SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
International Journal of ElectronicsJOURNAL OF ELECTRONICS AND
INTERNATIONAL and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Volume 5, Issue 1, January (2014), pp. 138-147
© IAEME: www.iaeme.com/ijecet.asp
Journal Impact Factor (2013): 5.8896 (Calculated by GISI)
www.jifactor.com

IJECET
©IAEME

OPTIMAL DECODING FOR WIRELESS RELAY NETWORKS WITH
DECODE-AND-FORWARD COOPERATION PROTOCOL
Taha Abdelshafy Abdelhakim Khalaf
Department of Electrical Engineering, Assiut University, Assiut, Egypt, 71516

ABSTRACT
In this paper, we derive an exact upper bound (UB) on bit error rate (BER) of the
decode-and-forward (DF) cooperation protocol. The destination uses the maximum a posterior (MAP)
decoder to estimate the data sent from the source. The MAP decoder is optimal in the sense that it
minimizes the the end-to-end error probability. The complexity of derivation comes from the fact that
however the source generates data with equal probability, the data received at the destination does not
have the same a priori probability. That is because of the error that occurs in the source-to-relay link.
Hence, the MAP decoding rule can not be simplified to the maximum likelihood (ML) decoding rule.
The results show that the upper bound is very tight. Therefore, the closed form expression of the upper
bound can be used to fully study and understand the diversity performance of the DF cooperation
protocol.
Keywords: Relay Network, Diversity, Decode-and-Forward, MAP Decoder.
I. INTRODUCTION
Cooperative relaying is gaining a significant attention in that multiple intermediate relay nodes
can collaborate with each other to enhance the overall network efficiency. It exploits the physical-layer
broadcast property offered by the wireless medium that transmitted signals can be received and
processed by any node in the neighborhood of a transmitter. The cooperative relaying approach has a
great potential to provide substantial benefits in terms of reliability (diversity gain) [1]-[4] and rate
(bandwidth or spectral efficiency)[5]-[7]. These benefits can extend the coverage, reduce network
energy consumption, and promote uniform energy drainage by exploiting neighbors’ resources. They
can be of great value in many applications, including ad-hoc networks, mesh networks, and next
generation wireless local area networks and cellular networks. Through cooperative diversity, relay
nodes forward the signal received from the source to propagate redundant signals over multiple paths
in the network. This redundancy allows the ultimate receiver to essentially average channel variations
resulting from fading, shadowing, and other forms of interference [2]. Several cooperation protocols
138
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

have been proposed in the literature such as amplify-and-forward (AF), decode-and-forward (DF), and
amplify
forward
compress-and-forward (CF) [10, 11].
CF)
The error performance of the cooperative communications with decode-anddecode
-forward protocol
with different combining techniques was investigated in the literature. The end-to-end performance of
end end
wireless communication systems with relays over Rayleigh-fading channels was studied in [12] when
fading
the direct link between the source and the destination does not exist. A general framework for ML
detection of both coherent and noncoherent uncoded cooperative diversity was presented in [13] where
the authors dervived a high SNR approximations based on the closed-form BER expressions. The
hors
closed form
performance of the maximum likelihood decoding for network coded cooperative communication is
studiied in [14].
In this paper, we drive a closed from expression for the upper bound on the bit error probability
of the decode-and-forward cooperation protocol with MAP decoder. Unlike all previous work, the
forward
receiver does not use any combining techniques. However, we consider the data received from the
consider
source together with the data received from the relay node as a codeword. The decoding rule is to find
the codeword that maximizes the a posterior probability. The MAP decoding rule is optimal in the
sense that is minimizes the end- end error probability. Since the error probability in the
-to-end
source-to-relay link is not necessarily 0.5 , the codewords received at the destination are not
relay
equaprobable. Therefore, the MAP decoding rule can not be simplified to the maximum likelihood
(ML) decoding rule. We used the closed form expression we derived to find an approximate upper
bound at high SNR regime. The approximate upper bound can be used to clearly understand the effect
of the SNR of the source-to-relay link on the system diversity.
relay
The remainder part of this paper is organized as follows. The system model is described in
Section II. The MAP decoding scheme is described in Section III. The derivation of the exact upper
.
.
bound on the bit error probability is provided in Section IV. Section V presents numerical results and
discussions. Finally, the conclusions are drawn in Section VI.
II. SYSTEM MODEL

Figure 1: System Model
We consider a relay network composed of one source (S), one relay (R), and one destination
(D) as shown in Fig. 1. The data transmission occurs over two phases. In the first phase, the source
sends its data to the destination. Due to the broadcast nature of the wireless medium, the relay may also
of
receive the source’s data (possibly with some errors). In the second phase, the relay node decodes the
data received from the source and then forwards the decoded data to the destination. We assume that
all data are sent using binary phase shift keying (BPSK) modulation scheme and the source generates
e
its bits with equal probability, i.e., p(bs = 0) = p (bs = 1) = 0.5 where bs is the source’s bit. We
assume that all channel are Rayleigh fading channels with additive white Gaussian noise (AWGN).
We also assume that each node is equipped with single antenna.
139
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

The signals received at the relay node and the destination in both phases are given by
−
yr = hsr d srm xs + nr ,

(1)

−
y1 = hsd d sdm xs + n1 ,

(2)

−
y2 = hrd d rdm xr + n2 ,

(3)

where
• yr is the signal received at the relay node in the first phase from the source.
• y1 is the signal received at the destination in the first phase from the source.
• y2 is the signal received at the destination in the second phase from the relay.
• xs ∈{+ Es ,− Es } is the BPSK modulated signal of the source’s bit, bs ∈ {0,1} , where Es is the
transmit energy per the source’s bit.
• xr ∈ {+ Er ,− Er } is the BPSK modulated signal of the relay’s bit, br ∈ {0,1} , where Er is the
transmit energy per the relay’s bit.
• hsr , hsd , and hrd are the channel fading gains of the S-R, S-D, and R-D links, respectively.
• d sr , d sd , and d rd are the lengths of the S-R, S-D, and R-D links, respectively.
• m is the path loss exponent.
• nr is the AWGN noise at the relay node which has zero mean and variance N 0 /2 .
r

• n1 and n2 are independent AWGN noise components at the destination which have zero mean and
variance N 0 /2 .
The bit br represents an estimate of the source’s bit bs at the relay node and it is given by

0
br = 
1

yr ≥ 0
yr < 0

(4)

Let the random variable e ∈{0,1} captures the error events on the source-to-relay channel, i.e,
br = bs ⊕ e , where “ ⊕ ” denotes the binary “xor” operation. Hence, e = 1 means br ≠ bs , i.e. the
source’s bit is received in error at the relay node. In the case of BPSK modulation over flat fading
channel with AWGN, the probability of error in the source-relay link, i.e. P(e = 1) , is given by [9]

