Abstract: Recent research result has shown that two multidelay
feedback systems can synchronize each other under different
schemes, i.e. lag, projective-lag, anticipating, or projectiveanticipating
synchronization. There, the driving signal is significantly
complex due that it is constituted by multiple nonlinear transformations
of delayed state variable. In this paper, a secure communication
model is proposed based on synchronization of coupled multidelay
feedback systems, in which the plain signal is mixed with a complex
signal at the transmitter side and it is precisely retrieved at the receiver
side. The effectiveness of the proposed model is demonstrated and
verified in the specific example, where the message signal is masked
directly by the complex signal and security is examined under the
breaking method of power spectrum analysis.
Abstract: In this paper we proposed the use of Huffman
coding to reduce the PAR of an OFDM system as a distortionless
scrambling technique, and we utilize the amount saved in the
total bit rate by the Huffman coding to send the encoding table
for accurate decoding at the receiver without reducing the
effective throughput. We found that the use of Huffman coding
reduces the PAR by about 6 dB. Also we have investigated the
effect of PAR reduction due to Huffman coding through testing
the spectral spreading and the inband distortion due to HPA with
different IBO values. We found a complete match of our
expectation from the proposed solution with the obtained
simulation results.
Abstract: Orthogonal Frequency Division Multiplexing
(OFDM) is an efficient method of data transmission for high speed
communication systems. However, the main drawback of OFDM
systems is that, it suffers from the problem of high Peak-to-Average
Power Ratio (PAPR) which causes inefficient use of the High Power
Amplifier and could limit transmission efficiency. OFDM consist of
large number of independent subcarriers, as a result of which the
amplitude of such a signal can have high peak values. In this paper,
we propose an effective reduction scheme that combines DCT and
SLM techniques. The scheme is composed of the DCT followed by
the SLM using the Riemann matrix to obtain phase sequences for the
SLM technique. The simulation results show PAPR can be greatly
reduced by applying the proposed scheme. In comparison with
OFDM, while OFDM had high values of PAPR –about 10.4dB our
proposed method achieved about 4.7dB reduction of the PAPR with
low complexities computation. This approach also avoids
randomness in phase sequence selection, which makes it simpler to
decode at the receiver. As an added benefit, the matrices can be
generated at the receiver end to obtain the data signal and hence it is
not required to transmit side information (SI).
Abstract: The study in this paper underlines the importance of
correct joint selection of the spreading codes for uplink of multicarrier
code division multiple access (MC-CDMA) at the transmitter
side and detector at the receiver side in the presence of nonlinear
distortion due to high power amplifier (HPA). The bit error rate
(BER) of system for different spreading sequences (Walsh code, Gold
code, orthogonal Gold code, Golay code and Zadoff-Chu code) and
different kinds of receivers (minimum mean-square error receiver
(MMSE-MUD) and microstatistic multi-user receiver (MSF-MUD))
is compared by means of simulations for MC-CDMA transmission
system. Finally, the results of analysis will show, that the application
of MSF-MUD in combination with Golay codes can outperform
significantly the other tested spreading codes and receivers for all
mostly used models of HPA.
Abstract: Smart Dust particles, are small smart materials used for generating weather maps. We investigate question of the optimal number of Smart Dust particles necessary for generating precise, computationally feasible and cost effective 3–D weather maps. We also give an optimal matching algorithm for the generalized scenario, when there are N Smart Dust particles and M ground receivers.
Abstract: Using mini modules of Tmotes, it is possible to automate a small personal area network. This idea can be extended to large networks too by implementing multi-hop routing. Linking the various Tmotes using Programming languages like Nesc, Java and having transmitter and receiver sections, a network can be monitored. It is foreseen that, depending on the application, a long range at a low data transfer rate or average throughput may be an acceptable trade-off. To reduce the overall costs involved, an optimum number of Tmotes to be used under various conditions (Indoor/Outdoor) is to be deduced. By analyzing the data rates or throughputs at various locations of Tmotes, it is possible to deduce an optimal number of Tmotes for a specific network. This paper deals with the determination of optimum distances to reduce the cost and increase the reliability of the entire sensor network with Wireless Local Loop (WLL) capability.
