison of immunizationThe comparison of immunization
The comparison of immunizationIJCNCJournal
 
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNS
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNSAPPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNS
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNSIJCNCJournal
 
A survey of multimedia streaming in
A survey of multimedia streaming inA survey of multimedia streaming in
A survey of multimedia streaming inIJCNCJournal
 
PERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORK
PERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORKPERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORK
PERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORKIJCNCJournal
 
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
 
On the approximation of the sum of lognormals by a log skew normal distribution
On the approximation of the sum of lognormals by a log skew normal distributionOn the approximation of the sum of lognormals by a log skew normal distribution
On the approximation of the sum of lognormals by a log skew normal distributionIJCNCJournal
 
A scheme for maximal resource
A scheme for maximal resourceA scheme for maximal resource
A scheme for maximal resourceIJCNCJournal
 
Maximizing network interruption in wireless
Maximizing network interruption in wirelessMaximizing network interruption in wireless
Maximizing network interruption in wirelessIJCNCJournal
 

Destaque (19)

ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
 
Using spectral radius ratio for node degree
Using spectral radius ratio for node degreeUsing spectral radius ratio for node degree
Using spectral radius ratio for node degree
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
 
Assessment of health monitoring
Assessment of health monitoringAssessment of health monitoring
Assessment of health monitoring
 
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
 
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITSHIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
 
Qos evaluation of heterogeneous
Qos evaluation of heterogeneousQos evaluation of heterogeneous
Qos evaluation of heterogeneous
 
A predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsA predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphs
 
Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensor
 
A NOVEL METHOD TO TEST DEPENDABLE COMPOSED SERVICE COMPONENTS
A NOVEL METHOD TO TEST DEPENDABLE COMPOSED SERVICE COMPONENTSA NOVEL METHOD TO TEST DEPENDABLE COMPOSED SERVICE COMPONENTS
A NOVEL METHOD TO TEST DEPENDABLE COMPOSED SERVICE COMPONENTS
 
The comparison of immunization
The comparison of immunizationThe comparison of immunization
The comparison of immunization
 
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNS
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNSAPPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNS
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNS
 
A survey of multimedia streaming in
A survey of multimedia streaming inA survey of multimedia streaming in
A survey of multimedia streaming in
 
PERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORK
PERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORKPERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORK
PERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORK
 
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
 
On the approximation of the sum of lognormals by a log skew normal distribution
On the approximation of the sum of lognormals by a log skew normal distributionOn the approximation of the sum of lognormals by a log skew normal distribution
On the approximation of the sum of lognormals by a log skew normal distribution
 
A scheme for maximal resource
A scheme for maximal resourceA scheme for maximal resource
A scheme for maximal resource
 
Maximizing network interruption in wireless
Maximizing network interruption in wirelessMaximizing network interruption in wireless
Maximizing network interruption in wireless
 

Semelhante a PERFORMANCE ASSESSMENT OF CHAOTIC SEQUENCE DERIVED FROM BIFURCATION DEPENDENT LOGISTIC MAP IN CDMA SYSTEM

COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat mapA New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat maptayseer Karam alshekly
 
Robust Filter Design for a Class of Uncertain Chaotic Systems and Its Circuit...
Robust Filter Design for a Class of Uncertain Chaotic Systems and Its Circuit...Robust Filter Design for a Class of Uncertain Chaotic Systems and Its Circuit...
Robust Filter Design for a Class of Uncertain Chaotic Systems and Its Circuit...ijtsrd
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System IJECEIAES
 
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...ijwmn
 
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...IJECEIAES
 
Investigation of repeated blasts at Aitik mine using waveform cross correlation
Investigation of repeated blasts at Aitik mine using waveform cross correlationInvestigation of repeated blasts at Aitik mine using waveform cross correlation
Investigation of repeated blasts at Aitik mine using waveform cross correlationIvan Kitov
 
Convolutional networks and graph networks through kernels
Convolutional networks and graph networks through kernelsConvolutional networks and graph networks through kernels
Convolutional networks and graph networks through kernelstuxette
 