γ sr 
1
1 −

2
1 + γ sr 
1
= [1 − Γsr ]
2

Pe =
sr

(5)

−
where γ sr = d srm Es /N 0 is the average received SNR of the link between the source and the relay and
r

Γsr = γ sr /(1 + γ sr ) . The received signals at the destination can be written in the matrix form as follows
140
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

y = Hx + n

(6)

where the received vector y = [ y1 y2 ]T , the transmitted vector x = [ xs xr ]T , the noise vector

n = [n1 n2 ]T , and the channel matrix H is given by
h d − m
H =  sd sd
0





−
d rdm 


0
hrd

(7)

III. MAP DECODING
In this section, we present the MAP decoding scheme for cooperative communication networks
with decode-and-forward cooperation protocol. The MAP decoding scheme is optimal in the sense that
it minimizes the error probability. Let b = [bs br ]T denote the transmitted vector where br = bs ⊕ e .
This vector takes one of four possible values b1 = [0 0]T , b2 = [11]T , b3 = [0 1]T , and b4 = [1 0]T based
on the values bs and e . Since P (e = 1) is not necessarily equal to P(e = 0) , These four vectors are
not equaprobable. The probability of transmitting a specific vector bi is given by

1 − Pesr

 2
P(bi ) = 
 Pe
 sr
 2

i = 1,2
(8)
i = 3,4

The MAP decoder finds the transmitted vector bi that maximizes the a posterior probability P(bi | y )
. An estimate of the transmitted vector is calculated as follows
b = arg maxb P (b | y )
i

i

(9)

and the maximization process is over the 4 possible vectors. Applying Bayes theorem to (9) yields

b = arg maxb

i

P( y | bi ) P(bi )
P( y )

= arg maxb P( y | bi ) P (bi )
i

(10)

where
P ( y | bi ) =

1
−|| y − Hxi || 2 /N 0
e
(πN 0 )

(11)

and xi is the modulated vector that corresponds to the vector bi , e.g., x3 = [+ Es − Er ]T .
Substituting from (11) into (10) yields
141
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

b = arg maxb

i

1
−|| y − Hxi || 2 /N 0
e
P (bi )
(πN 0 )

= arg minb (|| y − Hxi || 2 − N 0 log ( P (bi )) )
i

(12)

IV. PROBABILITY OF BIT ERROR
In this section, we derive the upper bound on the bit error probability for the MAP decoding
scheme. For mathematical traceability, we assume that the source and the relay node adjust their
transmit power such that all signals are received at the destination with the same SNR γ = E/N 0 . This
m
m
can be achieved by choosing E s = d sr E and Er = d rd E .
The bit error probability is given by

PE ≤ (P(b1 → b2 ) + P(b1 → b4 ) )P(b1 ) + (P (b2 → b1 ) + P (b2 → b3 ) )P(b2 ) (13)

+ (P(b3 → b2 ) + P(b3 → b4 ) )P(b3 ) + (P(b4 → b1 ) + P(b4 → b3 ) )P(b4 )
where P (bi → b j ) is the pairwise error probability of confusing bi with b j when bi is transmitted
and when these are the only two hypothesis.
When the vector bi is transmitted, the received vector would be

yi = Hxi + n

(14)

and the probability P (bi → b j ) is given by

P(bi → b j ) = P || yi − Hx j || 2 − N 0 log( P(b j )) < || yi − Hxi || 2 − N 0 log( P (bi )) 



|| H ( xi − x j ) || 2 N 0
P(bi ) 


= P (< n, H ( xi − x j ) >) >
+
log
(15)
2
2
P(b j ) 




(

When h = [ hsd hrd ]T is given, < n, H ( xi − x j ) > would be a Gaussian random variable with zero
mean and variance

N0
|| H ( xi − x j ) ||2 . Accordingly,
2

 || H ( xi − x j ) ||
N 0 /2 log(α ij ) 

P (bi → b j | h) = Q
+

|| H ( xi − x j ) || 
2N0



(16)

where α ij = P (bi )/P (b j ) . From (16), we notice that the probability P (bi → b j ) depends on: 1- The
Hamming distance between bi and b j , wij , (i.e., the number of positions at which bi and b j are
different); 2- Whether bi and b j have the same probability.
Let P (α ij ) = P (bi → b j ) when wij = 1 and P2 = P (bi → b j ) when wij = 2 . From (16), we notice
1
that P2 doesn’t depend on α ij . Hence, substitute from (8) into (13), yield
142
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

(

PE ≤ 2 P2 + [P (α 41 ) + P (α 32 )]Pe + [P (α14 ) + P (α 23 )] 1 − Pe
1
1
1
1
sr

sr

)

(17)

In order to derive P (α ij ) , we consider the case when i = 1 and j = 4 . Substitution in (16) yields
1

log(α14 ) 
2

P (b1 → b4 | hsr ) = Q 2hsr γ +
2

2 2hsr γ 



(18)

2
where γ = E/N 0 . In order to find P (α14 ) , we average (18) over the distribution of hsr . Since all
1
channels have the same distribution, {∀i, j : wij = 1} , we have

∞ 
log (α ij ) 
 f X ( x)dx
P (α ij ) = ∫ Q 2 x +
1

0
2 2x 



(19)

where

f X ( x) =

1

γ

e − x/γ

(20)

Substituting from (20) into (19) with considering Q (u ) = 0.5erfc(u/ 2 ) yields

1
2γ

P (α ij ) =
1

∞



∫ erfc

0

x+

b  − x/γ
e dx
x

(21)

where b = log (α ij )/4 . Integrating (21) using integration by parts where w = erfc( x + b/ x ) ,

dv = e − x/γ dx , dw =

− 1  b  − ( x +b ) 2 /x
dx , and v = −γe − x/γ , yields
1 −  e
πx  x 


b  − x/γ γ

e −
− γerfc x +
x
π


b≥0
 I
= 1
1 + I1 b < 0

1
P (α ij ) =
1
2γ

∞

∫

1  b  − x/γ −( x + b )2 /x 
dx 
1 − e
x  x
0

(22)

where
I1 =

−1
2 π

∫

∞

0

1  b  − x/γ − ( x + b ) 2 /x
dx
1 − e
x  x

(23)

After some mathematical manipulations, we can write (23) as follows
2

(u + d )
 γ
d −

− e u du
(24)
∫0  1 + γ u 


where r = 2b(1 − 1 + 1/γ ) , d = b 1 + 1/γ , and u = x(1 + 1/γ ) . We can write (24) as follows

− e −r
I1 =
2 π

∞

1
u

143
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

− e −r
I1 =
2 π

∫

∞

0

1
u

 I
=  −r 2
− e + I 2

2

(u + d )

