This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/copyright

Author's personal copy

Journal of Manufacturing Systems 26 (2007) 37–43

Contents lists available at ScienceDirect

Journal of Manufacturing Systems journal homepage: www.elsevier.com/locate/jmansys

Technical paper

Application of CDMA for anti-collision and increased read efficiency of multiple RFID tags Joshua Y. Maina a,∗ , Marlin H. Mickle a , Michael R. Lovell b , Laura A. Schaefer b a

Department of Electrical and Computer Engineering, University of Pittsburgh, Pittsburgh, PA, USA

b

Department of Mechanical Engineering, University of Pittsburgh, Pittsburgh, PA, USA

article

info

Article history: Received 1 July 2005 Received in revised form 17 April 2006 Accepted 30 May 2007

a b s t r a c t This research presents analysis and demonstration of the application of code-division multiple access (CDMA) to radio frequency identification (RFID), particularly for the simultaneous reading of multiple RFID tags. The research investigates current techniques and algorithms for resolving collisions among multiple tags while they are transmitting simultaneously. Typical store and warehouse environments under possible worst-case scenarios have been studied. The result of this research is the recommended implementation of a CDMA RFID method of reducing the number of reads and the removal of some intertag interference. © 2008 The Society of Manufacturing Engineers. Published by Elsevier Ltd. All rights reserved.

1. Introduction Bar code technology has been used as a means of identifying items with a unique item identifier (or unique ID), and as such, the bar code system has also helped in reducing the time required to collect data in settings such as stores and warehouses [2], hospitals, transportation, and the military, to mention a few. Bar code technology allows for real-time accurate tracking of products with minimal human intervention. The technology has also served as a vital tool in the supply chain for high-volume manufacturers and distribution companies. The primary disadvantage of the bar code is the requirement of line of sight (reader to bar code) for reading. In some industrial environments, the bar code experiences rapid mechanical wear and tear, which eventually renders it useless. The introduction of radio frequency identification (RFID) and the establishment of the Electronic Product Code (EPC) have generated a tremendous amount of interest because RFID eliminates the problem of direct line of sight. The embeddability of the RFID tags in non-conducting materials solves the problem of mechanical wear and tear, giving rise to cost savings that otherwise would be incurred in replacing worn bar codes. The RFID tag is the means of choice for the implementation of the EPCglobal code. RFID technology provides a faster, hands-free means of reading and tracking items. The RFID tags in use currently are sequentially read because of the problem of collisions when multiple tags are activated and transmitted simultaneously. As reported in this paper, the application of CDMA to RFID technology is investigated

as a means to increase the number of practicable simultaneous tag reads possible per second. CDMA is a wireless technology that uses spread spectrum techniques. The technology was first used during World War II by the British to foil German attempts to jam communication transmissions. Transmissions were carried out over several frequencies instead of one, making it very difficult for an uncorrelated receiver to detect. Individual information is encoded with pseudo-random sequence or orthogonal sequence. Transmission over the whole spectrum rather than a single channel, and separating the transmission from the participating nodes using one of the code sequences, give CDMA immunity against interference. The immunity to interference inherent in CDMA allows simultaneous transmission from multiple devices (in this case, tags), broadening the fields of application to multiple access techniques [9] in ultra-wide band (UWB) technology. Immunity to interference is a strong motivator for applying CDMA in RFID technology, thereby resulting in efficient and speedy reading of RFID tags simultaneously without collision. The concept of orthogonality is extremely useful in the CDMA technique. Two vectors, x and y, are said to be orthogonal if their inner product vanishes, that is, if hx|yi = 0. Orthogonality has a familiar interpretation when applied to vectors such as force, velocity, displacement, and so on [7]. Orthogonal vectors can be visualized as being perpendicular to one another. Equivalently, it can be said that the projection of one vector onto another vanishes. 2. Basic operating principles of RFID



Corresponding author. E-mail address: [email protected] (J.Y. Maina).

There are two categories of RFID tags: active and passive. The difference between the two is the manner by which the tags are

0278-6125/$ – see front matter © 2008 The Society of Manufacturing Engineers. Published by Elsevier Ltd. All rights reserved. doi:10.1016/j.jmsy.2007.05.001

Author's personal copy

38

J.Y. Maina et al. / Journal of Manufacturing Systems 26 (2007) 37–43

Fig. 1. Basic principle of an RFID system [8].