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...IOSRJECE
 
Vibration source identification caused by bearing faults based on SVD-EMD-ICA
Vibration source identification caused by bearing faults based on SVD-EMD-ICAVibration source identification caused by bearing faults based on SVD-EMD-ICA
Vibration source identification caused by bearing faults based on SVD-EMD-ICAIJRES Journal
 
Performance evaluation with a
Performance evaluation with aPerformance evaluation with a
Performance evaluation with aijmnct
 
Inversion of Magnetic Anomalies Due to 2-D Cylindrical Structures – By an Art...
Inversion of Magnetic Anomalies Due to 2-D Cylindrical Structures – By an Art...Inversion of Magnetic Anomalies Due to 2-D Cylindrical Structures – By an Art...
Inversion of Magnetic Anomalies Due to 2-D Cylindrical Structures – By an Art...ijsc
 
INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...
INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...
INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...ijsc
 
INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...
INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...
INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...ijsc
 

Semelhante a PERFORMANCE ASSESSMENT OF CHAOTIC SEQUENCE DERIVED FROM BIFURCATION DEPENDENT LOGISTIC MAP IN CDMA SYSTEM (20)

COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat mapA New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
 
Dycops2019
Dycops2019 Dycops2019
Dycops2019
 
9.venkata naga vamsi. a
9.venkata naga vamsi. a9.venkata naga vamsi. a
9.venkata naga vamsi. a
 
Robust Filter Design for a Class of Uncertain Chaotic Systems and Its Circuit...
Robust Filter Design for a Class of Uncertain Chaotic Systems and Its Circuit...Robust Filter Design for a Class of Uncertain Chaotic Systems and Its Circuit...
Robust Filter Design for a Class of Uncertain Chaotic Systems and Its Circuit...
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System
 
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
 
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...
 
Investigation of repeated blasts at Aitik mine using waveform cross correlation
Investigation of repeated blasts at Aitik mine using waveform cross correlationInvestigation of repeated blasts at Aitik mine using waveform cross correlation
Investigation of repeated blasts at Aitik mine using waveform cross correlation
 
Convolutional networks and graph networks through kernels
Convolutional networks and graph networks through kernelsConvolutional networks and graph networks through kernels
Convolutional networks and graph networks through kernels
 
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
 
Vibration source identification caused by bearing faults based on SVD-EMD-ICA
Vibration source identification caused by bearing faults based on SVD-EMD-ICAVibration source identification caused by bearing faults based on SVD-EMD-ICA
Vibration source identification caused by bearing faults based on SVD-EMD-ICA
 
Performance evaluation with a
Performance evaluation with aPerformance evaluation with a
Performance evaluation with a
 
06075626
0607562606075626
06075626
 
06075626 (1)
06075626 (1)06075626 (1)
06075626 (1)
 
Inversion of Magnetic Anomalies Due to 2-D Cylindrical Structures – By an Art...
Inversion of Magnetic Anomalies Due to 2-D Cylindrical Structures – By an Art...Inversion of Magnetic Anomalies Due to 2-D Cylindrical Structures – By an Art...
Inversion of Magnetic Anomalies Due to 2-D Cylindrical Structures – By an Art...
 
INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...
INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...
INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...
 
INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...
INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...
INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...
 

Mais de IJCNCJournal

Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksIJCNCJournal
 
Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion ...
Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion ...Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion ...
Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion ...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksIJCNCJournal
 
Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion ...
Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion ...Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion ...
Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion ...IJCNCJournal
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkIJCNCJournal
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkIJCNCJournal
 
January 2024, Volume 16, Number 1 - The International Journal of Computer Net...
January 2024, Volume 16, Number 1 - The International Journal of Computer Net...January 2024, Volume 16, Number 1 - The International Journal of Computer Net...
January 2024, Volume 16, Number 1 - The International Journal of Computer Net...IJCNCJournal
 
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdfJanuary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
 

Mais de IJCNCJournal (20)

Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
 
Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion ...
Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion ...Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion ...
Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion ...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
 
Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion ...
Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion ...Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion ...
Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion ...
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
 
January 2024, Volume 16, Number 1 - The International Journal of Computer Net...
January 2024, Volume 16, Number 1 - The International Journal of Computer Net...January 2024, Volume 16, Number 1 - The International Journal of Computer Net...
January 2024, Volume 16, Number 1 - The International Journal of Computer Net...
 
