Version-3 (Jan-Feb 2015)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Smartphone Based Sensing Driver Behavior Modeling |
Country | : | India |
Authors | : | Rachana Daigavane || Prof. S.S.Wankhede |
Abstract: Driving style can characteristically be split into two categories: "typical" (non-aggressive) and aggressive. Apprehension and recognizing driving consequence that fall into these categories can help in vehicle safety systems. Potentially-aggressive driver behavior is presently a leading cause of traffic in a city area. Mostly, drivers are incognizant that they give potentially-aggressive activity everyday. A quantity that is added to awareness and encourage driver safety, we are proposing a fresh system that uses detection system and control of the vehicle. The research work that we are going to do is the detection and its online transmission over the network.
Keywords: ARM-7,Driver-behaviour,safety,Reckless behavior.
[1]. Department for Transport, "Reported road casualties Great Britain: 2008 Annual Report", London, The Stationery Office, 2009.
[2]. D. G. Kidd, and W. J. Horrey, "Do drivers' estimates of distraction become calibrated to their actual distracted driving performance with greater exposure?", in TRB the 88th Annual Meeting Compendium, Washington D.C., January, 2009.
[3]. W. J. Horrey, M. F. Lesch, and A. Garabet, "Dissociation between driving performance and drivers' subjective estimates of performance and workload in dual-task conditions", Journal of safety research, vol. 40, 2009, pp. 7-12.
[4]. M. A. Recarte, E. Perez, A. Conchillo, and L. M. Nunes, "Mental workload and visual impairment: Differences between pupil, blink, and subjective rating", The Spanish Journal of Psychology, vol. 11, no. 2, 2008, pp. 374-385.
[5]. L. Bergasa, J. Nuevo, M. Sotelo, R. Barea, and M. Lopez, "Real-time system for monitoring driver vigilance," IEEE Trans. Intell. Transp. Syst., vol. 7, no. 1, pp. 63–77, Mar. 2006.
[6]. T. Toledo, O. Musicant, and T. Lotan, "In-vehicle data recorders for mon- itoring and feedback on drivers' behavior," Transp. Res. Part C, Emerging Technol., vol. 16, no. 3, pp. 320–331, Jun. 2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Cooperative Data Forwarding In AODV Routing Protocol |
Country | : | India |
Authors | : | Sarath Menon || Mr. Jose Anand |
Abstract: A Wireless sensor Network uses thousands of miniature devices that communicate among each other and sense data from the environment. The success of the communication in a WSN inherently lies in the routing protocol used by the architecture. This work enables reliable communication for Reactive Routing Protocol such as, Ad hoc On-demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) in Wireless Sensor Networks. These protocols are on-demand routing protocols and has the capability to only detect Link Failures. This hampers the packet delivery ratio and increases the end-to-end delay. AODV Protocol when faced with a link failure condition has the source node reinitiate the route discovery phase by broadcasting Route Request Messages to its neighbours without considering the affected link. The system calls for a Reliable Reactive Routing Enhancement (R3E) as an extension over the AODV protocol. Here the nodes maintain a list of forwarding candidates and their priorities with the help of routing table enabling forwarding of data towards destination as per node priority and thereby removing the need for re-initiation of route discovery phase. Thus R3E successfully augments the aforementioned AODV protocol, thereby improving the packet delivery ratio and also achieving a significant reduction in end-to-end delay in the Wireless Sensor Network.
Keywords: Wireless Sensor Networks, Ad-Hoc On Demand distance Vector, Dynamic Source Routing, Link Failure.
[1]. Vehbi Cagri, Gungor, Özgür B. Akan and Ian F. Akyildiz, (April 2008), ―A Real-Time and Reliable Transport (RT)2 Protocol for Wireless Sensor and Actor Networks‖, IEEE Trans. Networking,Vol.16,No.2, pp. 359-370.