Fig. 2. Illustration of a multiple tag reading system [8].

powered. The active RFID is powered by a battery incorporated on the tag itself, which means there is a need for a periodic change of battery, as the battery is expected to depreciate below the nominal voltage requirement of the tag through usage. The passive tag, on the other hand, converts electromagnetic energy radiated by the reader to a voltage in order to power itself. The shelf life of the passive RFID tag is essentially infinite because there is no need for any battery change, but the reader must constantly maintain a certain minimum power level to be able to activate the tag. Fig. 1 shows a single reader activating a single tag and receiving a response from the tag. Fig. 2 shows a single reader activating multiple tags and receiving simultaneous responses from the tags. In this research, the passive RFID tag system is the system of choice because it is the most suitable one for simultaneously reading multiple tags. Using one reader to activate multiple tags simultaneously presumably resolves the issue of synchronization among the tags; however, this introduces the problem of collision (contention) among tags. When transmissions from multiple tags occur simultaneously, it currently becomes essentially impossible to distinguish information from individual tags. There are different techniques used in resolving this problem of contention, but the underlying principle is to establish a dialog between the reader and the set of tags. The dialog then establishes the order for tags to individually transmit. The next section illustrates one of the methods used currently. 3. Anti-collision method A significant measure of the advantage of electronic product identification is the speed of reading, which in turn emanates from the ability to read multiple objects as quickly as possible. Researchers at the MIT Auto-ID Center implemented a binary tree scanning anti-collision protocol that is an implementation of a ‘‘reader talk first’’ methodology, where simultaneous replies to a reader’s interrogation represent a contention for reader attention (collision), yet need not represent a loss of information [1]. The protocol is a contention-resolving and collision-free method for negotiating data from multiple tags. The reader-to-tag communication is accomplished using an amplitude modulated (AM) carrier, and the tag-to-reader communication is accomplished through the passive backscatter of the tag-to-reader carrier to produce widely separated subcarrier tones. In the previously existing method, a population of tags to be read by the reader was presented as a binary tree descending from the ‘‘root’’ at the top, with ‘‘branches’’ leading downward to more ‘‘nodes,’’ representing additional tags. This procedure of scanning the tree from root to leaf fully defines an EPCTM , and hence a particular item, where terminating nodes at the bottom represent leaves where products may be present. In this method, the most

significant bit (MSB) of the EPCTM is placed adjacent to the root of the tree, at level 1. The least significant bit (LSB) by default is considered to be at the leaf of the tree, level 5 in the ‘‘binary scanning tree’’ example of Fig. 3. It can be seen in Fig. 3 how a unique path through the tree is defined by the EPCTM of a particular product. This technique regards a node as populated if there are branches from the node descending to a product, or if it is a bottom node corresponding to a product; otherwise, the node is described as unpopulated. A populated node is further classified as singly populated if only a single branch leading to a product descends from it, or multiply populated if more than one branch descending from it leads to a product. 3.1. Typical read time analysis In current RFID systems, the algorithm for reading multiple tags involves continuous dialog between the reader and the tags to work through the tree to eventually read a single tag without a collision. The following is an example of a typical binary tree algorithm for eight tags belonging to a binary tree system with three levels: To read the first tag Reader transmits — (Respond if you are out there) 8 tags respond — (Collision occurs) Reader transmits — (All 0’s at level 1 don’t respond) 4 tags respond (Collision occurs) Reader transmits — (All 0’s at levels 1 and 2 don’t respond) 2 tags respond — (Collision occurs) Reader transmits — (All 0’s at levels 1, 2, and 3 don’t respond) 1 tag responds (No collision). From the above, it can be seen that for an eight-tag binary system it takes four reader transmissions and four tag responses to read just one tag without a collision. Considering the eight tags, it will take a total of 32 reader transmissions and a total of 32 tag responses to read all eight tags without collision. Translating the reads and responses to time spent of, say, one unit of time per event, it will take a total of 64 units of time to read the total of eight tags. Using this analogy, the progression in the increase in time as the number of tags becomes larger can easily be seen and the impact estimated. This emphasizes the need for better techniques in reading multiple tags. A technique that quickly comes to the minds of engineers, particularly in computational fields, is parallelism. Parallelism means having all units being executed at the same time without hazards (in this case, collisions). 4. CDMA RFID Numerous methods of solving RFID collision problems have been suggested, and in some cases implemented, with various levels of performance. Important measures of performance include the time required to identify the tags and the power consumed by the tags. The time required to identify the tags is proportional to the number of time slots needed to complete the arbitration process. The power consumed by the tags is proportional to the total number of times the tags are required to transmit during this process [5]. Previous analysis on the average number of time slots [3,6] reveals a linear dependence on the number of tags, m. This highlights the need for a more efficient method for simultaneously reading multiple tags. Code-Division Multiple Access (CDMA) works using an orthogonal Walsh code (sequence), which allows more than one transmission to take place simultaneously in such a manner that the receiver receives the cumulative power from all of the transmitting devices. The actual transmitted vector can be separated using the

