Implementation and Bit Error Rate analysis of BPSK Modulation and Demodulation Technique using MATLAB
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 9
Abstract
This paper presents the theoretical background of digital modulation and evaluate the performance of BPSK system with respect to Bit error Rate and finally implement Binary Phase shift Keying modulation technique in MATLAB. The main objective of any communication system is to receive the transmitted data accurately. There are lot digital modulation techniques that are well flourished in the communications field, selection of a suitable modulation technique for an application depends on many factors like Bit error rate, data rate, design complexity etc., one of the modulation techniques that is used in many areas of applications is the BPSK modulation. It is widely used due to its low BER and simplicity in design when compared to other modulation techniques. The BER for BPSK is performed using Matlab Graphical User Interface tool i.e., BERTool. The modulated signal is produced by modulating a carrier according to the binary code. The binary code taken here is the Gold code sequence. Such modulated signal is transmitted through AWGN channel. The resulting noisy modulated signal is demodulated using the BPSK demodulation technique. The complete system simulations are carried out in MATLAB R2008a and the same will be verified using Matlab Simulink environment.
Authors and Affiliations
G. Tharakanatha 1 , SK. Mahaboob kamal basha2 , Vijay Bhaskar chanda3 , I. Hemalatha
Power Tracing And Loss Allocation In A Power System By Using Bialek’s Algorithm
In electric power system a fair transmission pricing scheme is an important issue. The issue of power tracing helps to evaluate a fair and transparent tariff. A power tracing method would make it possible to charge the g...
Detection of Node Clones in Wireless Sensor Network Using Detection Protocols
Wireless sensor networks consist of hundreds to thousands of sensor nodes and are widely used in civilian and security applications. One of the serious physical attacks faced by the wireless sensor network is node clone...
Optimization of Cost in Cloud Computing Using OCRP Algorithm
In cloud computing, cloud providers can offer cloud consumers two provisioning plans for computing resources, namely reservation and on-demand plans. Reservation plan is cheaper than that provisioned by on-demand p...
Contingency Ranking and Analysis Using Mipower
Maintaining power system security is one of the challenging tasks for the power system engineers. The security assessment is an essential task as it gives the knowledge about the system state in the event of a contingenc...
Control of Moisture Content in Bagasse by Using Bagasse Dryer
Sugar mill wet bagasse is used as a fuel in sugar industry worldwide. The moisture content on the bagasse is effort on the calorific value (CV) of bagasse and boiler efficiencies. Industries and research institutes...