[2]. X. Huang, H. Zhai, and Y. Fang, (Dec 2008), ―Robust cooperative routing protocol in mobile wireless sensor networks‖, IEEE Trans. Wireless Commun., Vol. 7, No. 12, pp. 5278–5285.
[3]. Xufei Mao, Shaojie Tang, Xiahua Xu, Xiang-Yang Li and Huadong Ma, (Nov 2011), ―Energy Efficient Opportunistic Routing in Wireless Sensor Networks‖, IEEE Trans. Parallel and Distrib. Syst., Vol. 22, No. 11, pp 1934-1942.
[4]. Jianwei Niu, Long Cheng, Yu Gu, Lei Shu and Sajal K. Das, (Feb 2014), ―R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Networks‖, IEEE Trans. Industrial informatics, Vol.10, No.1, pp. 784-794.
[5]. Eric Rozner, Jayesh Seshadri, Yogita Ashok Mehta and Lili Qiu, (Dec 2009) ―Soar: Simple opportunistic adaptive routing protocol for wireless mesh networks‖, IEEE Trans. Mobile Comput., Vol. 8, No. 12 pp. 1622–1635.
[6]. Elhadi M. Shakshuki, , Nan Kang and Tarek R. Sheltami, (March 2013), ―EAACK—A Secure Intrusion-Detection System for MANETs‖, IEEE Trans Industrial Electronics, VOL. 60, NO. 3, pp 1089-1098.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Optimisation Technologies for Low-Bandwidth Networks |
Country | : | Sudan |
Authors | : | Eng: Randa Ibrahim Mohammed Ibnouf || Dr. Amin Babiker N/Nabi Mustafa |
Abstract: One measure of the growing disparity between the developed and developing worlds is the speed of the Internet. For example, the speeds of connections from North America to Africa are slower than those to Europe by a factor of 50. The reasons for this disparity include the availability of Internet access only via slow satellite connections, and the lack of communications infrastructure in the remote parts of the world. Bandwidth and computing equipment are expensive as a result of weak currencies, high transport costs, small budgets and unreasonable tariffs. Bandwidth in some developing countries can be so costly that even their prime universities cannot afford speeds equivalent to the average western household with an ADSL connection. Thus universities and other institutions cannot afford a decent link, or are simply unaware of existing alternatives. This paper attempts to provide practical information on how to gain the largest benefit from existing connections to the Internet, by exposing readers to thelatest techniques to optimize the use of low-bandwidth network connections. This study has for the years 2005 and 2008 with the beginning of the implementation of the Sudanese Universities Network to measure the performance of the network. Byapplying optimization techniques, the effectiveness of available connections can be significantly improved. Access to more bandwidth will facilitate better exchange of scientific information, data and literature among researchers all over the world.
Keywords: Bandwidth, throughput, latency, speed, Policy, monitoring &analysis, and implementation.
[1]. http://sdu.ictp.it/lowbandwidth/
[2]. http://www.wikipedia.org/
[3]. http://bwmo.net/
[4]. http://sdu.ictp.it/lowbandwidth/.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | VSAT Network Overview |
Country | : | Sudan |
Authors | : | Khalid Abdalrazig Ibrahim Hassan || Dr. Amin Babiker A/Nabi Mustafa |
Abstract: VSAT technology is a telecommunication system based on wireless satellite technology . the term vsat stands for "small aperture terminal". As the definition itself dictates , vsat technology of small satellite earth station , this paper shows vsat network technology .
Keywords: vsat ,outdoor unit, indoor unit ,hub ,security, earth station.