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdfJanuary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 

Último

Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
20200723_insight_release_plan
20200723_insight_release_plan20200723_insight_release_plan
20200723_insight_release_planJamie (Taka) Wang
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 

Último (20)

Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
20200723_insight_release_plan
20200723_insight_release_plan20200723_insight_release_plan
20200723_insight_release_plan
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 

PERFORMANCE ASSESSMENT OF CHAOTIC SEQUENCE DERIVED FROM BIFURCATION DEPENDENT LOGISTIC MAP IN CDMA SYSTEM

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 DOI: 10.5121/ijcnc.2016.8506 67 PERFORMANCE ASSESSMENT OF CHAOTIC SEQUENCE DERIVED FROM BIFURCATION DEPENDENT LOGISTIC MAP IN CDMA SYSTEM Oluyemi E. Adetoyi1 and Solomon A. Adeniran2 1 Electrical and Electronic Engineering Department, University of Ibadan, Nigeria 2 Electronic and Electrical Engineering Department, Obafemi Awolowo University, Ile- Ife, Nigeria ABSTRACT In CDMA system, m-sequence and Gold codes are often utilized for spreading-despreading and scrambling-descrambling operations. In a previous work, a design framework was created for generating large family of codes from logistic map, which have comparable autocorrelation and cross correlation to m-sequence and Gold codes. The purpose of this work is to evaluate the performance of these chaotic codes in a CDMA environment. In the bit error rate (BER) simulation, matched filter, decorrelator and MMSE receiver have been utilized. The received signal was modelled for synchronous CDMA uplink for simulation simplicity purpose. Additive White Gaussian Noise channel model was assumed for the simulation. KEYWORDS CDMA, Chaotic codes, Linear Receivers, Logistic Map, Lyapunov exponent 1. INTRODUCTION Code Division Multiple Access (CDMA) capacity is dependent on a number of factors, of which spreading code plays a crucial role (Meenakshi & Chawla, 2014). Lot of efforts has been made towards developing optimal codes both for synchronous and asynchronous CDMA. The m- sequence, Gold sequence and Kasami sequence that are currently used asynchronously in CDMA, all have limitations. M-sequence has small set and poor cross correlation; Gold codes have poorer correlation than m-sequence, but larger set. Small Kasami has better correlation than Gold, but small set; while large Kasami has poorer correlation values than Gold, but contain more sequences (Meenakshi & Chawla, 2014) (Sawlikar & Sharma, 2011) (Pickholtz, Milstein, & Schilling, 1982). The essence of this research work is to create a framework for generating large sets of optimal codes for asynchronous CDMA. Recent researches have shown that apart from linear shift registers sequences (m-sequences, gold sequences etc), chaotic sequences have good correlation properties and large family size (Umeno & Kitayama, 1999) (Vladeanu, Banica, & Assad, 2003) (Zhang, Guo, Wang, Ding, & Chen, 2000). The low autocorrelation side-lobes of these chaotic sequences allow for easy synchronization with the receiver; while the low cross correlation reduces the multiple access interference. They have been considered as good candidate
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 68 for application in DS-CDMA system. In (Adetoyi & Adeniran, 2016), we presented a method for generating chaotic sequences by exploiting the bifurcation control of the logistic map. The BER performance of these bifurcation dependent sequences, in a DS-CDMA environment, is exploited in this paper. 