45 research outputs found

    PEMBANGKITAN DATA ACAK TERSEBAR DIRECT SEQUENCE SPREAD SPECTRUM PADA LAJU DATA BERKECEPATAN RENDAH UNTUK APLIKASI TEKNOLOGI CODE DIVISION MULTIPLE ACCESS

    Get PDF
    Salah satu kelebihan utama sistem komunikasi Spread Spectrum adalah kemampuannya mengirimkan data informasi disertai kode-kode unik sehingga hanya perangkat penerima tertentu saya yang mampu mendeteksinya. Sangat banyak metode pembangkitan kode unik pada spread spectrum ini yang mana salah satunya adalah direct sequence. Penerapan metode ini banyak direalisasikan pada teknologi CDMA dikarenakan kesederhanaan rancangan dan relatif mudah dalam menganalisis karakteristik kerja sistemnya terutama bagian sebaran kode unik pada sebuah lebar pita transmisi radio. Sumber kode unik dalam penelitian ini berasal dari data acak yang dihasilkan oleh pembangkit derau semu atau pseudo noise generator melalui pengaturan panjang kodenya sebesar 16 dengan tingkat kestabilan frekuensi sistem pembangkit kode unik dan frekuensi pembawa masing-masing sebesar 15,020 kHz dan 499,9419 kHz dimana keduanya ini masing-masing menghasilkan nilai persen kesalahannya sebesar 0,0412 % dan 0,000049 % sehingga dampaknya masih cukup baik bagi metode ini apabila diimplementasikan pada teknologi CDMA khususnya diperuntukan untuk laju kecepatan data rendah.

    Adaptive implementation of turbo multi-user detection architecture

    Get PDF
    MULTI-access techniques have been adopted widely for communications in underwater acoustic channels, which present many challenges to the development of reliable and practical systems. In such an environment, the unpredictable and complex ocean conditions cause the acoustic waves to be affected by many factors such as limited bandwidth, large propagation losses, time variations and long latency, which limit the usefulness of such techniques. Additionally, multiple access interference (MAI) signals and poor estimation of the unknown channel parameters in the presence of limited training sequences are two of the major problems that degrade the performance of such technologies. In this thesis, two different single-element multi-access schemes, interleave division multiple access (IDMA) and code division multiple access (CDMA), employing decision feedback equalization (DFE) and soft Rake-based architectures, are proposed for multi-user underwater communication applications. By using either multiplexing pilots or continuous pilots, these adaptive turbo architectures with carrier phase tracking are jointly optimized based on the minimum mean square error (MMSE) criterion and adapted iteratively by exchanging soft information in terms of Log-Likelihood Ratio (LLR) estimates with the single-user’s channel decoders. The soft-Rake receivers utilize developed channel estimation and the detection is implemented using parallel interference cancellation (PIC) to remove MAI effects between users. These architectures are investigated and applied to simulated data and data obtained from realistic underwater communication trials using off-line processing of signals acquired during sea-trials in the North Sea. The results of different scenarios demonstrate the penalty in performance as the fading induces irreducible error rates that increase with channel delay spread and emphasize the benefits of using coherent direct adaptive receivers in such reverberant channels. The convergence behaviour of the detectors is evaluated using EXIT chart analyses and issues such as the adaptation parameters and their effects on the performance are also investigated. However, in some cases the receivers with partial knowledge of the interleavers’ patterns or codes can still achieve performance comparable to those with full knowledge. Furthermore, the thesis describes implementation issues of these algorithms using digital signal processors (DSPs), such as computational complexity and provides valuable guidelines for the design of real time underwater communication systems.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Adaptive implementation of turbo multi-user detection architecture