[1]. Http://Www.Ukessays.Com/Essays/Information-Technology/Overview-Of-Vsat-Networks-Information-Technology-Essay.Php
[2]. Dermot Ahern"Vsat Very Small Aperture Terminal "Minister For Communications, Marine And Natural Resources
[3]. September 2003
[4]. John Wiley & Sons Ltd, :Vsat Network" The Atrium, Southern Gate, Chichester, West Sussex Po19 8sq, England 1995 & 2003
[5]. Http://Samples.Sainsburysebooks.Co.Uk/9780470866856_Sample_383472.Pdf
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Spatial Scalable Video Compression Using H.264 |
Country | : | India |
Authors | : | Divya. R || Athilakshmi || Fahmitha Soukath. J || Gayathri. P |
Abstract: H.264 is a standard was jointly developed by ITU-T and ISO/IEC Moving Picture Expert Group. The main goal of H.264 is to achieve spatial scalability and to improve the compression performance compared to other standards. The H.264 is used to encode the video in a spatial manner, so that the number of the frames is reduced and its size is being reduce thus it achieve scalability. The compression techniques in H.264 will compress the video from its original size and produce an efficient output. The video format used in this software is QCIF video and it is encoded and decoded using the H.264 design.
Keywords: Advanced Video Coding(AVC),H.264,High Efficiency Video Coding(HEVC),Joint Collaborative Team-Video Coding(JCT-VC),Moving Pictures Expert Group(MPEG).
[1]. H. Everett, ―Generalized Lagrange multiplier method for solving problems of optimum allocation of resources,‖ Oper. Res., vol. 11, pp. 399–417, May–Jun. 1963.
[2]. S.-W. Wu and A. Gersho, ―Enhanced video compression with standardized bitstream syntax,‖ in Proc. IEEE Int. Conf. Acoust., Syst., Signal Process., vol. I. Apr. 1993, pp. 103–106.
[3]. ITU-T and ISO/IEC JTC 1, Generic Coding of Moving Pictures and Associated Audio Information—Part 2: Video, ITU-T Rec. H.262 and ISO/IEC 13818-2 (MPEG-2 Video), version 1, 1994.
[4]. K. Ramchandran and M. Vetterli, ―Rate-distortion optimal fast thresholding with complete JPEG/MPEG decoder compatibility,‖ IEEE Trans.Image Process., vol. 3, no. 5, pp. 700–704, Sep. 1994.
[5]. G. J. Sullivan and T. Wiegand, ―Rate-distortion optimization for video compression,‖ IEEE Signal Process. Mag., vol. 15, no. 6, pp. 74–90, Nov. 1998.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Centralized Fault Management of Docks in Marine Sensor Networks |
Country | : | India |
Authors | : | Priyanka.V || Jose Anand |
Abstract: Vessel Traffic Management System (VTMS) is a marine traffic monitoring system established by harbour or port authorities to keep track of vessel movements and provide navigational safety in a limited geographical area. Current marine wireless communication systems used for monitoring applications based on VTMS suffer from Automatic Identification System (AIS) sensor node failure in the marine sensor networks. The sensors will monitor its surroundings and forwards the data to the actor nodes. An actor has to coordinate the operations and thereby it is necessary to have a strongly connected network topology all the times. The path between the actors may be constrained to meet latency requirements.
[1]. Abolfazl Akbari, Arash Dana, Ahmad Khademzadeh, Neda Beikmahdavi, "Fault Detection and Recovery in Wireless Sensor Network Using Clustering", International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 1, pp.130-138, February 2011.
[2]. Anouar Abdelhakim Boudhir, Bouhorma Mohamed, Ben Ahmed Mohamed, "New Technique of Wireless Sensor Networks Localization based on Energy Consumption", International Journal of Computer Applications (0975 – 8887), Vol. 9, No. 12, pp. 25-28, November 2010.
[3]. A. Cerpa, D. Estrin, "ASCENT: Adaptive self-configuring sensor networks topologies", International Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'02), New York, NY, June 2002.
[4]. D. Ciuonzo, P. Salvo Rossi, "Decision Fusion With Unknown Sensor Detection Probability", IEEE Signal Processing Letters, Vol. 21, No. 2, pp. 208-212, February 2014.