2. RELATED WORK In (Umeno & Kitayama, 1999), chaotic sequence was generated from second order Chebyshev polynomial ( ܺ௝ାଵ = 2ܺ௝ − 1), which is one form of logistic map. The real valued chaotic sequence was obtained by calculating the periodic points, which was translated to corresponding binary sequence using the well established symbolic dynamics correspondence (ܵ௝ = ‫ܺ[݊݃ݏ‬௝ ]). Here sgn(x) = 1 for x > 0 and sgn(x) = -1 for x < 0. Two sequences of period 15 and three sequences of period 7 were generated using this method. The normalized autocorrelation and cross correlation for 7-bit length was 0.5221 and 0.6757 as against 0.72143 for Gold. The 15-bit length normalized autocorrelation and cross correlation was 0.3314 and 0.3293 as against 0.3333 and 0.4667 for small Kasami set. The generation of OverSampled Chaotic Map binary sequences was presented in (Zhang, Guo, Wang, Ding, & Chen, 2000), where Chebyshev map was also used. The generalized OSCM is x = f(୮) (x୬ ) (‫݌‬ = 2,3,4, … . ) (2.17) where p = 1 is the parent map. The binary sequence was obtained by using threshold and also by writing the absolute value of ‫ݔ‬ in a floating point number with m-bits: | ‫ݔ‬ | = 0.b1(‫)ݔ‬ b1(‫)ݔ‬ b2(‫..…)ݔ‬ bi(‫…)ݔ‬ bm1(‫)ݔ‬ bi(‫)ݔ‬ ϵ {0,1} (2.18) It was found that the balance property of the sequences produced by both methods was worse than Gold sequences or Kasami Sequences, except the period is very large. The sequences were considered good candidate for CDMA and W-CDMA. It is doubtful if large family can be realized. In (Vladeanu, Banica, & Assad, 2003), a method of selecting optimal sequences from sequences generated in (Umeno & Kitayama, 1999) was presented. A best limit value of ݉݅݊ {݉ܽ‫ܥ{ݔ‬஺, ‫ܥ‬஼ሽሽ = 5 was imposed on the binary pn sequences; as such only chaotic sequences that presents less than this value were selected. This produced smaller set of sequences than in (Umeno & Kitayama, 1999). In (Pareek, Patidar, & Sud, 2010), a method to generate random sequences from two logistic maps connected in cross-coupled manner was presented. The bit sequence was generated by comparing the outputs of both the logistic maps in the following way: g(X୬ାଵ, Y୬ାଵ) = ൜ 0 if X୬ାଵ > Y୬ାଵ 1 if X୬ାଵ ≤ Y୬ାଵ (2.19) The set of initial conditions (ܺ଴, ܻ଴ ,ϵ (0,1) and ܺ଴ ≠ ܻ଴) serves as the seed for the PRBG, it produces the same bit sequence if exact same seed was used, due to the deterministic procedure.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 69 Two thousand sequences having one million bits length were subjected to NIST randomness test and nine test results were presented. The proportion of sequences that passed the test at a significant level (α) of 0.01 is at least 98.6%. The sequences are considered good enough for secure cryptosystem. In (Spinsante, Andrenacci, & Gambi), De Bruijn sequences generated from combinatorial mathematics was presented. Although the family size is large, the generation process is complex. The analysis was shown only for De Bruijn sequences with a length of 32 bits. The normalized radar ambiguity diagrams of De Bruijn and the chaotic sequences was compared, the differences in their performance, with respect to distance and doppler resolution determined by the main peak level, and the sidelobes level on the plane, were not significant. Results show that in some scenarios, and with given assumptions, De Bruijn sequences may provide improved performance with respect to systems adopting chaotic sequences. It was suggested that it can be used in DS- CDMA if the correlation selection criteria is defined, then its performance will be comparable to currently used CDMA codes. In (Suneel, 2009), the sequences generated from Henon map was considered random enough and having large key space to be used for cryptographic applications. Henon map is a two- dimensional discrete-time nonlinear dynamical system represented by the state equations: x୩ାଵ = −αx୩ ଶ + y୩ + 1 (2.20a) y୩ାଵ = −βx୩ (2.20b) Generating a pseudorandom binary sequence from the orbit of a chaotic map essentially requires mapping the state of the system to {0, 1}. The two bits ܾ௫ and ܾ௬ derived respectively from the x and y state-variables are as follows: b୶ = ൜ 1 if x > τ୶ 0 if x ≤ τ୶ (2.21) b୷ = ቊ 1 if y > τ୷ 0 if y ≤ τ୷ (2.22) Here, ߬௫ and ߬௬ are appropriately chosen threshold values for state-variables x and y, such that the likelihood of ‫ݔ‬ > ߬௫ is equal to that of ‫ݔ‬ ≤ ߬௫ and ‫ݕ‬ > ߬௬ is equal to that of ‫ݕ‬ ≤ ߬௬. Therefore the median of large consecutive values of x and y were used. Thus, two streams of bits ܵ௫ = ൛ܾ௫ ௜ ൟ௜ୀଵ ∞ and ܵ௬ = ൛ܾ௬ ௜ ൟ௜ୀଵ ∞ were obtained from the map. Bit-streams ‫ܤ‬௫ and ‫ܤ‬௬ are formed by choosing every Pth bit of ܵ௫ and ܵ௬ respectively and the ݆‫ݐ‬ℎ bit of these two sequences are ‫ܤ‬௫(݆) and ‫ܤ‬௬(݆). Then, the pseudo-random output bit O is chosen as per the following rule: ܱ(j) = ‫ە‬ ۖ ‫۔