    Get PDF
    MULTI-access techniques have been adopted widely for communications in underwater acoustic channels, which present many challenges to the development of reliable and practical systems. In such an environment, the unpredictable and complex ocean conditions cause the acoustic waves to be affected by many factors such as limited bandwidth, large propagation losses, time variations and long latency, which limit the usefulness of such techniques. Additionally, multiple access interference (MAI) signals and poor estimation of the unknown channel parameters in the presence of limited training sequences are two of the major problems that degrade the performance of such technologies. In this thesis, two different single-element multi-access schemes, interleave division multiple access (IDMA) and code division multiple access (CDMA), employing decision feedback equalization (DFE) and soft Rake-based architectures, are proposed for multi-user underwater communication applications. By using either multiplexing pilots or continuous pilots, these adaptive turbo architectures with carrier phase tracking are jointly optimized based on the minimum mean square error (MMSE) criterion and adapted iteratively by exchanging soft information in terms of Log-Likelihood Ratio (LLR) estimates with the single-user’s channel decoders. The soft-Rake receivers utilize developed channel estimation and the detection is implemented using parallel interference cancellation (PIC) to remove MAI effects between users. These architectures are investigated and applied to simulated data and data obtained from realistic underwater communication trials using off-line processing of signals acquired during sea-trials in the North Sea. The results of different scenarios demonstrate the penalty in performance as the fading induces irreducible error rates that increase with channel delay spread and emphasize the benefits of using coherent direct adaptive receivers in such reverberant channels. The convergence behaviour of the detectors is evaluated using EXIT chart analyses and issues such as the adaptation parameters and their effects on the performance are also investigated. However, in some cases the receivers with partial knowledge of the interleavers’ patterns or codes can still achieve performance comparable to those with full knowledge. Furthermore, the thesis describes implementation issues of these algorithms using digital signal processors (DSPs), such as computational complexity and provides valuable guidelines for the design of real time underwater communication systems.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Digital watermark technology in security applications

    Get PDF
    With the rising emphasis on security and the number of fraud related crimes around the world, authorities are looking for new technologies to tighten security of identity. Among many modern electronic technologies, digital watermarking has unique advantages to enhance the document authenticity. At the current status of the development, digital watermarking technologies are not as matured as other competing technologies to support identity authentication systems. This work presents improvements in performance of two classes of digital watermarking techniques and investigates the issue of watermark synchronisation. Optimal performance can be obtained if the spreading sequences are designed to be orthogonal to the cover vector. In this thesis, two classes of orthogonalisation methods that generate binary sequences quasi-orthogonal to the cover vector are presented. One method, namely "Sorting and Cancelling" generates sequences that have a high level of orthogonality to the cover vector. The Hadamard Matrix based orthogonalisation method, namely "Hadamard Matrix Search" is able to realise overlapped embedding, thus the watermarking capacity and image fidelity can be improved compared to using short watermark sequences. The results are compared with traditional pseudo-randomly generated binary sequences. The advantages of both classes of orthogonalisation inethods are significant. Another watermarking method that is introduced in the thesis is based on writing-on-dirty-paper theory. The method is presented with biorthogonal codes that have the best robustness. The advantage and trade-offs of using biorthogonal codes with this watermark coding methods are analysed comprehensively. The comparisons between orthogonal and non-orthogonal codes that are used in this watermarking method are also made. It is found that fidelity and robustness are contradictory and it is not possible to optimise them simultaneously. Comparisons are also made between all proposed methods. The comparisons are focused on three major performance criteria, fidelity, capacity and robustness. aom two different viewpoints, conclusions are not the same. For fidelity-centric viewpoint, the dirty-paper coding methods using biorthogonal codes has very strong advantage to preserve image fidelity and the advantage of capacity performance is also significant. However, from the power ratio point of view, the orthogonalisation methods demonstrate significant advantage on capacity and robustness. The conclusions are contradictory but together, they summarise the performance generated by different design considerations. The synchronisation of watermark is firstly provided by high contrast frames around the watermarked image. The edge detection filters are used to detect the high contrast borders of the captured image. By scanning the pixels from the border to the centre, the locations of detected edges are stored. The optimal linear regression algorithm is used to estimate the watermarked image frames. Estimation of the regression function provides rotation angle as the slope of the rotated frames. The scaling is corrected by re-sampling the upright image to the original size. A theoretically studied method that is able to synchronise captured image to sub-pixel level accuracy is also presented. By using invariant transforms and the "symmetric phase only matched filter" the captured image can be corrected accurately to original geometric size. The method uses repeating watermarks to form an array in the spatial domain of the watermarked image and the the array that the locations of its elements can reveal information of rotation, translation and scaling with two filtering processes