[5]. Djamel Djenouri and Ilangko Balasingham, "Traffic Differentiation Based Modular QoS Localized Routing for Wireless Sensor Network", IEEE Transactions on Mobile Computing, Vol. 10, No. 6, pp. 797-809, June 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Proposed Cost Effective Prototype Model for PLC Based GSM Remote Control in Home and Industrial Automation |
Country | : | Egypt |
Authors | : | Sherif Kamel Hussein |
Abstract: Nowadays, wide range of sectors within a community is focusing on the usage of different communication systems to support mobile applications such as, home and industry ensuring the real-time, safe and secure behavior of these systems. Such trends merging mobile value added services and home/industrial automation technologies. This research investigates the potential for remote controlled operation of both home and industrial automation systems. The proposed model for designing this system is to develop and implement an efficient low cost PLC (Programmable Logic Control) based GSM Control module that will integrate the mobile application platforms and home/industrial automation technologies with different options of communication protocols and command structure from a cellular phone over the GSM network or internet accessing mobile home/industrial automation service and the relevant controlled devices.
[1]. B. Ramamurthy, S. Bhargavi and R. Shashikumar, "Design and Implementation of GSM based Remote Monitoring and Control system for Industrial process Parameters", International Journal of Computer Science and Internet Security (IJCSIS) , vol. 8, No. 5, PP. 219–225. 2010.
[2]. S. D. Sharma and R. S. Kasana, "Research Issues and Challenges of Mobile Database Systems", International Journal of Computer Information Systems (IJCIS), vol. 2, No. 2, PP. 28-31, 2011.
[3]. C. K. Das, M. Sanaaullah, H. M. G. Sarwer and M. M. Hassan, "Development of a Cell Phone Based Remote Control System: on Effective Switching System for Controlling Home and Office Appliances", International Journal of Electrical & Computer sciences IJECS, Vol. 9, 2010.
[4]. Sungmo Jung, Jae-gu Song, Seoksoo Kim, "Design on SCADA Test-bed and Security Device," International Journal of Multimedia and Ubiquitous Engineering, Vol. 3, No. 4, October, 2008.
[5]. Surve, V, 2006, "A wireless Communication Device for Short Messages", Masters Thesis, Available: www.certec.lth.se/doc/awireless.pdf.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Fractal Reconfigurable Multiband Communicating Antenna for Cognitive Radio |
Country | : | India |
Authors | : | Y. Srinivas || Dr. N. V. Koteswara Rao |
Abstract: A novel antenna structure is proposed by combining the concept of a reconfigurable and fractal with the parasitic elements technique to obtain the multiband frequency reconfigurable antenna. Fractal antenna with triangular slot is designed for operating at multiple frequencies. The integration of PIN diode switches to the antenna changes the frequency of the antenna dynamically. This is done by changing the switch state to either on or off mode. Proposed antenna is designed and simulated in HFSS and parametric analysis has been carried out and fabricated on FR4 substrate. The electrical lengths are varied by operating switches on and off. The proper activation/deactivation of the switches alters the current flow and changes resonance frequency. This paper presents a fabricated compact fractal shaped frequency reconfigurable antenna for multiband operation along with measured results. The proposed antenna is most suitable for Cognitive Radio.
Keywords: Reconfigurable antenna, Fractal antenna, HFSS, Cognitive radio
[1]. J. Mitola et al., "Cognitive radio: Making software radios more personal,"IEEE Pers. Commun., vol. 6, no. 4, pp. 13–18, Aug. 1999
[2]. J. Mitola, "Cognitive radio: An integrated agent architecture for software defined radio," Doctor of Technology, Royal Inst. Technol. (KTH), Stockholm, Sweden, 2000.
[3]. Constantine A. Balanis, Antenna Theory: Analysis and Design, 2nd Edition; John Wiley Sons Inc. New York, 2001
[4]. Y. Tawk, and C. G. Christodoulou, "A New reconfigurable antenna for cognitive radio communication', IEEE Antennas and wireless propagation letters, Dec. 2009.