γ
d −
 −1 +
+ 1 − e u du

1+ γ
u


b≥0

b<0

(25)

where

I 2 = 1 −



 e −r

1+ γ  2 π


γ

∫

1 − (u
e
u

∞

0

+ d )2
u

du

(26)

By changing variables, let y = u and dy = dy/(2 u ) . After substitution in (26) we have

I 2 = 1 −



γ  e −r

1+ γ  π



γ
= 1 −

1+ γ


∫

∞

0

e

 e − (2 d + r )


π


 y2 +d
−

y


∫

∞

0






2

− y2 −

e

dy
d2
y2

dy

(27)

Using integration tables to find the integral in (27) yields [8]

1 
γ  −4 d −r
e
 1 −

1+ γ 
2 

I2 = 

 1 1 − γ e − r

 2
1+ γ 

 

b≥0
(28)

b<0

After substituting for the d, r and b , we have
1
1 
γ  − 2 (1+
 1 −
α ij
1+ γ 
2 
I2 = 
1
γ  − 2 (1−
1 
1−
α ij

2 
1+ γ 
 

1+

1+

1

γ

1

γ

)

α ij ≥ 1

(29)
)

α ij < 1

Substituting from (29) into (25) then into (22) yields
 1 − Γ − (1+1/ Γ )/2
α ij
if α ij ≥ 1

2

P1 (α ij ) = 
 1 + Γ − (1−1/ Γ )/2
if α ij < 1
1 − 2 α ij


γ

(30)

In order to derive P2 , we consider the case when i = 1 and j = 2 . Substituting
1+ γ
α ij = 1 into (16) yields
where Γ =

144
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

(

2
2
P(b1 → b2 | h) = Q 2(hsr + hrd )γ

)

(31)

2
2
Averaging (31) over the joint distribution of hsr and hrd yields [9]

2

 1 − Γ  1  m + 1 1 + Γ 

P2 = 
 ∑



 2  m = 0 m  2 
1
1 
2
= (1 − Γ ) 1 + Γ 
2
 2 

m

(32)

It is clear from (5) that if Es ≥ 0 or equivalently 0 ≤ Γsr ≤ 1 then the error probability in the S-R link
would be 0 ≤ Pe ≤ 0.5 . Therefore, substitution from (30) and (32) into the right hand side of (17)
sr

results in the following upper bound



 1 − Γsr
1
1  1
2
PUB = (1 − Γ ) 1 + Γ  + (1 − Γsr )1 − Γ
1+ Γ
2
 2  2
sr




1− Γ

 2Γ 
 

 


(33)

At higher receive SNR’s γ sr and γ , the upper bound of (33) can be approximated as follows

PUB ≈

γ
1 
1 +
2 
4γ  γ sr






(34)

V. NUMERICAL RESULTS AND DISCUSSIONS
In this section, we present numerical results for both analysis and simulations.
0

10

-1

10

-2

Bit Error Rate BER

10

-3

10

-4

Upper Bound γSR = 0 dB

10

Simulations γSR = 0 dB
-5

Upper Bound γSR = 15 dB

10

Simulations γSR = 15 dB
-6

10

Upper Bound γSR = 50 dB
Simulations γSR = 50 dB

-7

10

0

5

10
15
20
Receive SNR at the destination, γ

25

30

Figure 2: Bit error probability versus γ = E/N 0 based on simulations and upper bound
145
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

Fig. 2 compares the bit error probability obtained from simulations with the exact upper bound
given by (33). The BER is plotted against the receive SNR γ = E/N 0 of S-D and R-D links at different
values of the the receive SNR of the S-R link γ sr or equivalently different values of the distance d sr
. We found that the derived upper bound is very tight. Therefore, the closed form expression of the
upper bound can be used to fully study and understand the diversity performance of the DF
cooperation protocol. We also found that the SNR of the S-R link highly affects the end-to-end error
rate of the system. At low values of γ sr the error rate of the S-R link Pe would be high and
sr

accordingly the system does not provide the expected diversity gain. We notice that the diversity gain
increases as the value of γ sr increases.
2
1.9
1.8

Diversity Order (L)

1.7
1.6
1.5
1.4
1.3

γ1 = 20 dB

1.2

γ1 = 30 dB
γ1 = 40 dB

1.1

γ1 = 50 dB
1

0

10

20

30
40
50
60
70
Receive SNR at the relay, γsr

80

90

100

Figure 3: Diversity gain versus γ sr at different values of γ 1
Since the diversity order is related to the slope of the BER curve with respect to γ and in order to
the study the effect of the γ sr on the diversity, let’s define the diversity order L as follows

L=

log10 PUB (γ 2 ) − log10 PUB (γ 1 )
(γ 2 (dB) − γ 1 (dB))/10

(35)

where PUB (γ i ) is the upper bound at γ i and i = 1,2 . The definition of (35) measures the change of
exponent of the BER with respect to one decade of the SNR in dB. Fig. 3 shows the diversity order
defined in (35) against the receive SNR of the S-R link γ sr at different values of γ 1 where

γ 2 = γ 1 + 10 dB. We found that full diversity of 2 is achieved at higher values of γ sr . We also found
that at fixed value of γ sr , higher diversity order is achieved at lower values γ , e.g., at γ sr = 40 dB,
the diversity order is ≈ 1.7 when γ 1 = 20 dB, and the diversity order is ≈ 1 when γ 1 = 50 dB. This
result is consistent with the approximation of (34) where the diversity order is close to 1 when
γ > γ sr and close to 2 when γ < γ sr and both of them are high. The intuitive explanation for this
phenomenon is that the enhancement of BER performance is dominated by the link with the lower
SNR. In other words, the link with the lower SNR is considered as the bottleneck of the BER
improvement. Therefore, when γ is small it will be the bottleneck and the BER is proportional to

1/γ 2 .
146
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

VI. CONCLUSIONS
In this paper, we presented the MAP decoding scheme for the wireless relay network that
adopts the decode-and-forward as a cooperation protocol. We derived a closed form expression for the
upper bound on the bit error probability. The numerical results show that the upper bound is very tight.