    Investigation of the impact of fibre impairments and SOA-based devices on 2D-WH/TS OCDMA codes

    Get PDF
    In seeking efficient last-mile solutions for high-capacity, optical code division multiple access (OCDMA) emerges as a promising alternative high-speed optical network that can securely support a multitude of simultaneous users without requiring extensive equipment. This multiplexing technique has recently been the subject of comprehensive research, highlighting its potential for facilitating high-bandwidth multi-access networking. When contrasted with techniques such as wavelength division multiplexing (WDM) and optical time division multiplexing (OTDM), OCDMA offers a more effective and equitable split of available fibre bandwidth among the users. This thesis presents my research focused on the incoherent OCDMA under the influence of optical fibre impairments that uses picosecond multiwavelength pulses to form two-dimensional wavelength hopping time-spreading (2D-WH/TS) incoherent OCDMA codes. In particular, self-phase modulation, temperature induced fibre dispersion, chromatic dispersion, as well as the impact of semiconductor optical amplifier SOA devices deployment on 2D-WH/TS OCDMA code integrity were investigated. These aspects were investigated using a 17-km long bidirectional fibre link between Strathclyde and Glasgow University. In particular, I investigated the impact of temporal skewing among OCDMA code carriers and the importance of selecting small range of wavelengths as code carriers where wide range manifest high dependency on wavelength. This wavelength dependency is exploited furthermore to measure the induced temperature dispersion coefficient accurately and economically. I have conducted experiments to characterise the impact of SOA-device on 2D OCDMA code carries which is evaluated under different bias conditions. This evaluation addressed the potential challenges and ramifications of the gain recovery time of SOA and its wavelength dependency with respect to gain ratio and self-phase modulation (SPM). The OCDMA code was built using multiplexers and delay lines to create a 2D OCDMA code to allow studying the impact of deploying a SOA under different conditions on each wavelength. The concept described above is then extended to the investigation of the SOA’s impact on a 2D-WH/TS OCDMA prime code under high bias current/gain conditions. The overall performance of two different 2D-WH/TS OCDMA systems deploying the SOA was also calculated. I have also investigated the possibility of manipulating chirp in 2D-WH/TS incoherent OCDMA to counteract the self-phase modulation-induced red shift by using single mode fibre and lithium crystals. I have investigated the performance of the picosecond code based optical signal when subjected to temperature variations similar to that experience by most buried fibre systems. I have proposed and demonstrated a novel technique, which I examined analytically and experimentally, that utilises a SOA at the transmitter to create a new code with a new wavelength hopping and spreading time sequences to achieve a unique physical improved secure incoherent OCDMA communication method. A novel fully automated tuneable compensation testbed is also proposed of an autonomous dispersion management in a WH/TS incoherent OCDMA system. The system proposed manipulates the chirp of OCDMA code carriers to limit chromatic dispersion detrimental effect on transmission systems.In seeking efficient last-mile solutions for high-capacity, optical code division multiple access (OCDMA) emerges as a promising alternative high-speed optical network that can securely support a multitude of simultaneous users without requiring extensive equipment. This multiplexing technique has recently been the subject of comprehensive research, highlighting its potential for facilitating high-bandwidth multi-access networking. When contrasted with techniques such as wavelength division multiplexing (WDM) and optical time division multiplexing (OTDM), OCDMA offers a more effective and equitable split of available fibre bandwidth among the users. This thesis presents my research focused on the incoherent OCDMA under the influence of optical fibre impairments that uses picosecond multiwavelength pulses to form two-dimensional wavelength hopping time-spreading (2D-WH/TS) incoherent OCDMA codes. In particular, self-phase modulation, temperature induced fibre dispersion, chromatic dispersion, as well as the impact of semiconductor optical amplifier SOA devices deployment on 2D-WH/TS OCDMA code integrity were investigated. These aspects were investigated using a 17-km long bidirectional fibre link between Strathclyde and Glasgow University. In particular, I investigated the impact of temporal skewing among OCDMA code carriers and the importance of selecting small range of wavelengths as code carriers where wide range manifest high dependency on wavelength. This wavelength dependency is exploited furthermore to measure the induced temperature dispersion coefficient accurately and economically. I have conducted experiments to characterise the impact of SOA-device on 2D OCDMA code carries which is evaluated under different bias conditions. This evaluation addressed the potential challenges and ramifications of the gain recovery time of SOA and its wavelength dependency with respect to gain ratio and self-phase modulation (SPM). The OCDMA code was built using multiplexers and delay lines to create a 2D OCDMA code to allow studying the impact of deploying a SOA under different conditions on each wavelength. The concept described above is then extended to the investigation of the SOA’s impact on a 2D-WH/TS OCDMA prime code under high bias current/gain conditions. The overall performance of two different 2D-WH/TS OCDMA systems deploying the SOA was also calculated. I have also investigated the possibility of manipulating chirp in 2D-WH/TS incoherent OCDMA to counteract the self-phase modulation-induced red shift by using single mode fibre and lithium crystals. I have investigated the performance of the picosecond code based optical signal when subjected to temperature variations similar to that experience by most buried fibre systems. I have proposed and demonstrated a novel technique, which I examined analytically and experimentally, that utilises a SOA at the transmitter to create a new code with a new wavelength hopping and spreading time sequences to achieve a unique physical improved secure incoherent OCDMA communication method. A novel fully automated tuneable compensation testbed is also proposed of an autonomous dispersion management in a WH/TS incoherent OCDMA system. The system proposed manipulates the chirp of OCDMA code carriers to limit chromatic dispersion detrimental effect on transmission systems