‬ ۖ ‫ۓ‬ B୶(j) if B୷(j − 2) = 0 and B୷(j − 1) = 0; Bഥ୶(j) if B୷(j − 2) = 0 and B୷(j − 1) = 1; B୷(j) if B୷(j − 2) = 1 and B୷(j − 1) = 0; Bഥ୷(j) if B୷(j − 2) = 1 and B୷(j − 1) = 1; (2.23)
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 70 A multilevel spreading codes for DS-CDMA using ternary and quaternary Gray Inverse Gray (GIG) codes was proposed in (Usha & Sankar, 2013). The 3-level, 6-length ternary and 4-level, 8- length quaternary GIG codes obtained have autocorrelation and cross correlation that is better than Gold. 3. BIFURCATION DEPENDENT CHAOTIC SEQUENCES – A REVISIT The method for generation of the bifurcation dependent sequences has been fully described in (Adetoyi & Adeniran, 2016). The discrete form of the original logistic map was modified to accommodate the bifurcation control in Equation 1. ‫ݔ‬௡ାଵ = ‫ݎ‬௨‫ݔ‬௡ (1 − ‫ݔ‬௡ ) (1) where u denotes the number of sequences that take integer values; n is the length of the sequence and also an integer and x0 is the initial condition for the special case when ݊ = 0. The real sequences were generated using the first domain D1 of Figure 1, out of the ten purely chaotic domains created from the chaotic region of the logistic map using Lyapunov exponent estimation. The logistic map was iterated in the D1 domain for different values of bifurcation parameter taken with an accuracy of 10-4 , but fixed initial condition of 0.7. The choice of the initial condition was arbitrary, since it is fixed for all bifurcation values. Since it usually takes finite length of time for the sequences to be uncorrelated, in this case approximately ten iterates; then to generate N-bit length sequences, the map was iterated N + 20 times and the first twenty iterates were discarded. Two-bit encoding of the real chaotic sequences was done, in order to reduce quantization error. The threshold for taking encoding decision was determined by subjecting a training sequence to Lloyd compression algorithm, which optimizes the partition quantization parameter. The encoding of the real value sequence ‫ݔ‬௡ାଵ was done for 2-bit encoding according to the decision ‫ݔ‬௜ = ൞ 00 ݂݅ ‫ݔ‬௡ାଵ ≤ ‫1ܶܮ‬ 01 ݂݅ ‫1ܶܮ‬ < ‫ݔ‬௡ାଵ ≤ ‫2ܶܮ‬ 10 ݂݅ ‫2ܶܮ‬ < ‫ݔ‬௡ାଵ ≤ ‫3ܶܮ‬ 11 ݂݅ ‫ݔ‬௡ାଵ > ‫3ܶܮ‬ (2) where, LT1, LT2 and LT3 are three partitions obtained from Lloyd algorithm. The family of sequences generated, by the perturbation of the bifurcation parameter can be represented in matrix form for k number of sequences of length n each, as ܵ(‫)ݐ‬ = ൮ ܵଵଵ ܵଵଶ … ܵଵ௡ ܵଶଵ ܵଶଶ … ܵଶ௡ ⋮ ⋮ … ⋮ ܵ௞ଵ ܵ௞ଶ … ܵ௞௡ ൲ (3)
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 71 Figure 1. Chaotic domains creation based on Lyapunov exponent estimation 4. CDMA RECEIVED SIGNAL MODEL While transmission from mobile to base station is done asynchronously, it is often the case to model it, as synchronous CDMA for simulation and analysis purpose (Liu). A CDMA channel with K users sharing the same bandwidth is shown in Figure 1. In this model, all the users simultaneously access a communication channel. The users of the system are identified at the base station by their unique spreading code Sk(t). The signal that is transmitted by any user consists of the user’s data bk that modulates its spreading code. Baseband transmission was employed. Then the received signal is ‫)ܜ(ܚ‬ = ∑ ‫܊‬‫ܓ‬۱‫ܓ‬‫܁‬‫ܓ‬(‫)ܜ‬ + ‫,)ܜ(ܖ‬ ‫ܜ‬ ∈ [૙, ‫]܂‬۹ ‫ܓ‬ୀ૚ (4) where, K is the total number of users, Ck is the channel attenuated amplitude, n(t) is the additive white Gaussian noise with σ2 as variance, bk and Sk(t) are as defined above 5. LINEAR RECEIVERS These are sub-optimal multiuser receivers. The general form of a linear receiver is given by ܾ෠ = sgn(wT .y). The sgn(.) function returns the sign of the operand and the filter weight vector w is often chosen to minimize a cost function of the difference metric between the original data bit and estimated data bit, while ܾ෠ is the estimated transmitted bit of the desired user data b and y is the received signal. The receivers utilized in the simulation are sub-optimal multiuser receivers.