REFERENCES
[1]

[2]

[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]

[13]
[14]

S. Alam and S. H. Gupta, “Performance analysis of cooperative communication wireless
network,” International Journal of Electronics and Communication Engineering and
Technology IJECET, pp. 301–309, vol. 3, no. 2, July–September 2012.
J. N. Laneman, D.N.C.Tse, G. Wornell, “Cooperative diversity in wireless networks: Efficient
protocols and outage behavior,” IEEE Transactions on Information Theory, pp. 3062–3080,
Dec. 2004.
A. Sendonaris, E. Erkip, B.Azhang, “User cooperation diversity – Part I: System description,”
IEEE Transactions on Communications, pp. 1927–1938, Nov. 2003.
A. Nosratinia, et al., “Cooperative communication in wireless networks,” IEEE
Communications Magazine, pp. 74–80, Oct. 2004.
S. W. Kim, “Cooperative spatial multiplexing in mobile ad hoc networks,” Proc. of IEEE
International Conference on Mobile Ad hoc and Sensor Systems Conference (MASS,) 2005.
Y. Zhang, G. Wang, M. G. Amin, “Cooperative spatial multiplexing in multi-hop wireless
networks,” Proc. of IEEE ICASSP06, pp. IV821–IV824, May 2006.
A. Host-Madsen and A. Nosratinia, “The multiplexing gain of wireless networks,” Proc. of
IEEE International Symposium on Information Theory, 2005.
I.S.Gradshteyn and I.M.Ryzhik, Tables of Integrals, Series, and Products, pp.341, Eq. 3.472,
Academic Press, 1980.
Andrea Goldsmith, Wireless communications, Cambridge University Press , 2005.
T. M. Cover, A. A. El Gamal, “Capacity theorems for the relay channel”, IEEE Transactions
on Information Theory, vol. IT-25, No 5, pp 572-584, Sept. 1979.
A.D. Wyner, “The rate-distortion function for source coding with side information at the
decoder –II: General Sources”, Information and Control, Vol 38, pp 60-80, 1978.
Mazen O. Hasna and Mohamed S. Alouini, “End-to-end performance of transmission systems
with relays over Rayleigh-fading channels,” IEEE Trans. Wireless Commun., vol. 2, no. 6, pp.
1126–1131, Nov. 2003.
D. Chen and J. N. Laneman, “Modulation and demodulation for cooperative diversity in
wireless systems,” IEEE Trans. Wireless Commun., vol. 5, no. 7, pp. 1785–1794, Jul. 2006.
Taha Khalaf, “Performance of Maximum Likelihood Decoder in Network Coded Cooperative
Communications,” IEEE Wireless Days Conference, Valencia, Spain, Nov. 2013.

147

Mais conteúdo relacionado

Mais procurados

Evaluation of channel estimation combined with ICI self-cancellation scheme i...
Evaluation of channel estimation combined with ICI self-cancellation scheme i...Evaluation of channel estimation combined with ICI self-cancellation scheme i...
Evaluation of channel estimation combined with ICI self-cancellation scheme i...ijcsse
 
Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...ijwmn
 
06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_SpreadingAhmar Hashmi
 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Krishna Nanda
 
An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...
An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...
An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...IRJET Journal
 
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMS
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMSREDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMS
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMSVLSICS Design
 
On Complex Enumeration for Multiuser MIMO Vector Precoding
On Complex Enumeration for Multiuser MIMO Vector PrecodingOn Complex Enumeration for Multiuser MIMO Vector Precoding
On Complex Enumeration for Multiuser MIMO Vector PrecodingTSC University of Mondragon
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionijasuc
 
Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel IJCNCJournal
 
Interpixel redundancy
Interpixel redundancyInterpixel redundancy
Interpixel redundancyNaveen Kumar
 
Data Compression - Text Compression - Run Length Encoding
Data Compression - Text Compression - Run Length EncodingData Compression - Text Compression - Run Length Encoding
Data Compression - Text Compression - Run Length EncodingMANISH T I
 
Analysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation TechniquesAnalysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation TechniquesIOSR Journals
 
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...IJERA Editor
 
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...theijes
 
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...IJEEE
 
Csit77402
Csit77402Csit77402
Csit77402csandit
 

Mais procurados (20)

Evaluation of channel estimation combined with ICI self-cancellation scheme i...
Evaluation of channel estimation combined with ICI self-cancellation scheme i...Evaluation of channel estimation combined with ICI self-cancellation scheme i...
Evaluation of channel estimation combined with ICI self-cancellation scheme i...
 
Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...
 
06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading
 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1
 
An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...
An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...
An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...
 
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMS
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMSREDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMS
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMS
 
On Complex Enumeration for Multiuser MIMO Vector Precoding
On Complex Enumeration for Multiuser MIMO Vector PrecodingOn Complex Enumeration for Multiuser MIMO Vector Precoding
On Complex Enumeration for Multiuser MIMO Vector Precoding
 
Network coding
Network codingNetwork coding
Network coding
 
C0431320
C0431320C0431320
C0431320
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmission
 
Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel
 
Interpixel redundancy
Interpixel redundancyInterpixel redundancy
Interpixel redundancy
 
Masters Report 1
Masters Report 1Masters Report 1
Masters Report 1
 
Data Compression - Text Compression - Run Length Encoding
Data Compression - Text Compression - Run Length EncodingData Compression - Text Compression - Run Length Encoding
Data Compression - Text Compression - Run Length Encoding
 
Analysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation TechniquesAnalysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation Techniques
 
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...
 
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
 
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...
 
Csit77402
Csit77402Csit77402
Csit77402
 
10.1.1.59.4606
10.1.1.59.460610.1.1.59.4606
10.1.1.59.4606
 

Destaque (20)

40120140501009
4012014050100940120140501009
40120140501009
 
20320140501007 2
20320140501007 220320140501007 2
20320140501007 2
 
40120140501008
4012014050100840120140501008
40120140501008
 
20320140501011
2032014050101120320140501011
20320140501011
 
30120140501012 2
30120140501012 230120140501012 2
30120140501012 2
 
50120130406028 2
50120130406028 250120130406028 2
50120130406028 2
 
50120130406030 2
50120130406030 250120130406030 2
50120130406030 2
 
El projecte del replantejament de les línies de terme: la recuperació dels lí...
El projecte del replantejament de les línies de terme: la recuperació dels lí...El projecte del replantejament de les línies de terme: la recuperació dels lí...
El projecte del replantejament de les línies de terme: la recuperació dels lí...
 
word
wordword
word
 
Villa Elizabeth
Villa ElizabethVilla Elizabeth
Villa Elizabeth
 
Certificates
CertificatesCertificates
Certificates
 
123
123123
123
 
Filtros
FiltrosFiltros
Filtros
 
4 A Rivalidade Luso Castelhana
4  A Rivalidade Luso Castelhana4  A Rivalidade Luso Castelhana
4 A Rivalidade Luso Castelhana
 
Brochure_PPMS_Web
Brochure_PPMS_WebBrochure_PPMS_Web
Brochure_PPMS_Web
 
Monstro Dos Mares - Curiosidades "SOS RIOS DO BRASIL"
Monstro Dos Mares - Curiosidades "SOS RIOS DO BRASIL"Monstro Dos Mares - Curiosidades "SOS RIOS DO BRASIL"
Monstro Dos Mares - Curiosidades "SOS RIOS DO BRASIL"
 