    Mobile and Wireless Communications

    Get PDF
    Mobile and Wireless Communications have been one of the major revolutions of the late twentieth century. We are witnessing a very fast growth in these technologies where mobile and wireless communications have become so ubiquitous in our society and indispensable for our daily lives. The relentless demand for higher data rates with better quality of services to comply with state-of-the art applications has revolutionized the wireless communication field and led to the emergence of new technologies such as Bluetooth, WiFi, Wimax, Ultra wideband, OFDMA. Moreover, the market tendency confirms that this revolution is not ready to stop in the foreseen future. Mobile and wireless communications applications cover diverse areas including entertainment, industrialist, biomedical, medicine, safety and security, and others, which definitely are improving our daily life. Wireless communication network is a multidisciplinary field addressing different aspects raging from theoretical analysis, system architecture design, and hardware and software implementations. While different new applications are requiring higher data rates and better quality of service and prolonging the mobile battery life, new development and advanced research studies and systems and circuits designs are necessary to keep pace with the market requirements. This book covers the most advanced research and development topics in mobile and wireless communication networks. It is divided into two parts with a total of thirty-four stand-alone chapters covering various areas of wireless communications of special topics including: physical layer and network layer, access methods and scheduling, techniques and technologies, antenna and amplifier design, integrated circuit design, applications and systems. These chapters present advanced novel and cutting-edge results and development related to wireless communication offering the readers the opportunity to enrich their knowledge in specific topics as well as to explore the whole field of rapidly emerging mobile and wireless networks. We hope that this book will be useful for students, researchers and practitioners in their research studies

    Contribution to the construction of fingerprinting and watermarking schemes to protect mobile agents and multimedia content