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 72 Figure 2. Received signal model for forward and reverse links 5.1. Matched Filter Matched filter bank, which is depicted in Figure 3, is the simplest receiver and usually the first stage in the base band signal detection. Almost all modern multi-user detection techniques deal with the output of the matched filter bank and the cross-correlation information of all users in the system (Venkateswarlu, Sandeep, & Chakravarthy, 2012). Matched filter was designed for orthogonal signature waveforms, which correlates the received waveform with the suitably delayed version of the spreading code. It does not cancel the effect of interference from other users, which is a main drawback of its use in CDMA system. Each of the filters weight is matched to the signature waveforms assigned to the users. It is an optimum receiver of known signal in Additive White Gaussian Noise (AWGN) environment. But in CDMA systems, matched filter is not the optimum receiver because the power of system’s MAI signal is very high at output of matched filter. Received signal at base band is given by Equation 1. The output of each matched filter can be represented as y1(t), y2(t), …, yk(t). The output can be defined for the K-th user matched filter (Liu), as y୩ = ‫׬‬ r(t)S୩(t)dt = ୘ ଴ ‫׬‬ S୩(t)ൣ∑ A୨b୨S୨(t) + n(t)୏ ୨ୀଵ ൧dt ୘ ଴ (5a) = A୩b୩ + ∑ A୨b୨ ‫׬‬ S୩(t)S୨(t)dt ୘ ଴ +୏ ୨ୀଵ୨ஷ୩ ‫׬‬ S୩(t)n(t)dt ୘ ଴ (5b) The crosscorrelation between the kth and jth user spreading sequences can be defined as ρ୩୨ = ‫׬‬ S୩(t)S୨(t)dt ୘ ଴ (6) S1(t) C1 d1 S2(t) C2 d2 SN(t) CN dN Σ n(t) r(t)
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 73 The decision is made by taking the signum of the matched filter output as follows b෠୩ = sgn(y୩) (7) From equation 5b, the outputs of the matched filters for all users in matrix form is y = RAb + n (8) where R is the normalized crosscorrelation matrix whose diagonal elements are equal to 1 and non-diagonal elements is equal to the cross-correlation ρkj, A=diag{A1, …, Ak}; y=[y1, …, yk]T ; b=[b1, …, bk]T and n is a Gaussian random vector with zero mean and covariance matrix σ2 R. 5.2. Decorrelator The decorrelator is shown in Figure 4. It is a linear detector which applies a linear transformation to the matched filter output to eliminate the effect of multiple access interference, thus providing unbiased estimates (Venkateswarlu, Sandeep, & Chakravarthy, 2012). The transformation R-1 , which is the correlation matrix inverse, is applied (Liu). It does not require prior knowledge of the received power and its performance is independent of the power of interfering users so that it solves the near-far problem. The main problem in the decorrelator detector is the neglect of noise term in the data estimate b, which leads to noise enhancement. Moreover, the structure of this detector needs to know the entire signature codes of the system's users and this makes the structure complex. The decision for the kth user is made based on b෠୩ = sgn(Rିଵ y୩) (9a) = sgn(Rିଵ(RAb + n)୩) (9b) = sgn((Ab + Rିଵ n)୩) (9c) . 