Author's personal copy

J.Y. Maina et al. / Journal of Manufacturing Systems 26 (2007) 37–43

39

Fig. 3. Representation of an EPCTM as a tree.

orthogonal basis vectors. The code from each device is used in conjunction with correlation to know whether a device participated in the communication and whether the information was transmitted. Because all devices (in this case, tags) respond to interrogation simultaneously when powered by the reader, the number of reads and responses will be reduced drastically compared to binary tree systems. The following gives the protocol: Reader transmits — (If you are out there send your unique ID) 8 tags respond simultaneously — (No collision). There is only one request from the reader and one simultaneous response from the tags. This gives a total of two communications, in comparison to a total of 64 in the case of the binary tree system. Translating this to time spent in units, there is a total of two units of time. Fig. 4 is an example of how three tags in the CDMA system, with respective code sequences of + + −−, + − +−, and + − −+, transmit simultaneously, and the bit sent by tag 1 was interpreted correctly as 110. The interpretation of the received energy levels using the individual code can be carried out in a matrix form as follows: 2 2 1

0 0 −1

0 −2 1

2 2 1

0 0 −1

−2

2 2 1

0 0 −1

−2

"

"

"

0 1 0 1

  # +1 " # 4 +1 0   = 4 Interpreted as 110 −1 −1 0 −1   # +1 " # −2 4 −1 0   = 0 Interpreted as 101 +1 −1 4 −1   # +1 " # −2 0 −1 0   = 4 Interpreted as 010. −1 −1 0 +1 −2

Only four elements of the Walsh code are shown for simplicity of example. Each bit is coded into four elements (chips) for encoding. 5. RFID checkout difficulties Implementation and integration of RFID into existing store configurations is complicated by the proximity of checkout counters contrasted with the desire for long read ranges. Thus, for successful implementation, the current proximity of checkout aisles and the long read ranges are counter-productive in assuring

Fig. 4. CDMA implementation using Walsh coding sequence.

that customers only pay for the items in their shopping cart—not items in someone else’s cart [8]. Because the major area of deployment of RFID technology is expected to be in retail stores, the proximity problem requires a solution. The design of an RFID system that takes into consideration a number of possible problem scenarios has been investigated in this research. The difficulties considered include the following: antenna arrangements for isotropic coverage, erroneous reading of wrong merchandise, and adjacent aisle interference.

Author's personal copy

40

J.Y. Maina et al. / Journal of Manufacturing Systems 26 (2007) 37–43

Fig. 5. A diagram of the clear distance aisle scenario.

In this paper, the adjacent aisle problem was analyzed in two formats. The first is termed the clear distance technique, and the second is the directed signal technique.

Table 1 Illustration of received signal at the reader when a single chip is transmitted Distance from the reader

Reflected power (mW) per chip

Reflected power (mW)

5.1. Clear distance technique

2 feet (20 ) 3 feet (30 ) 4 feet (40 ) 5 feet (50 ) 6 feet (60 ) 7 feet (70 ) 8 feet (80 ) 9 feet (90 ) 10 feet (100 )

15.625 15.625 15.625 15.625 15.625 15.625 15.625 15.625 15.625

3.9063 1.7361 0.9766 0.6250 0.4340 0.3189 0.2441 0.1929 0.1563

In this method, the transmitted energy per bit, Eb , as shown in Fig. 4, is used to determine the transmitted energy per chip, Ec , because it is the chip sequence that is used to formulate the transmission symbol for each tag. The power per chip can further be divided by the number of simultaneously transmitting tags, which in this instance is 64, so Es =

Ec

(1) 64 where Es is the safe (regulated) power. Using Eq. (1) and the calculated energy per chip of 15.625 mW, the safe power to be received from any adjacent aisle is 15.625 mW