    Get PDF
    The main characteristic of fingerprinting codes is the need of high error-correction capacity due to the fact that they are designed to avoid collusion attacks which will damage many symbols from the codewords. Moreover, the use of fingerprinting schemes depends on the watermarking system that is used to embed the codeword into the content and how it honors the marking assumption. In this sense, even though fingerprinting codes were mainly used to protect multimedia content, using them on software protection systems seems an option to be considered. This thesis, studies how to use codes which have iterative-decoding algorithms, mainly turbo-codes, to solve the fingerprinting problem. Initially, it studies the effectiveness of current approaches based on concatenating tradicioanal fingerprinting schemes with convolutional codes and turbo-codes. It is shown that these kind of constructions ends up generating a high number of false positives. Even though this thesis contains some proposals to improve these schemes, the direct use of turbo-codes without using any concatenation with a fingerprinting code as inner code has also been considered. It is shown that the performance of turbo-codes using the appropiate constituent codes is a valid alternative for environments with hundreds of users and 2 or 3 traitors. As constituent codes, we have chosen low-rate convolutional codes with maximum free distance. As for how to use fingerprinting codes with watermarking schemes, we have studied the option of using watermarking systems based on informed coding and informed embedding. It has been discovered that, due to different encodings available for the same symbol, its applicability to embed fingerprints is very limited. On this sense, some modifications to these systems have been proposed in order to properly adapt them to fingerprinting applications. Moreover the behavior and impact over a video produced as a collusion of 2 users by the YouTube’s s ervice has been s tudied. We have also studied the optimal parameters for viable tracking of users who have used YouTube and conspired to redistribute copies generated by a collusion attack. Finally, we have studied how to implement fingerprinting schemes and software watermarking to fix the problem of malicious hosts on mobile agents platforms. In this regard, four different alternatives have been proposed to protect the agent depending on whether you want only detect the attack or avoid it in real time. Two of these proposals are focused on the protection of intrusion detection systems based on mobile agents. Moreover, each of these solutions has several implications in terms of infrastructure and complexity.Els codis fingerprinting es caracteritzen per proveir una alta capacitat correctora ja que han de fer front a atacs de confabulació que malmetran una part important dels símbols de la paraula codi. D'atra banda, la utilització de codis de fingerprinting en entorns reals està subjecta a que l'esquema de watermarking que gestiona la incrustació sigui respectuosa amb la marking assumption. De la mateixa manera, tot i que el fingerprinting neix de la protecció de contingut multimèdia, utilitzar-lo en la protecció de software comença a ser una aplicació a avaluar. En aquesta tesi s'ha estudiat com aplicar codis amb des codificació iterativa, concretament turbo-codis, al problema del rastreig de traïdors en el context del fingerprinting digital. Inicialment s'ha qüestionat l'eficàcia dels enfocaments actuals en la utilització de codis convolucionals i turbo-codis que plantegen concatenacions amb esquemes habituals de fingerprinting. S'ha demostrat que aquest tipus de concatenacions portaven, de forma implícita, a una elevada probabilitat d'inculpar un usuari innocent. Tot i que s'han proposat algunes millores sobre aquests esquemes , finalment s'ha plantejat l'ús de turbocodis directament, evitant així la concatenació amb altres esquemes de fingerprinting. S'ha demostrat que, si s'utilitzen els codis constituents apropiats, el rendiment del turbo-descodificador és suficient per a ser una alternativa aplicable en entorns amb varis centenars d'usuaris i 2 o 3 confabuladors . Com a codis constituents s'ha optat pels codis convolucionals de baix ràtio amb distància lliure màxima. Pel que fa a com utilitzar els codis de fingerprinting amb esquemes de watermarking, s'ha estudiat l'opció d'utilitzar sistemes de watermarking basats en la codificació i la incrustació informada. S'ha comprovat que, degut a la múltiple codificació del mateix símbol, la seva aplicabilitat per incrustar fingerprints és molt limitada. En aquest sentit s'ha plantejat algunes modificacions d'aquests sistemes per tal d'adaptar-los correctament a aplicacions de fingerprinting. D'altra banda s'ha avaluat el comportament i l'impacte que el servei de YouTube produeix sobre un vídeo amb un fingerprint incrustat. A més , s'ha estudiat els paràmetres òptims per a fer viable el rastreig d'usuaris que han confabulat i han utilitzat YouTube per a redistribuir la copia fruït de la seva confabulació. Finalment, s'ha estudiat com aplicar els esquemes de fingerprinting i watermarking de software per solucionar el problema de l'amfitrió maliciós en agents mòbils . En aquest sentit s'han proposat quatre alternatives diferents per a protegir l'agent en funció de si és vol només detectar l'atac o evitar-lo en temps real. Dues d'aquestes propostes es centren en la protecció de sistemes de detecció d'intrusions basats en agents mòbils. Cadascuna de les solucions té diverses implicacions a nivell d'infrastructura i de complexitat.Postprint (published version

