Real Time Digital Signal Processing Based On Optical OFDM
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
The adaptability provided for Eventually Tom's perusing OFDM may be connected as transfer speed granularity to the clients. Done such an approach that every about them will make guaranteed An certain level for service, yet those. Reconfigurability competencies and data transfer capacity duty to separate clients Previously, An optical. Orthogonal recurrence division Multiplexed entry (O-OFDMA) PON must be appropriately. Caught on. This fill in reports the improvemen for an test setup for IM/DD. O-OFDMA for following era PONs, specifically mulling over data transfer capacity work for. Different clients for future element data transfer capacity allotment methodologies.
Authors and Affiliations
Revathi G, K. Anitha
Reduction of the frequency offset influence in OFDM using an optimal PRS coding and MLSD
In this work a methodology for the synthesis of optimal correlative codes to reduce inter-carrier interference (ICI) in OFDM systems and maintain good BER performance at large frequency offsets is studied. For the sy...
Mobility Prediction: A review of Techniques used in MANETS
Mobility prediction for individual path is a fascinating topic. Mobility prediction in mobile ad-hoc networks is a simple and effective scheme to predict when the user will leave from the current location and where he...
Design of Parallel Advanced Encryption Standard (AES) Algorithm
The Advanced Encryption Standard (AES) is today’s key data encryption standard for protecting data, but the implementation of high-speed AES encryption engine needs a large number of hardware resources. In this paper...
Dynamic Authentication over Graphical Passwords using Visual Cryptography
CAPTCHA is a test build by computer programs which human can pass but computer programs cannot pass CAPTCHA as graphical passwords (CaRP) are a graphical password scheme used for a user access authentication. It is m...
Identifying Misuse of Data In Cloud
Cloud Storage Enables Users To Store Their Data Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protecti...