= 0.2441 mW. 64 This means that if all 64 tags from an adjacent aisle transmit all 1’s simultaneously at the same chip point, the cumulative energy received at the adjacent reader will be seen as a single tag transmitting rather than the actual 64 tags, because the energy adds algebraically to give 15.625 mW, which is the energy of a single chip. Table 1 shows the power fading with respect to distance, as depicted by the inverse-square law, that is, following the expression Es =

S =I (2) 4π r 2 where S is the source strength, r is the distance traveled, I is the strength at one unit point of r, and by the inverse-square law, I depreciates in the order I /4, I /9, respectively, as r increases in the order r, 2r, 3r, and so on. From Table 1, a safe distance is seen to be any distance ≥8 feet, where the fading effect of the inverse-square law applies. At 8 feet and above, as shown in Fig. 5, the energy level of the signal in this example is at a level equal to or less than the energy of one chip divided by 64. Therefore, the spacing between aisles will be assumed to be ≥8 feet.

5.2. Directed signal technique Unidirectional flow of the signal is not typically feasible in the aisle case because under normal circumstances customers will not and should not be expected to perform checking and aligning of the tag antenna orientations in any particular direction. Therefore, it is safe to assume that in a typical cart containing multiple items that some of the signals will definitely travel in the direction of the adjacent aisles. Hence, this consideration needs to be addressed in considering an implementation of RFID. One means for resolving the problem is to implement readers to synchronize by simply time multiplexing the readers in all of the aisles. This means that, at any instant, only the reader in one aisle is reading, and sequentially the next reader from the next aisle commences reading the next clock cycle after the previous reader. Another consideration that must be taken into account in a cart is the tag orientation with respect to the reader antenna of interest, with the possibility of some of the items in the cart being perpendicular to the reader, in which case the reader might not be able to read from the item. As a solution to this problem, an array of cooperating readers is formed using three readers, with one placed at the front of the aisle (or overhead) and two placed each at the two adjacent walls of the aisle. The three readers are connected together such that they function as one reader, hence the term cooperating readers. Fig. 6 gives a diagram of this type of implementation.

Author's personal copy

J.Y. Maina et al. / Journal of Manufacturing Systems 26 (2007) 37–43

41

Fig. 6. A diagram of the directed signal technique [8].

6. Read authenticity

7. Electrically noisy manufacturing environments

The current RFID backscatter system implemented within the EPCglobal operates in a true/false fashion, which means there exists a line for a ‘1’ and a line for a ‘0’, which makes it very difficult to implement without the problem of either missing a read completely or performing a wrong read. One of the achievements of the implementation of the CDMA technique is the introduction of a transition region within the energy discrimination range of the reader. The significance of the transition region is two-fold:

As mentioned previously, since the late 1940s spread spectrum (SS) techniques have been used for clandestine operations as the major objective, particularly in the military [4]. SS techniques provide excellent immunity to interference that may be a result of intentional jamming and allow transmission to be hidden within background noise. Currently, SS has been adopted in civilian applications in wireless systems such as CDMA because of its inherent immunity to interference. The theoretical capacity of any communication channel is defined by the Shannon’s channel capacity formula, written as

(a) In a cart and similar scenario, items that may be scattered within the cart can all be read correctly even though energy levels from these items potentially may be different. (b) In a cart aisle scenario or pallet scenario, the energy from a nearby aisle or zone can be seen by the adjacent reader, but because it falls within the transition region due to the difference in distances, it becomes non-interfering to the reader in question at any specific instant. Fig. 7 illustrates an energy bar for a typical cart scenario as analyzed in this research. H in the diagram represents a transition region (TR), and starting from the bottom of the bar, the first TR stands for single item coming from the nearby cart, which means that only signals with power above the TR are considered authentic. The second TR region stands for multiple items coming from a nearby cart; hence, the multiple items from the cart in question have cumulative power higher than the second TR. The third region stands for all items in an adjacent cart, in this case eight items; the composite power from the correct cart is higher than that from the TR, and that is what makes it authentic. Thus, with the current technique, the reader may detect energy and discriminate on the basis of the energy level, while a backscatter reader will read the tag when an equivalent energy level is present.