Regent's Park Innovative_OOH.PDF
Regent's Park Innovative_OOH.PDFRegent's Park Innovative_OOH.PDF
Regent's Park Innovative_OOH.PDF
 
Grupo 9......procesadores
Grupo 9......procesadoresGrupo 9......procesadores
Grupo 9......procesadores
 
Calamidade Em Santa Catarina
Calamidade Em Santa CatarinaCalamidade Em Santa Catarina
Calamidade Em Santa Catarina
 
Espelhos em aguas quietas
Espelhos em aguas quietasEspelhos em aguas quietas
Espelhos em aguas quietas
 

Semelhante a 40120140501016

An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay SelectionAn Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selectioninventy
 
Distributed differential beamforming and power allocation for cooperative com...
Distributed differential beamforming and power allocation for cooperative com...Distributed differential beamforming and power allocation for cooperative com...
Distributed differential beamforming and power allocation for cooperative com...IJECEIAES
 
Performance enhancement of audio transmission based on LMMSE method
Performance enhancement of audio transmission based on LMMSE methodPerformance enhancement of audio transmission based on LMMSE method
Performance enhancement of audio transmission based on LMMSE methodnooriasukmaningtyas
 
A low complexity distributed differential scheme based on orthogonal space t...
A low complexity distributed differential scheme based on  orthogonal space t...A low complexity distributed differential scheme based on  orthogonal space t...
A low complexity distributed differential scheme based on orthogonal space t...IJECEIAES
 
FPGA Design & Simulation Modeling of Baseband Data Transmission System
FPGA Design & Simulation Modeling of Baseband Data Transmission SystemFPGA Design & Simulation Modeling of Baseband Data Transmission System
FPGA Design & Simulation Modeling of Baseband Data Transmission SystemIOSR Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...Alexander Decker
 
Analysis on the performance of pointing error effects for RIS-aided FSO link ...
Analysis on the performance of pointing error effects for RIS-aided FSO link ...Analysis on the performance of pointing error effects for RIS-aided FSO link ...
Analysis on the performance of pointing error effects for RIS-aided FSO link ...TELKOMNIKA JOURNAL
 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisnooriasukmaningtyas
 
Performance Analysis of Differential Beamforming in Decentralized Networks
Performance Analysis of Differential Beamforming in Decentralized NetworksPerformance Analysis of Differential Beamforming in Decentralized Networks
Performance Analysis of Differential Beamforming in Decentralized NetworksIJECEIAES
 
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Editor Jacotech
 
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...cscpconf
 
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...csandit
 
Enhanced Transmission and Receiver Diversity in Orthogonal Frequency Division...
Enhanced Transmission and Receiver Diversity in Orthogonal Frequency Division...Enhanced Transmission and Receiver Diversity in Orthogonal Frequency Division...
Enhanced Transmission and Receiver Diversity in Orthogonal Frequency Division...IJECEIAES
 

Semelhante a 40120140501016 (20)

An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay SelectionAn Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
 
Hg3413361339
Hg3413361339Hg3413361339
Hg3413361339
 
Distributed differential beamforming and power allocation for cooperative com...
Distributed differential beamforming and power allocation for cooperative com...Distributed differential beamforming and power allocation for cooperative com...
Distributed differential beamforming and power allocation for cooperative com...
 
Performance enhancement of audio transmission based on LMMSE method
Performance enhancement of audio transmission based on LMMSE methodPerformance enhancement of audio transmission based on LMMSE method
Performance enhancement of audio transmission based on LMMSE method
 
A low complexity distributed differential scheme based on orthogonal space t...
A low complexity distributed differential scheme based on  orthogonal space t...A low complexity distributed differential scheme based on  orthogonal space t...
A low complexity distributed differential scheme based on orthogonal space t...
 
FPGA Design & Simulation Modeling of Baseband Data Transmission System
FPGA Design & Simulation Modeling of Baseband Data Transmission SystemFPGA Design & Simulation Modeling of Baseband Data Transmission System
FPGA Design & Simulation Modeling of Baseband Data Transmission System
 
9517cnc05
9517cnc059517cnc05
9517cnc05
 
B0510916
B0510916B0510916
B0510916
 
40120140501015
4012014050101540120140501015
40120140501015
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
 
Analysis on the performance of pointing error effects for RIS-aided FSO link ...
Analysis on the performance of pointing error effects for RIS-aided FSO link ...Analysis on the performance of pointing error effects for RIS-aided FSO link ...
Analysis on the performance of pointing error effects for RIS-aided FSO link ...
 
[IJET V2I5P23] Authors:Pramod Kumar
[IJET V2I5P23] Authors:Pramod Kumar[IJET V2I5P23] Authors:Pramod Kumar
[IJET V2I5P23] Authors:Pramod Kumar
 
40120130405003 2
40120130405003 240120130405003 2
40120130405003 2
 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysis
 
Performance Analysis of Differential Beamforming in Decentralized Networks
Performance Analysis of Differential Beamforming in Decentralized NetworksPerformance Analysis of Differential Beamforming in Decentralized Networks
Performance Analysis of Differential Beamforming in Decentralized Networks
 
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
 
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
 
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...
 
Enhanced Transmission and Receiver Diversity in Orthogonal Frequency Division...
Enhanced Transmission and Receiver Diversity in Orthogonal Frequency Division...Enhanced Transmission and Receiver Diversity in Orthogonal Frequency Division...
Enhanced Transmission and Receiver Diversity in Orthogonal Frequency Division...
 