[5]. M. Al-Husseini, Youssef Tawk, C.G.Christodoulou, K. Y. Kablan, " A Reconfigurable Cognitive Radio Antenna Design" Proc. IEEE International Symposium on Antenna and Propagation (APSURSI), June 2010 Toronto, Canada
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Content Based Image Retrieval Using 2-D Discrete Wavelet Transform |
Country | : | India |
Authors | : | Deepa M || Dr.T.V.U.Kirankumar |
Abstract: In this paper we proposed discrete wavelet transform with texture for content based image retrieval. Our proposed method uses 2-D Discrete Wavelet Transform for reducing the Dimensions of test image and trained images. Further gray level co-occurrence matrix is applied for all test and trained images of LL components of level 2 decomposed images to extract the texture feature of the images. Then similar images are retrieved by using Euclidean distance method. Experimental results are performed for Wang's database and it gives the improved performance.
Keywords: CBIR, Texture, 2-D Discrete Wavelet Transform, Euclidean distance.
[1]. Piotr Porwik, Agnieszka Lisowska, "The Haar Wavelet Transform in Digital Image Processing: Its Status and Achievements".
[2]. Phang Chang, Phang Piau, "Simple Procedure for the Designation of Haar Wavelet Matrices for Differential Equations",
Proceeding of the International Multiconference of Engineers and Computer Scientists 2008 Vol II, March 2008.
[3]. Patrick J. Van Fleet, "Discrete Haar Wavelet Transform", PREP, Wavelet Workshop 2006.
[4]. N. Gnaneshwara Rao, Dr. V. Vijaya Kumara, V Venkata Krishna, "Texture Based Image Indexing and Retrieval", IJCSNS
International Journal of Computer Science and Network Security, VOL.9 No.5, May 2009
[5]. Hossein Nezamabadi-pour and Saeid Saryazdi, "Object –Based Image Indexing and Retrieval in DCT Domain using Clustering
Techniques", World Academy of Science, Engineering and Technology 3 2005
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | QOS of MPLS |
Country | : | Sudan |
Authors | : | Wesam Salah Dawood Khalil || Dr.Amin Babiker A/Nabi Mustafa |
Abstract: Multiprotocol Label Switching (MPLS) is a standards-approved technology for speeding up network traffic flow and making it easier to manage. MPLS involves setting up a specific path for a given sequence of packets, identified by a label put in each packet, thus saving the time needed for a router to look up the address to the next node to forward the packet to. In this paper OPNET simulator is used to analyze MPLS network .
Keywords: BGP, MPLS, VPN, PE , ATM , IP, QoS, LSP.
[1]. C. Huang et al., "Building Reliable MPLS Networks using a path protection mechanism", IEEE Communication Magazine, vol. 40, no. 3, March 2002.
[2]. J.L. Marzo et al., "Adding QoS Protection in order to Enhance MPLS QoS Routing", IEEE International Conference on Communications, vol. 3, 2003, pp. 1973-1977.
[3]. Mina Amin, Kin-Hon Ho, George Pavlou, and Michael Howarth., "ʻImproving Survivability through Traffic Engineering in MPLS Networks‟‟, Centre for Communication Systems Research, University of Surrey, UK, vol. 4, no. 3, March 2010.
[4]. P. Marques, Constrained Route Distribution for Border Gateway Protocol/ MultiProtocol Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual Private Networks (VPNs), IETF RFC 4684, Nov. 2006.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design, Construction and Operation of a 4-Bit Counting Circuit |
Country | : | Nigeria |
Authors | : | Brian E. Usibe || Julie C. Ogbulezie |
Abstract: A four-bit binary counting circuit was designed and constructed. The materials used were; PIC Microcontroller, Seven-segment LED, Printed Circuit Board, LEDs, Transistors, 9v DC power source (Battery), and other passive components. The method adopted for this counter makes use of a microcontroller as the backbone of the design, which holds the command for every action that is to occur during an operation. The output (results) of the circuit was indicated by four Light Emitting Diodes (LEDs) with counts; 0000, 0001, 0010, 0011, 0100, 1010, 0110, 0111, 1000, 1001, 1010, 1011, 1100, 1101, 1110 and 1111. These binary outputs were further converted to decimal equivalent through a reprogrammable microcontroller and then displayed using a dual seven-segment display device.