 C = Bw log2 1 +

S



N

(3)

where Bw = bandwidth in Hertz C = channel capacity in bits per second S = signal power N = noise power. This gives the theoretical ability of a channel to transmit information without errors for a given signal-to-noise (S /N ) ratio and a given bandwidth. This means that increasing the channel bandwidth, the transmitted power, or both, increases the channel capacity. One of the major advantages of the SS system is its robustness to interference. The system processing gain, Gp , quantifies the degree of interference rejection. The system processing gain is the ratio of bandwidth to the information rate and is given as Gp =

Bw R

.

(4)

Author's personal copy

42

J.Y. Maina et al. / Journal of Manufacturing Systems 26 (2007) 37–43

Fig. 7. Illustration of eight tags in the same cart at eight different distances to the reader antenna, and the energy level of the closest and most distant item [8].

The interference is processed as noise. The input and output S /N ratios are related as

 

 

S

N

= Gp o

S

N

.

(5)

i

At this point, the S /N ratio is related to the Eb /No ratio, where Eb is the energy per bit and No is the noise power spectral density:

  S

N

= i

Eb × R No × B

=

Eb No

×

1 Gp

.

(6)

From Eq. (5), Eb /No is expressed as Eb No

  = GP ×

 

S

N

= i

S

N

.

(7)

O

In the Section 5.1, Eb was used to determine the energy per chip, Ec , which in turn was used also to derive the safe energy, Es . The noise level is spread among the chip sequences, thereby reducing its effect to a negligible level. Noise in a manufacturing environment is generated by activities such as random electrical fluctuations, field radiations from motors

Author's personal copy

J.Y. Maina et al. / Journal of Manufacturing Systems 26 (2007) 37–43

or other electromagnetic devices, absorbing materials such as metals or fluids, and multi-paths caused by reflective surfaces. The cumulative energy discussed in Section 6 is not affected by noise such as multi-paths because the reflected wave when received will add to the cumulative energy regardless of the position, thereby aiding in the sensitivity of reception rather than distorting. This is a major contribution in the area of overcoming multi-path problems, particularly in manufacturing environments where such problems are prevalent. The CDMA RFID based on the robustness and immunity of CDMA to noise becomes suitable for industrial environment where a system might be dealing with multiple sources of noise and interferences. Based on experiments and tests, an absorbing object does reduce the efficiency of reception because by absorption the energy level of the received signal is reduced also, thereby affecting the overall reception. 8. Conclusions This research has produced the methodology for the use of code-division multiple access (CDMA) along with the EPCglobal coding scheme [8] with current RFID techniques, and has a solution to the problem of inter-tag interference while reducing read time. It is quite clear that the present protocol of transmission and reception cannot resolve the problem of inter-tag interference unless a time-multiplexing technique of some sort is employed. The time multiplexing, in turn, increases the read time in that the tags cannot actually be read simultaneously. From the example cited in this paper, the technique of dialog between reader and tags does not help in reducing communication latency. The implementation of the CDMA RFID technique thus will play a very important role in eradicating these problems, that is, simultaneous reading of multiple tags, inter-tag interference, and read time, which have been drastically reduced by the proposed technique. This technique applied in a manufacturing or warehouse environment will reduce interference and noise problems drastically due to the inherent noise and interference immunity of SS and CDMA techniques. Multi-path is a major problem for most wireless communications in manufacturing and warehouse environments; the CDMA RFID technique introduced in this paper does provide a good and vital remedy to this problem. References [1] Auto-ID center technical report. 860 MHz Class 0 radio frequency identification tag protocol specification candidate recommendation, Version 1.0.0. Cambridge (MA): Massachusetts Institute of Technology; 2003. [2] Billo RE, Porter JD, Mazumdar M, Brown SJ. Impact of bar code print quality

[3] [4] [5] [6] [7] [8]

[9]

43

on the performance of high-speed sortation systems. Journal of Manufacturing Systems 2003;22(4):317–26. Capetanakis JI. Tree algorithm for packet broadcast channels. IEEE Transactions on Information Theory 1979;IT-25(5):505–15. Garg VK, Smolik K, Wilkes JE. Applications of CDMA in wireless/personal communications. Englewood Cliffs (NJ): Prentice-Hall PTR; 1997. Hush DR, Wood C. Analysis of tree algorithms for RFID arbitration. In: Proc. of 1998 IEEE int’l symp. on information theory. 1998. Kaplan MA, Gulko E. Analytic properties of multiple-access trees. IEEE Transactions on Information Theory 1985;IT-31(2):255–63. Lafrance P. Fundamental concepts in communication. Englewood Cliffs (NJ): Prentice-Hall; 1990. Maina JY. Complex pulse forming technique using AM detector type circuitry and the application of CDMA to RFID for the simultaneous reading of multiple tags. Ph.D. dissertation. Pittsburgh: Univ. of Pittsburgh; 2004. Win MZ, Scholtz RA. Impulse radio: How it works. IEEE Communications Letters 1998;2(2):36–8.