Mais de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

40120140501016

  • 1. International Journal of ElectronicsJOURNAL OF ELECTRONICS AND INTERNATIONAL and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 5, Issue 1, January (2014), pp. 138-147 © IAEME: www.iaeme.com/ijecet.asp Journal Impact Factor (2013): 5.8896 (Calculated by GISI) www.jifactor.com IJECET ©IAEME OPTIMAL DECODING FOR WIRELESS RELAY NETWORKS WITH DECODE-AND-FORWARD COOPERATION PROTOCOL Taha Abdelshafy Abdelhakim Khalaf Department of Electrical Engineering, Assiut University, Assiut, Egypt, 71516 ABSTRACT In this paper, we derive an exact upper bound (UB) on bit error rate (BER) of the decode-and-forward (DF) cooperation protocol. The destination uses the maximum a posterior (MAP) decoder to estimate the data sent from the source. The MAP decoder is optimal in the sense that it minimizes the the end-to-end error probability. The complexity of derivation comes from the fact that however the source generates data with equal probability, the data received at the destination does not have the same a priori probability. That is because of the error that occurs in the source-to-relay link. Hence, the MAP decoding rule can not be simplified to the maximum likelihood (ML) decoding rule. The results show that the upper bound is very tight. Therefore, the closed form expression of the upper bound can be used to fully study and understand the diversity performance of the DF cooperation protocol. Keywords: Relay Network, Diversity, Decode-and-Forward, MAP Decoder. I. INTRODUCTION Cooperative relaying is gaining a significant attention in that multiple intermediate relay nodes can collaborate with each other to enhance the overall network efficiency. It exploits the physical-layer broadcast property offered by the wireless medium that transmitted signals can be received and processed by any node in the neighborhood of a transmitter. The cooperative relaying approach has a great potential to provide substantial benefits in terms of reliability (diversity gain) [1]-[4] and rate (bandwidth or spectral efficiency)[5]-[7]. These benefits can extend the coverage, reduce network energy consumption, and promote uniform energy drainage by exploiting neighbors’ resources. They can be of great value in many applications, including ad-hoc networks, mesh networks, and next generation wireless local area networks and cellular networks. Through cooperative diversity, relay nodes forward the signal received from the source to propagate redundant signals over multiple paths in the network. This redundancy allows the ultimate receiver to essentially average channel variations resulting from fading, shadowing, and other forms of interference [2]. Several cooperation protocols 138
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME have been proposed in the literature such as amplify-and-forward (AF), decode-and-forward (DF), and amplify forward compress-and-forward (CF) [10, 11]. CF) The error performance of the cooperative communications with decode-anddecode -forward protocol with different combining techniques was investigated in the literature. The end-to-end performance of end end wireless communication systems with relays over Rayleigh-fading channels was studied in [12] when fading the direct link between the source and the destination does not exist. A general framework for ML detection of both coherent and noncoherent uncoded cooperative diversity was presented in [13] where the authors dervived a high SNR approximations based on the closed-form BER expressions. The hors closed form performance of the maximum likelihood decoding for network coded cooperative communication is studiied in [14]. In this paper, we drive a closed from expression for the upper bound on the bit error probability of the decode-and-forward cooperation protocol with MAP decoder. Unlike all previous work, the forward receiver does not use any combining techniques. However, we consider the data received from the consider source together with the data received from the relay node as a codeword. The decoding rule is to find the codeword that maximizes the a posterior probability. The MAP decoding rule is optimal in the sense that is minimizes the end- end error probability. Since the error probability in the -to-end source-to-relay link is not necessarily 0.5 , the codewords received at the destination are not relay equaprobable. Therefore, the MAP decoding rule can not be simplified to the maximum likelihood (ML) decoding rule. We used the closed form expression we derived to find an approximate upper bound at high SNR regime. The approximate upper bound can be used to clearly understand the effect of the SNR of the source-to-relay link on the system diversity. relay The remainder part of this paper is organized as follows. The system model is described in Section II. The MAP decoding scheme is described in Section III. The derivation of the exact upper . . bound on the bit error probability is provided in Section IV. Section V presents numerical results and discussions. Finally, the conclusions are drawn in Section VI. II. SYSTEM MODEL Figure 1: System Model We consider a relay network composed of one source (S), one relay (R), and one destination (D) as shown in Fig. 1. The data transmission occurs over two phases. In the first phase, the source sends its data to the destination. Due to the broadcast nature of the wireless medium, the relay may also of receive the source’s data (possibly with some errors). In the second phase, the relay node decodes the data received from the source and then forwards the decoded data to the destination. We assume that all data are sent using binary phase shift keying (BPSK) modulation scheme and the source generates e its bits with equal probability, i.e., p(bs = 0) = p (bs = 1) = 0.5 where bs is the source’s bit. We assume that all channel are Rayleigh fading channels with additive white Gaussian noise (AWGN). We also assume that each node is equipped with single antenna. 139