5.3. MMSE Detector The minimum mean square error (MMSE) receiver, shown in Figure 5, has simpler structure than the decorrelator detector. The MMSE detector is an adaptive algorithm detector that compromises between the matched filter detector and the decorrelator detector (Venkateswarlu, Sandeep, & Chakravarthy, 2012). It solves the matched filter detector problems by minimizing the MAl signals' powers and the noise power jointly at the output of the detector (Liu). The motivation for the use of adaptive algorithms lies in the desire to make the individual taps of the receiver filter to respond to changes in the communication channel. The traditional implementation of adaptive receivers is that a sequence of a priori known training data is incorporated into the data stream at prearranged times. However, this effectively reduces the overall data rate of the system, which is the main drawback of this approach. The MMSE can be implemented as a receiver, with transformation T = (R + σଶ Aିଶ)ିଵ at the matched filter output, in order to minimize the mean square error between its estimated data and the original data. As the background noise goes to zero, the MMSE detector converges in performance to the Decorrelator detector. As the noise grows large, it is reduced to the matched filter receiver. Some other drawbacks of this receiver are
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 74 that its performance depends on the powers of the interfering users. Therefore, there is some loss of resistance to the near-far problem as compared to the Decorrelator detector and it requires estimation of the received amplitudes (Mahtab, Ahmed, Hussain, & Hasan, 2005). The decision for the kth user is based on b෠୩ = sgn((R + σଶ Aିଶ )ିଵ y୩) (10a) = sgn((R + σଶ Aିଶ )ିଵ(RAb + n)୩) (10b) Figure 3. Conventional matched filter receiver for multiple user detection Figure 4. Decorrelating detector
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 75 Figure 5. MMSE detector Figure 5. Six users BER performance of M, Gold and Logistic sequence for matched filter receiver 6. SIMULATION RESULT The three multiuser receivers has been chosen such that the performance of the sequences can be accessed under varying noise and interference conditions. The matched filter is the worst case scenario, since it does not provide means of reducing interference and noise. The decorrelator reduces interference, but enhances noise; while the MMSE provide means for mitigating both interference and noise. Equation 8, 9 and 10 corresponding to the mathematical model of the matched filter, decorrelator and MMSE respectively, were implemented with MATLAB sub- routines. All the six 63-bit M-sequences, first six out of sixty-five 63-bit Gold sequences and first six out of two hundred and forty-nine 62-bit bifurcation dependent logistic sequences generated Figure 6. Six users BER performance of M, Gold and Logistic sequence for decorrelator receiver from D1 domain, were utilised for simulating six users transmission. Each of the six user transmission consists of 100,000 bits of data spread by his respective user code. The transmitted
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 76 data are corrupted by AWGN in the channel. The BER of logistic sequence was compared to Gold and m-sequence for the matched filter, decorrelator and MMSE receiver types, in a CDMA environment of six users as shown in Figures 6-8 respectively. In Figure 6, logistic sequence has worst BER performance for matched filter receiver; while it has best performance for decorrelator and MMSE as shown in Figure 7 and 8 respectively. In Figure 9, the BER performance of logistic sequence was considered for all the receiver types. It can be seen that decorrelator provides the best reception for logistic sequence. The spectral analysis of random sample logistic, Gold and m- sequences were conducted by taking the Fast Fourier Transform and shown in Figures 10-12. Figure 7. Six users BER performance of M, Gold and Logistic sequence for MMSE receiver Figure 8. Six users BER performance of Logistic sequence for matched filter, decorrelator and MMSE receiver
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 77 Figure 9. Spectrum of 63-bits Gold Sequence Figure 10. Spectrum of 63-bits Gold Sequence Figure 11. Spectrum of 62-bits Logistic Sequence