Abstract: Recently, as information industry and mobile
communication technology are developing, this study is conducted on
the new concept of intelligent structures and maintenance techniques
that applied wireless sensor network, USN (Ubiquitous Sensor
Network), to social infrastructures such as civil and architectural
structures on the basis of the concept of Ubiquitous Computing that
invisibly provides human life with computing, along with mutually
cooperating, compromising and connecting networks each other by
having computers within all objects around us.
Therefore, the purpose of this study is to investigate the capability
of wireless communication of sensor node embedded in reinforced
concrete structure with a basic experiment on an electric wave
permeability of sensor node by fabricating molding with variables of
concrete thickness and steel bars that are mostly used in constructing
structures to determine the feasibility of application to constructing
structures with USN.
At this time, with putting the pitches of steel bars, the thickness of
concrete placed, and the intensity of RF signal of a
transmitter-receiver as variables and when wireless communication
module was installed inside, the possible communication distance of
plain concrete and the possible communication distance by the pitches
of steel bars was measured in the horizontal and vertical direction
respectively. Besides, for the precise measurement of diminution of an
electric wave, the magnitude of an electric wave in the range of used
frequencies was measured by using Spectrum Analyzer. The
phenomenon of diminution of an electric wave was numerically
analyzed and the effect of the length of wavelength of frequencies was
analyzed by the properties of a frequency band area.
As a result of studying the feasibility of an application to
constructing structures with wireless sensor, in case of plain concrete,
it shows 45cm for the depth of permeability and in case of reinforced
concrete with the pitches of 5cm, it shows 37cm and 45cm for the
pitches of 15cm.
Abstract: In recent years, everything is trending toward digitalization
and with the rapid development of the Internet technologies,
digital media needs to be transmitted conveniently over the network.
Attacks, misuse or unauthorized access of information is of great
concern today which makes the protection of documents through
digital media a priority problem. This urges us to devise new data
hiding techniques to protect and secure the data of vital significance.
In this respect, steganography often comes to the fore as a tool for
hiding information. Steganography is a process that involves hiding
a message in an appropriate carrier like image or audio. It is of
Greek origin and means "covered or hidden writing". The goal of
steganography is covert communication. Here the carrier can be sent
to a receiver without any one except the authenticated receiver only
knows existence of the information. Considerable amount of work
has been carried out by different researchers on steganography. In this
work the authors propose a novel Steganographic method for hiding
information within the spatial domain of the gray scale image. The
proposed approach works by selecting the embedding pixels using
some mathematical function and then finds the 8 neighborhood of
the each selected pixel and map each bit of the secret message in
each of the neighbor pixel coordinate position in a specified manner.
Before embedding a checking has been done to find out whether the
selected pixel or its neighbor lies at the boundary of the image or not.
This solution is independent of the nature of the data to be hidden
and produces a stego image with minimum degradation.
Abstract: A new digital transceiver circuit for asynchronous frame detection is proposed where both the transmitter and receiver contain all digital components, thereby avoiding possible use of conventional devices like monostable multivibrators with unstable external components such as resistances and capacitances. The proposed receiver circuit, in particular, uses a combinational logic block yielding an output which changes its state as soon as the start bit of a new frame is detected. This, in turn, helps in generating an efficient receiver sampling clock. A data latching circuit is also used in the receiver to latch the recovered data bits in any new frame. The proposed receiver structure is also extended from 4- bit information to any general n data bits within a frame with a common expression for the output of the combinational logic block. Performance of the proposed hardware design is evaluated in terms of time delay, reliability and robustness in comparison with the standard schemes using monostable multivibrators. It is observed from hardware implementation that the proposed circuit achieves almost 33 percent speed up over any conventional circuit.
Abstract: In this paper, we propose a chaotic cipher system consisting of Improved Volterra Filters and the mapping that is created from the actual voice by using Radial Basis Function Network. In order to achieve a practical system, the system supposes to use the digital communication line, such as the Internet, to maintain the parameter matching between the transmitter and receiver sides. Therefore, in order to withstand the attack from outside, it is necessary that complicate the internal state and improve the sensitivity coefficient. In this paper, we validate the robustness of proposed method from three perspectives of "Chaotic properties", "Randomness", "Coefficient sensitivity".