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME The signals received at the relay node and the destination in both phases are given by − yr = hsr d srm xs + nr , (1) − y1 = hsd d sdm xs + n1 , (2) − y2 = hrd d rdm xr + n2 , (3) where • yr is the signal received at the relay node in the first phase from the source. • y1 is the signal received at the destination in the first phase from the source. • y2 is the signal received at the destination in the second phase from the relay. • xs ∈{+ Es ,− Es } is the BPSK modulated signal of the source’s bit, bs ∈ {0,1} , where Es is the transmit energy per the source’s bit. • xr ∈ {+ Er ,− Er } is the BPSK modulated signal of the relay’s bit, br ∈ {0,1} , where Er is the transmit energy per the relay’s bit. • hsr , hsd , and hrd are the channel fading gains of the S-R, S-D, and R-D links, respectively. • d sr , d sd , and d rd are the lengths of the S-R, S-D, and R-D links, respectively. • m is the path loss exponent. • nr is the AWGN noise at the relay node which has zero mean and variance N 0 /2 . r • n1 and n2 are independent AWGN noise components at the destination which have zero mean and variance N 0 /2 . The bit br represents an estimate of the source’s bit bs at the relay node and it is given by 0 br =  1 yr ≥ 0 yr < 0 (4) Let the random variable e ∈{0,1} captures the error events on the source-to-relay channel, i.e, br = bs ⊕ e , where “ ⊕ ” denotes the binary “xor” operation. Hence, e = 1 means br ≠ bs , i.e. the source’s bit is received in error at the relay node. In the case of BPSK modulation over flat fading channel with AWGN, the probability of error in the source-relay link, i.e. P(e = 1) , is given by [9] γ sr  1 1 −  2 1 + γ sr  1 = [1 − Γsr ] 2 Pe = sr (5) − where γ sr = d srm Es /N 0 is the average received SNR of the link between the source and the relay and r Γsr = γ sr /(1 + γ sr ) . The received signals at the destination can be written in the matrix form as follows 140
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME y = Hx + n (6) where the received vector y = [ y1 y2 ]T , the transmitted vector x = [ xs xr ]T , the noise vector n = [n1 n2 ]T , and the channel matrix H is given by h d − m H =  sd sd 0     − d rdm   0 hrd (7) III. MAP DECODING In this section, we present the MAP decoding scheme for cooperative communication networks with decode-and-forward cooperation protocol. The MAP decoding scheme is optimal in the sense that it minimizes the error probability. Let b = [bs br ]T denote the transmitted vector where br = bs ⊕ e . This vector takes one of four possible values b1 = [0 0]T , b2 = [11]T , b3 = [0 1]T , and b4 = [1 0]T based on the values bs and e . Since P (e = 1) is not necessarily equal to P(e = 0) , These four vectors are not equaprobable. The probability of transmitting a specific vector bi is given by 1 − Pesr   2 P(bi ) =   Pe  sr  2 i = 1,2 (8) i = 3,4 The MAP decoder finds the transmitted vector bi that maximizes the a posterior probability P(bi | y ) . An estimate of the transmitted vector is calculated as follows b = arg maxb P (b | y ) i i (9) and the maximization process is over the 4 possible vectors. Applying Bayes theorem to (9) yields b = arg maxb i P( y | bi ) P(bi ) P( y ) = arg maxb P( y | bi ) P (bi ) i (10) where P ( y | bi ) = 1 −|| y − Hxi || 2 /N 0 e (πN 0 ) (11) and xi is the modulated vector that corresponds to the vector bi , e.g., x3 = [+ Es − Er ]T . Substituting from (11) into (10) yields 141
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME b = arg maxb i 1 −|| y − Hxi || 2 /N 0 e P (bi ) (πN 0 ) = arg minb (|| y − Hxi || 2 − N 0 log ( P (bi )) ) i (12) IV. PROBABILITY OF BIT ERROR In this section, we derive the upper bound on the bit error probability for the MAP decoding scheme. For mathematical traceability, we assume that the source and the relay node adjust their transmit power such that all signals are received at the destination with the same SNR γ = E/N 0 . This m m can be achieved by choosing E s = d sr E and Er = d rd E . The bit error probability is given by PE ≤ (P(b1 → b2 ) + P(b1 → b4 ) )P(b1 ) + (P (b2 → b1 ) + P (b2 → b3 ) )P(b2 ) (13) + (P(b3 → b2 ) + P(b3 → b4 ) )P(b3 ) + (P(b4 → b1 ) + P(b4 → b3 ) )P(b4 ) where P (bi → b j ) is the pairwise error probability of confusing bi with b j when bi is transmitted and when these are the only two hypothesis. When the vector bi is transmitted, the received vector would be yi = Hxi + n (14) and the probability P (bi → b j ) is given by P(bi → b j ) = P || yi − Hx j || 2 − N 0 log( P(b j )) < || yi − Hxi || 2 − N 0 log( P (bi ))     || H ( xi − x j ) || 2 N 0 P(bi )    = P (< n, H ( xi − x j ) >) > + log (15) 2 2 P(b j )     ( When h = [ hsd hrd ]T is given, < n, H ( xi − x j ) > would be a Gaussian random variable with zero mean and variance N0 || H ( xi − x j ) ||2 . Accordingly, 2  || H ( xi − x j ) || N 0 /2 log(α ij )   P (bi → b j | h) = Q +  || H ( xi − x j ) ||  2N0   (16) where α ij = P (bi )/P (b j ) . From (16), we notice that the probability P (bi → b j ) depends on: 1- The Hamming distance between bi and b j , wij , (i.e., the number of positions at which bi and b j are different); 2- Whether bi and b j have the same probability. Let P (α ij ) = P (bi → b j ) when wij = 1 and P2 = P (bi → b j ) when wij = 2 . From (16), we notice 1 that P2 doesn’t depend on α ij . Hence, substitute from (8) into (13), yield 142
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME ( PE ≤ 2 P2 + [P (α 41 ) + P (α 32 )]Pe + [P (α14 ) + P (α 23 )] 1 − Pe 1 1 1 1 sr sr ) (17) In order to derive P (α ij ) , we consider the case when i = 1 and j = 4 . Substitution in (16) yields 1  log(α14 )  2  P (b1 → b4 | hsr ) = Q 2hsr γ + 2  2 2hsr γ    (18) 2 where γ = E/N 0 . In order to find P (α14 ) , we average (18) over the distribution of hsr . Since all 1 channels have the same distribution, {∀i, j : wij = 1} , we have ∞  log (α ij )   f X ( x)dx P (α ij ) = ∫ Q 2 x + 1  0 2 2x    (19) where f X ( x) = 1 γ e − x/γ (20) Substituting from (20) into (19) with considering Q (u ) = 0.5erfc(u/ 2 ) yields 1 2γ P (α ij ) = 1 ∞  ∫ erfc  0 x+ b  − x/γ e dx x (21) where b = log (α ij )/4 . Integrating (21) using integration by parts where w = erfc( x + b/ x ) , dv = e − x/γ dx , dw = − 1  b  − ( x +b ) 2 /x dx , and v = −γe − x/γ , yields 1 −  e πx  x   b  − x/γ γ  e − − γerfc x + x π   b≥0  I = 1 1 + I1 b < 0 1 P (α ij ) = 1 2γ ∞ ∫ 1  b  − x/γ −( x + b )2 /x  dx  1 − e x  x 0 (22) where I1 = −1 2 π ∫ ∞ 0 1  b  − x/γ − ( x + b ) 2 /x dx 1 − e x  x (23) After some mathematical manipulations, we can write (23) as follows 2 (u + d )  γ d −  − e u du (24) ∫0  1 + γ u    where r = 2b(1 − 1 + 1/γ ) , d = b 1 + 1/γ , and u = x(1 + 1/γ ) . We can write (24) as follows − e −r I1 = 2 π ∞ 1 u 143
  • 7. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME − e −r I1 = 2 π ∫ ∞ 0 1 u  I =  −r 2 − e + I 2 2 (u + d )  γ d −  −1 + + 1 − e u du  1+ γ u   b≥0 b<0 (25) where  I 2 = 1 −    e −r  1+ γ  2 π  γ ∫ 1 − (u e u ∞ 0 + d )2 u du (26) By changing variables, let y = u and dy = dy/(2 u ) . After substitution in (26) we have  I 2 = 1 −   γ  e −r  1+ γ  π   γ = 1 −  1+ γ  ∫ ∞ 0 e  e − (2 d + r )   π   y2 +d −  y  ∫ ∞ 0     2 − y2 − e dy d2 y2 dy (27) Using integration tables to find the integral in (27) yields [8] 1  γ  −4 d −r e  1 −  1+ γ  2   I2 =    1 1 − γ e − r   2 1+ γ     b≥0 (28) b<0 After substituting for the d, r and b , we have 1 1  γ  − 2 (1+  1 − α ij 1+ γ  2  I2 =  1 γ  − 2 (1− 1  1− α ij  2  1+ γ    1+ 1+ 1 γ 1 γ ) α ij ≥ 1 (29) ) α ij < 1 Substituting from (29) into (25) then into (22) yields  1 − Γ − (1+1/ Γ )/2 α ij if α ij ≥ 1  2  P1 (α ij ) =   1 + Γ − (1−1/ Γ )/2 if α ij < 1 1 − 2 α ij  γ (30) In order to derive P2 , we consider the case when i = 1 and j = 2 . Substituting 1+ γ α ij = 1 into (16) yields where Γ = 144