Keywords: Counting circuit, PIC microcontroller, seven-segment display, logic systems.
[[1]. Menkiti, A.I. Computer Logic and Architecture. University of Calabar Press, Calabar, Nigeria, 2011.
[2]. Bozie, S.M. Electronics and switching circuits. Edward Arnold Publication, London, 1979.
[3]. Givant, S. and Halmos, P. Introduction to Boolean Algebra. Undergraduate Text in Mathematics, Sprinter Pub., 2009.
[4]. Hill, J.F. and Peterson, G.R. Introduction to switching theory and logical design. John Wiley and Sons, New York, 1974.
[5]. Patton, A. An introduction to digital logic. Macmillan Books, London, 1973.
[6]. Mandll, M. Directory of electronics circuits with glossary of terms. Eaglewood Cliffs, New Jersey, 1978.
[7]. Jaegar, R. C. Microelectronics circuit design. McGraw Hill. pp.226-233, 1997
[8]. Haykinl, S.S. Transistor circuits in electronics. Liffer Books, London, 1971.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Development of an Algorithm for 16-Bit WTM |
Country | : | India |
Authors | : | Sravanthi.kantamaneni || Dr.V.V.K.D.V.Prasad || Veera Vasantha Rao.Battula, |
Abstract: Binary Multipliers plays an important role in digital circuits. There are many methods for generating a Simple binary multiplication and some of them are like Ripple carry array multipliers, Row adder tree multipliers, Partial product LUT multipliers, Wallace trees, Booth recoding etc.,. Our project mainly concentrates on 8x8 Wallace tree multiplier. It uses a famous Wallace tree structure which is an implementation of an adder tree designed for minimum propagation delay. Rather than completely adding the partial products in pairs like the ripple adder tree does, the Wallace tree sums up all the bits of the same weights in a merged tree. Usually full adders are used, so that 3 equally weighted bits are combined to produce two bits: one (the carry) with weight of n+1 and the other (the sum) with weight n. Each layer of the tree therefore reduces the number of vectors by a factor of 3:2. A conventional adder is used to combine these to obtain the final product.
[1]. C. S. Wallace, A Suggestion for a Fast Multiplier, IEEE Transactions on Electronic Computers, February 1964, EC-13:14–17.
[2]. Vijaya Prakash A. M, Dr. MGR, K. S. Gurumurthy, A Novel VLSI Architecture for Low power FIR Filter, International Journal of Advanced Engineering & Application, January 2011, PP 218 - 224.
[3]. Gary W. Bewick, Fast multiplication algorithms and implementation, The Department Of Electrical Engineering and The Committee on Graduate studies of STANFORD UNIVERSITY, February 1994. PP 8 - 16.
[4]. J. Bhasker, AVHDL Primer, Third Edition, Pearson Education, 2007, PP-21 to 50, 88 to 101
[5]. John F. Wakerly, Digital Design Principle and Practices, fourth edition, Prentice Hall Pearson Education, 2009, PP 235-250, PP 786-795
[6]. http://en.wikipedia.org/wiki/Wallace_tree, http://en.wikipedia.org/wiki/FPGA.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | OFDM PAPR Reduction by Shifting Two Null Subcarriers among Two Data Subcarriers |
Country | : | India |
Authors | : | Rupesh L. Patil || S. K. Sudhansu |
Abstract: Orthogonal frequency division multiplexing (OFDM) is an attractive modulation technique for transmitting large amount of digital data over radio waves. High PAPR of the transmit signal is major drawback of OFDM. Proposed method promises PAPR reduction by shifting and switching null subcarrier with data subcarrier. When it is compared with existing reduction techniques (Such as Shifting Null Subcarrier among Data Subcarrier, Interleaving Technique, PTS, SLM, Tone rejection etc), the proposed method is compatible with current commercial system. The MATLAB simulations show a PAPR reduction of around 1.4dB using the proposed method than the existing methods also BER performance of proposed method is much better than that of existing methods.
