Threshold Based Subcarrier Interleaving for Spy Works Prevention in OFDM Systems
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 2
Abstract
"OFDM (orthogonal frequency division multiplexing)systems are widely employed in Wireless Communication. but unfortunately they are susceptible overhearing by SPY(intruder). In this paper an anti-spy OFDM system through threshold based on dynamic subcarrier co-ordinate interleaving(coordinate interleaving) is proposed .here some of the OFDM subcarriers perform interleaving in an opportunistic manner at the transmitter .but the secret interleaving is determined by instantaneous channel state information (CSI) between transmitter and actual receiver. here a subcarrier symbol whose channel phase estimate is larger than a predefined threshold is co-ordinate interleaved .consequently spy works are prevented due to mismatched de-interleaving in the spy(EAVESDROPPER)."
The Relationship between Rebranding and Customer Loyalty: The Case of Kenya Power
Kenya Power and Lighting Company rebranded to Kenya Power. The rebranding exercise entailed name change, corporate color and logo. In this study, academic knowledge is enhanced with the help of a case study. As a result,...
Identification of Image Spam by Using Histogram and Hough Transform
Today, the internet is the most powerful tools throughout the world. But the explosive growth of unsolicited emails has prompted the development of numerous spam filtering techniques. It needlessly obstruct the entire sy...
The Coconut Mite, Aceria Guerreronis Keifer (Acari: Eriophydae)
"ABSTRACT The coconut mite, Aceria guerreronis Keifer, has emerged as a sporadic pest of the coconut plantations in India inducing serious damage. Coconut provides one third of the agricultural income in Kerala and a maj...
Optimization of Fermentation Parameters to Reduce Fermentation Time of Idli Batter Using RSM
Cereals and legume based foods are a major source of economical dietary energy and nutrients, worldwide. One of the popular among them is idli, fermented steamed product with a soft and spongy texture which is highly pop...
A Secure and Efficient Way of Accessing Encrypted Cloud Databases Using Adaptive Encryption Scheme
Now-a-days cloud computing is showing consistent growth in the field of computing. Users can utilize these services on pay-per-use basis. Database-as-a-service is a one type cloud computing service. DBAAS service provide...