    Destination Cooperation in Interference Channels

    Get PDF
    Multiple Input Multiple Output (MIMO) techniques are used to exploit spatial diversity and to achieve high bit rates required for emerging multimedia applications. To achieve this spatial diversity, more than one antenna have to be collocated at the transmitter and/or receiver nodes and the separation between those antenna has to be more than half a wavelength to ensure that the signals will experience different channel fading coefficients. One major drawback of this technique which makes it almost impossible to implement on handheld devices is the dimension of these devices. Cooperative communication can be used to achieve the diversity gains typical of MIMO without the need for multiple antennas on the mobile units. Diversity is attained through collaboration between nodes in the wireless network. In wireless communications, cooperative diversity improves throughput and reliability. To effectively combat multipath fading in wireless networks, we develop energy efficient protocols that employ some cooperation among receiving nodes. Motivated by the very promising results of cooperative diversity for both uncoded and coded systems as well as the substantial demand for higher data rates; in this thesis, we investigate the 2-user and 3-user destination cooperation in interference channels. We develop a collaboration protocol for the 2-user and 3-user models which is based on the fact that the information presents at one destination node can help in increasing the chance of correctly decoding the previously not decodable information at another destination node. Furthermore, we introduce network coding in the 3-user model and we show that network coding achieves further substantial gain. We demonstrate that the 2-user case outperforms the baseline scheme using orthogonal channels by far. This is due to the cooperative communication. In the cooperative scheme, the receiver nodes in the first time slot, decode the received information from both sources while in the second time slot they cooperate. The scheme provides both diversity and coding gain. Furthermore, we show that an enhanced scheme which exploits the unused information available at each destination node improves the outage probability. We present the simulation results of various scenarios that illustrate the efficiency of employing such techniques with and without channel coding. We show how the SNR required for obtaining a certain frame error rate varies with the distance between destination nodes. We also show a comparable analysis between the 2-user and 3-user destination cooperation in interference channels on one hand and the baseline orthogonal scheme on the other hand

    An Investigation of Orthogonal Wavelet Division Multiplexing Techniques as an Alternative to Orthogonal Frequency Division Multiplex Transmissions and Comparison of Wavelet Families and Their Children

    Get PDF
    Recently, issues surrounding wireless communications have risen to prominence because of the increase in the popularity of wireless applications. Bandwidth problems, and the difficulty of modulating signals across carriers, represent significant challenges. Every modulation scheme used to date has had limitations, and the use of the Discrete Fourier Transform in OFDM (Orthogonal Frequency Division Multiplex) is no exception. The restriction on further development of OFDM lies primarily within the type of transform it uses in the heart of its system, Fourier transform. OFDM suffers from sensitivity to Peak to Average Power Ratio, carrier frequency offset and wasting some bandwidth to guard successive OFDM symbols. The discovery of the wavelet transform has opened up a number of potential applications from image compression to watermarking and encryption. Very recently, work has been done to investigate the potential of using wavelet transforms within the communication space. This research will further investigate a recently proposed, innovative, modulation technique, Orthogonal Wavelet Division Multiplex, which utilises the wavelet transform opening a new avenue for an alternative modulation scheme with some interesting potential characteristics. Wavelet transform has many families and each of those families has children which each differ in filter length. This research consider comprehensively investigates the new modulation scheme, and proposes multi-level dynamic sub-banding as a tool to adapt variable signal bandwidths. Furthermore, all compactly supported wavelet families and their associated children of those families are investigated and evaluated against each other and compared with OFDM. The linear computational complexity of wavelet transform is less than the logarithmic complexity of Fourier in OFDM. The more important complexity is the operational complexity which is cost effectiveness, such as the time response of the system, the memory consumption and the number of iterative operations required for data processing. Those complexities are investigated for all available compactly supported wavelet families and their children and compared with OFDM. The evaluation reveals which wavelet families perform more effectively than OFDM, and for each wavelet family identifies which family children perform the best. Based on these results, it is concluded that the wavelet modulation scheme has some interesting advantages over OFDM, such as lower complexity and bandwidth conservation of up to 25%, due to the elimination of guard intervals and dynamic bandwidth allocation, which result in better cost effectiveness
    corecore