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 78 Figure 12. Spectrum of 63-bits M-Sequence 6. CONCLUSIONS It can be observed from the result that logistic sequences show better BER performance than Gold and m-sequences for Decorrelator and MMSE receiver. Also, the decorrelator receiver proves to be an optimal receiver for logistic sequences, compared to matched filter and MMSE receiver. Furthermore the frequency spectrums of the logistic sequences are wideband, due to the low MSAAC values. However the spectrums of the logistic sequences are not as flat as m-sequence, but the flatness is comparable to Gold sequences. ACKNOWLEDGEMENTS This work was supported by the Nigerian Tertiary Education Trust Fund under academic staff training and development programme. REFERENCES [1] Meenakshi and M. P. Chawla, "A review comparison of different spreading codes for DS CDMA," IJSRD - International Journal for Scientific Research & Development|, vol. 2, no. 2, pp. 995-999, 2014. [2] A. Sawlikar and M. Sharma, "Analysis of different pseudo noise sequences," International Journal of Computer Technology and Electronics Engineering (IJCTEE), vol. 1, no. 2, pp. 156-161, 2011. [3] R. L. Pickholtz, L. B. Milstein, and D. L. Schilling, "Theory of spread-spectrum communications-A tutorial," IEEE Transactions on Communications, vol. com-30, no. 5, pp. 855-884, May 1982. [4] K. Umeno and K. Kitayama, "Spreading sequences using periodic orbits of chaos for CDMA," Electronic Letters, vol. 35, no. 7, pp. 545-546, April 1999. [5] C. Vladeanu, I. Banica, and S.El. Assad, "Periodic chaotic spreading sequences with better correlation properties than convectional sequences-BER performances analysis," in Signals,Circuits and Systems, 2003. SCS 2003.International Symposium on, vol. 2, Iasi,Romania, 2003, pp. 649-652. [6] H. Zhang, J. Guo, H. Wang, R. Ding, and W Chen, "Oversample chaotic map binary sequences: Definition, performance and realization," in Circuits and Systems, 2000. IEEE APCCAS 2000., Tianjin, 2000, pp. 618-621. [7] O. E. Adetoyi and S. A. Adeniran, "Chaotic Sequence Derived from Bifurcation Dependency," International Journal of Scientific & Engineering Research , vol. 7, no. 4, pp. 165-169, April 2016.
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016 79 [8] N. K. Pareek, V. Patidar, and K. K. Sud, "A random bit generator using chaotic maps," International Journal of Network Security, vol. 10, no. No.1, pp. 32-38, 2010. [9] S. Spinsante, S. Andrenacci, and E. Gambi, "De Bruijn Sequences for Spread Spectrum Applications: Analysis and Results". [10] M. Suneel, "Cryptographic pseudo-random sequences from the chaotic," Sadhana, vol. 34, no. 5, pp. 689-701, October 2009. [11] K. Usha and K. J. Sankar, "New Multi Level Spreading Codes for DS CDMA Communication," in Conference on Advances in Communication and Control Systems (CAC2S 2013), 2013, pp. 154-159. [12] Y. Liu. Simulation Comparison of Multiuser Receivers in DS/CDMA Systems. [Online]. http://plaza.ufl.edu/yongliu/projectreport.PDF [13] Y. Venkateswarlu, K. Sandeep, and A.S.N. Chakravarthy, "CDMA and MAI problem elimination methods," International Journal of Scientific and Research Publications, vol. 2, no. 7, pp. 1-13, 2012. [14] Z. Mahtab, S.J. Ahmed, S.S. Hussain, and S. Hasan, "CDMA based wireless transceiver system matlab simulation and FPGA implementation," in Engineering Sciences and Technology,2005.SCONEST 2005. Student conference on, Karachi, August 2005, pp. 1-9. AUTHORS Oluyemi Adetoyi obtained her B.Sc. degree in Electrical and Electronic Engineering from University of Ibadan, Nigeria. Her M.Sc. degree in Electronic and Electrical Engineering was obtained from Obafemi Awolowo University, Ile- Ife, Nigeria. She was a lecturer at different time at Adekunle Ajasin University in Nigeria and at Babcock University between. Currently, she is a lecturer with University of Ibadan, Nigeria. She is currently pursuing her PhD in Communication Engineering at Obafemi Awolowo University, Ile-Ife, Nigeria. Her research interest is in wireless communication and data security. Solomon Adeniran is a lecturer with the Department of Electronic and Electrical Engineering, Obafemi Awolowo University, Nigeria. His area of research work spans passive components for microwave networks, DSP and communication systems.