Joshua Y. Maina received his Ph.D. degree from the University of Pittsburgh in 2004. He received a Master of science degree in electrical engineering (MSEE) from the University of Pittsburgh in 1999. He held a production engineering position with Sony Electronics, Inc. from 1999 to 2002. With a Bachelor of engineering (B.Eng.) degree in electrical and electronic engineering from the University of MaiduguriNigeria, he has held engineering positions with Kaborak Communications Nigeria Limited and the Nigerian Television Authority. His research interests are in wireless and RF communication, RFID technology and automatic data capture, multiple access techniques, and RF matrix systems. Professor Marlin H. Mickle received his Ph.D. degree from the University of Pittsburgh in 1967. He is currently the Nickolas A. DeCecco Professor and the executive director of the Swanson Center for Product Innovation. He is currently active in the areas of energy harvesting and high-technology applications, co-author and co-editor of more than 20 books and more than 125 referred publications. He has held engineering positions with IBM and Westinghouse and has also served as a program director of the Systems Theory and Applications program of the National Science Foundation. He is a life fellow of IEEE, the 1988 recipient of the Systems Research and Cybernetics Award of the International Institute for Advanced Studies in Systems Research and Cybernetics, and the 2005 recipient of the Carnegie Science Center award for excellence in corporate innovation. Michael R. Lovell received his Ph.D. degree from the University of Pittsburgh in 1994. Currently he is the associate dean for research, School of Engineering, at the University of Pittsburgh. Professor Lovell’s research is currently geared toward further improving manufacturing processes for electronic components. His most recent research activities have focused on developing methods for streamlining processes using virtual and physical simulation techniques, with emphasis on micro-and nano-scale manufacturing. He currently has funding to perform multidisciplinary product realization research (U.S. Dept. of Education, NCIIA, National Science Foundation, and McCune Foundation) and funding to improve micro-system product development and fabrication (Heinz Foundation, PPG, and Matthews International). Laura A. Schaefer received her Ph.D. from Georgia Tech in 2000, where she performed research on alternative (non-CFC) refrigerant mixtures and absorption cycles. At the University of Pittsburgh, her research is centered on the analysis, design, and optimization of energy systems. She is working in areas such as microchannel flows, fuel cells, sustainability, and heat transfer in 3D circuits. Dr. Schaefer holds various positions in the Advanced Energy Systems Div. of ASME and in the 1.1 and 8.3 TCs of ASHRAE.

Application of CDMA for anti-collision and increased ...

is the requirement of line of sight (reader to bar code) for reading. In some industrial .... Only four elements of the Walsh code are shown for simplicity of example.

1MB Sizes 1 Downloads 196 Views

Recommend Documents

A prescription for error-proofing and increased ...
Advancements in medicine are helping people live longer, resulting in a ... the world's healthcare systems, a worldwide nursing shortage has reached crisis proportions. due to an ... by eliminating the time spent constantly traveling to either the ..

Increased Automaticity and Altered Temporal Preparation Following ...
5.5 ± 0.7 39.2 ± 2.4. Mean RT (ms). 262 ± 6. 279 ± 6. 278 ± 4. 480 ± 24. Std Deviation of RT (ms). 70 ± 7. 81 ± 7. 95 ± 11. 569 ± 79. Number of false alarms.

Placement Performance Report Increased Transparency and ...
developed the Placement Performance report, which offers more insight into where ... Google Analytics, the Placement Performance report becomes a powerful ...

Serambi sees increased traffic and on...
channel, a Facebook page, an RSS feed, and email and text message mailing lists to keep ... Users may also see contextually targeted Google AdWords ads.

Increased network excitability and impaired induction of long-term ...
a Institute of Clinical Neuroanatomy, Goethe University Frankfurt, Theodor-Stern-Kai 7, ...... McDougle, C.J., Erickson, C.A., Stigler, K.A., Posey, D.J., 2005.

