Performance Analysis and Coding of Blind Adaptive Fractional – Space Constant Modulus Algorithm
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
in bandwidth-efficient digital transmission, adaptive algorithm is widely used in the digital signal processing like channel estimation, channel equalization, echo cancellation, high definition television (hdtv) set-top cable demodulators, noninvasive medical diagnosis, geophysical exploration and image enhancement and recognition and so on. One of the most important and prevalent adaptive algorithms is the lms algorithm. We present in this paper a multiple objective optimization approach to fast blind channel equalization. By investigating first the performance (mean-square error) of the standard fractionally spaced cma (constant modulus algorithm) equalizer in the presence of noise, we show that cma local minima exist near the minimum mean-square error (mmse) equalizers. Consequently, fractional spaced cma may converge to a local minimum corresponding to a poorly designed mmse receiver with considerable large mean-square error. The step size in the lms algorithm decides both the convergence speed and the residual error level, the highest speed of convergence and residual error level.
Authors and Affiliations
Jaswant . , Sanjeev Dhull
A Novel Design for Sewerage Cleaning System by MCU Interfacing
The aim of this project is to create a much efficient and faster way of cleaning our sewage sumps and drainage system. This paper deals with the innovation aspect that can be done in the available system, which uses the...
“Pipe Inspection Robot” – Review
a pipe inspection robot is a device or an instrument use to inspect and clean the pipe either an industrial or nonindustrial. This is an innovation that took place in recent year to eliminate the human factor from the wo...
A new Approach of Blow fish Algorithm in the Network System
This paper is about encryption and decryption of the text, image, audio, video using a single key with 64 bits block cipher which is an improved the security from source to destination in the network system this algorit...
ASelf or Manual Destruction of Data and its Secure Migration among Different Clouds
As user’s store personal information in cloud, the information in cloud must be such that it is available at any point of time for different purposes. However, in a cloud-wide storage network, the servers are easily und...
A Cross Comparative Analysis of Sustainable Alternatives for Traditional Roofing in Kerala
Traditional architecture is not an architectural style. It is an attitude towards the culture of a society. Traditional architecture of Kerala is evolved overtime to meet the needs of the people (inhabitants) who live i...