  • 8. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME ( 2 2 P(b1 → b2 | h) = Q 2(hsr + hrd )γ ) (31) 2 2 Averaging (31) over the joint distribution of hsr and hrd yields [9] 2  1 − Γ  1  m + 1 1 + Γ   P2 =   ∑     2  m = 0 m  2  1 1  2 = (1 − Γ ) 1 + Γ  2  2  m (32) It is clear from (5) that if Es ≥ 0 or equivalently 0 ≤ Γsr ≤ 1 then the error probability in the S-R link would be 0 ≤ Pe ≤ 0.5 . Therefore, substitution from (30) and (32) into the right hand side of (17) sr results in the following upper bound    1 − Γsr 1 1  1 2 PUB = (1 − Γ ) 1 + Γ  + (1 − Γsr )1 − Γ 1+ Γ 2  2  2 sr    1− Γ   2Γ        (33) At higher receive SNR’s γ sr and γ , the upper bound of (33) can be approximated as follows PUB ≈ γ 1  1 + 2  4γ  γ sr     (34) V. NUMERICAL RESULTS AND DISCUSSIONS In this section, we present numerical results for both analysis and simulations. 0 10 -1 10 -2 Bit Error Rate BER 10 -3 10 -4 Upper Bound γSR = 0 dB 10 Simulations γSR = 0 dB -5 Upper Bound γSR = 15 dB 10 Simulations γSR = 15 dB -6 10 Upper Bound γSR = 50 dB Simulations γSR = 50 dB -7 10 0 5 10 15 20 Receive SNR at the destination, γ 25 30 Figure 2: Bit error probability versus γ = E/N 0 based on simulations and upper bound 145
  • 9. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME Fig. 2 compares the bit error probability obtained from simulations with the exact upper bound given by (33). The BER is plotted against the receive SNR γ = E/N 0 of S-D and R-D links at different values of the the receive SNR of the S-R link γ sr or equivalently different values of the distance d sr . We found that the derived upper bound is very tight. Therefore, the closed form expression of the upper bound can be used to fully study and understand the diversity performance of the DF cooperation protocol. We also found that the SNR of the S-R link highly affects the end-to-end error rate of the system. At low values of γ sr the error rate of the S-R link Pe would be high and sr accordingly the system does not provide the expected diversity gain. We notice that the diversity gain increases as the value of γ sr increases. 2 1.9 1.8 Diversity Order (L) 1.7 1.6 1.5 1.4 1.3 γ1 = 20 dB 1.2 γ1 = 30 dB γ1 = 40 dB 1.1 γ1 = 50 dB 1 0 10 20 30 40 50 60 70 Receive SNR at the relay, γsr 80 90 100 Figure 3: Diversity gain versus γ sr at different values of γ 1 Since the diversity order is related to the slope of the BER curve with respect to γ and in order to the study the effect of the γ sr on the diversity, let’s define the diversity order L as follows L= log10 PUB (γ 2 ) − log10 PUB (γ 1 ) (γ 2 (dB) − γ 1 (dB))/10 (35) where PUB (γ i ) is the upper bound at γ i and i = 1,2 . The definition of (35) measures the change of exponent of the BER with respect to one decade of the SNR in dB. Fig. 3 shows the diversity order defined in (35) against the receive SNR of the S-R link γ sr at different values of γ 1 where γ 2 = γ 1 + 10 dB. We found that full diversity of 2 is achieved at higher values of γ sr . We also found that at fixed value of γ sr , higher diversity order is achieved at lower values γ , e.g., at γ sr = 40 dB, the diversity order is ≈ 1.7 when γ 1 = 20 dB, and the diversity order is ≈ 1 when γ 1 = 50 dB. This result is consistent with the approximation of (34) where the diversity order is close to 1 when γ > γ sr and close to 2 when γ < γ sr and both of them are high. The intuitive explanation for this phenomenon is that the enhancement of BER performance is dominated by the link with the lower SNR. In other words, the link with the lower SNR is considered as the bottleneck of the BER improvement. Therefore, when γ is small it will be the bottleneck and the BER is proportional to 1/γ 2 . 146
  • 10. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME VI. CONCLUSIONS In this paper, we presented the MAP decoding scheme for the wireless relay network that adopts the decode-and-forward as a cooperation protocol. We derived a closed form expression for the upper bound on the bit error probability. The numerical results show that the upper bound is very tight. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] S. Alam and S. H. Gupta, “Performance analysis of cooperative communication wireless network,” International Journal of Electronics and Communication Engineering and Technology IJECET, pp. 301–309, vol. 3, no. 2, July–September 2012. J. N. Laneman, D.N.C.Tse, G. Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEE Transactions on Information Theory, pp. 3062–3080, Dec. 2004. A. Sendonaris, E. Erkip, B.Azhang, “User cooperation diversity – Part I: System description,” IEEE Transactions on Communications, pp. 1927–1938, Nov. 2003. A. Nosratinia, et al., “Cooperative communication in wireless networks,” IEEE Communications Magazine, pp. 74–80, Oct. 2004. S. W. Kim, “Cooperative spatial multiplexing in mobile ad hoc networks,” Proc. of IEEE International Conference on Mobile Ad hoc and Sensor Systems Conference (MASS,) 2005. Y. Zhang, G. Wang, M. G. Amin, “Cooperative spatial multiplexing in multi-hop wireless networks,” Proc. of IEEE ICASSP06, pp. IV821–IV824, May 2006. A. Host-Madsen and A. Nosratinia, “The multiplexing gain of wireless networks,” Proc. of IEEE International Symposium on Information Theory, 2005. I.S.Gradshteyn and I.M.Ryzhik, Tables of Integrals, Series, and Products, pp.341, Eq. 3.472, Academic Press, 1980. Andrea Goldsmith, Wireless communications, Cambridge University Press , 2005. T. M. Cover, A. A. El Gamal, “Capacity theorems for the relay channel”, IEEE Transactions on Information Theory, vol. IT-25, No 5, pp 572-584, Sept. 1979. A.D. Wyner, “The rate-distortion function for source coding with side information at the decoder –II: General Sources”, Information and Control, Vol 38, pp 60-80, 1978. Mazen O. Hasna and Mohamed S. Alouini, “End-to-end performance of transmission systems with relays over Rayleigh-fading channels,” IEEE Trans. Wireless Commun., vol. 2, no. 6, pp. 1126–1131, Nov. 2003. D. Chen and J. N. Laneman, “Modulation and demodulation for cooperative diversity in wireless systems,” IEEE Trans. Wireless Commun., vol. 5, no. 7, pp. 1785–1794, Jul. 2006. Taha Khalaf, “Performance of Maximum Likelihood Decoder in Network Coded Cooperative Communications,” IEEE Wireless Days Conference, Valencia, Spain, Nov. 2013. 147