Keywords: Orthogonal frequency division multiplexing, peak-to-average power ratio, intersymbol interference, null subcarriers.
[1] Bo Wang, Pin-Han Ho, and Chih-Hao Lin"OFDM PAPR Reduction by Shifting Null Subcarriers Among Data Subcarriers", IEEE Communication Letters, Vol. 16, No.9, Sept 2012.
[2] Ali Alavi, Chintha Tellambura, Senior Member, IEEE, and Ivan Fair "PAPR Reduction of OFDM Signals Using Partial Transmit Sequence: An Optimal Approach Using Sphere Decoding", IEEE Communications Letters, Vol. 9, No. 11, November 2005.
[3] Haijian ZHANG, Didier LE RUYET, Michel TERRE "Spectral Efficiency Analysis in OFDM and OFDM/OQAM based Cognitive Radio Networks" Electronics and Communications Laboratory, CNAM Paris, France.
[4] S. H. Han and J. H. Lee, "An overview of peak-to-average power ratio reduction techniques for multicarrier transmission," IEEE Wireless Commun., pp. 56–65, Apr. 2005.
[5] Aida Zaier and Ridha Bouallegue "Blind channel estimation enhancement for MIMO- OFDM systems under high mobility conditions", International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 1, February 2012 DOI : 10.5121/ijwmn.2012.4115 207.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Investigating a Simulated Model of 2.5 GHz 64 Channel 140 kmDWDM System Using EDFAand Raman Amplifier Considering Self-Phase Modulation |
Country | : | Bangladesh |
Authors | : | H. M. Aziz || Ebad Zahir |
Abstract: In this paper a 2.5 GHz 64 channel DWDM fiber optic transmission system is investigated with 140km of fiber length.For comparative analysis, both EDFA and Raman areused for amplification purposes but in consideration with self-phase modulation. The model of DWDM grid frequency ranged from193.1 THz to 199.4 THz (1552.52 nm to 1503.47 nm in wavelength) and with 100GHz (0.8nm) of channel spacing. This range covers most of the C-band and a portion of the S-band.The simulationresults show that the system with Raman Amplifiers yieldedahighest gain of 12.36 dB whereas the system withEDFA produced ahighest gain of 13.01dBat C band region and it was further reduced to 5dB entering S band region. It isalso shown thatRaman Amplifier networks are less prone to crosstalk and inter symbol interference than EDFA networks.
Keywords: DWDM, EDFA, Raman Amplifiers, Self-Phase Modulation (SPM), C-band, S-band.
[1] S. A. E. Lewis, S. V. Chernikovand J. R. Taylor, Temperature-Dependent Gain And Noise Infiber Raman Amplifiers, Optics Letters, Vol. 24, No. 24,December 15,1999.
[2] Eugeny M. Dianov, Raman Fiber Amplifiers, Proc. Of Spie Vol. 4083, 2000.
[3] E. Desurvide Et Al., High-Gain Erbium-Doped Traveling-Wave Fiber Amplifier, Optics Letters, Vol. 12, No. 11, November 1987
[4] John M. Senior , Optical Fiber Communications Principles And Practice (New Delhi, Pearson,2010 )
[5] Nguyen Hong Suong And Pham Quoc Hop, Simulation Of The Gain Characteristics Of Edfa, Posts And Telecommunications Institute Of Technology (Ptit), Ho Chi Minh City, Vietnam.
[6] Waldemarszczęsny And Marian Marciniak, Impact Of Nonlinear Opticalphenomena On Dense Wavelength Divisionmultiplexed Transmission In Fibertelecommunication Systems. Journal Of Telecommunications And Information Technology, 1-2, 2000.