Multicarrier CDMA with OFDM as a Data Enhancement Strategy and ...
impulse response of this channel is described using ℎ, = , ,. Where, β k,n(t) is the independent and identically distributed (i.i.d) Rayleigh random variable for kth ...

Elliptic Curve Cryptography for MUD in CDMA - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, ... Access is a form of access scheme that has been widely used in 3G cellular ... Anyone with a radio receiver can eavesdrop on a wireless network, and ...

Elliptic Curve Cryptography for MUD in CDMA - IJRIT
wireless systems. ... Anyone with a radio receiver can eavesdrop on a wireless network, and therefore widely ... One main advantage of ECC is its small key size.

Power Control for Multirate DS-CDMA Systems With ... - IEEE Xplore
[25] B. M. Hochwald and S. ten Brink, “Achieving near-capacity on a multiple- antenna channel,” IEEE Trans. Commun., vol. 51, no. 3, pp. 389–399,. Mar. 2003.

Touch screen, location finder, GSM, EDGE, CDMA cellular and OFDM ...
Jan 15, 2008 - division multiplex signal is used in a Wireless local area network. ..... 3G Handsets and Basestations”, John Wiley & Sons, Ltd., Chichester,. West Sussex ... Overlaying A GSM Cellular System”, IEEE Vehicular Technology.

Application of VRML and PNML for Feature ...
CAD data of a part into a model of the manufacturing activities required to create the part. This paper presents .... Petri net models is that the same model is used for the analysis of behavioral ... Petri nets as graphical tools provide a powerful.

design & implementation of a ds-cdma based ...
The communication engineers have recently developed a multiple access technique, CDMA, for the ... Telecommunication from the College of Signals, NUST. ...... designed and built at the Naval Post Graduate School in Monterey, California.

PERFORMANCE OF MC-CDMA SYSTEMS WITH ...
MIMO structure, i.e., one with two transmit and two receive antennas. This so-called Alamouti code improves error rate performance without any power or bandwidth penalties. Space time block codes with four transmission antennas have also been develop

Implementation of Two-Level FH-CDMA with Non ...
The Frequency Hopping code division multiple access (FH-CDMA) gives high data and security to the data by assigning one hit FH pattern to ... by transmitting non-orthogonal sequences instead of data bits but in MFSK/FH-CDMA, the data rate is increase

CDMA Receiver using Compact Neural Network and ...
A neural network based CDMA (Code Division Multiple Access) receiver for multi-user detection is proposed. The Compact Neural Network based receiver is ...

Multicarrier CDMA with OFDM as a Data Enhancement Strategy and ...
Multicarrier CDMA with OFDM as a Data. Enhancement Strategy and rate matching using. OVSF code. 1 Srilakshmi P.R, 2 Mrs. Sapna B.A. 1 II M.E. Communication systems R.V.S College of Engineering and Technology. 2Asst.professor, R.V.S College of Enginee

Performance Improvement of DS-CDMA Wireless ...
CDMA technique for wireless communication networks always gives better ... Manish Rai is with the Galgotias College of Engineering and Technology,.

Design & Implementation of a DS-CDMA RAKE ...
Communication system designers of today are focusing on the concept of “Software Radio”, a highly flexible and programmable receiver that accomplishes most of its baseband processing in the digital domain. The underlying theme behind this revolut

Implementation of Two-Level FH-CDMA with Non-Orthogonal ...
Implementation of Two-Level FH-CDMA with Non-Orthogonal. Sequences for High Data Rate and Security. D.Venkata Reddy, K.KarunaKumari, Dr. R. Ramana Reddy. 1M.Tech, ECE, GITAM University, Vizag, [email protected]. 2Associate Professor, ECE, GITAM Uni

Design & Implementation of a DS-CDMA RAKE ...
recovery process. 2. System ... the forward link (Base station to Mobile Station) of a ... Data bits generated by user, either from a text or from a vocoder. Direct.

APPLICATION OF AN ADAPTIVE BACKGROUND MODEL FOR ...
Analysis and Machine Intelligence, 11(8), 1989, 859-872. [12] J. Sklansky, Measuring concavity on a rectangular mosaic. IEEE Transactions on Computing, ...

APPLICATION FOR STUDENT MEMBERSHIP SOCIETY OF ...
APPLICATION FOR STUDENT MEMBERSHIP. SOCIETY OF PETROLEUM GEOPHYSICISTS (REGD.) 1, OLD CSD Building, KDMIPE Campus. Kaulagarh ...