Tone Reservation Technique Based Clipping and Filtering Method for PAPR Reduction by Scaling Residual noise
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2016, Vol 5, Issue 4
Abstract
OFDM is an extinguishly used next-generation wireless transmission technique because of its easy equalization. OFDM can send over hundreds of parallel data streams via multiple carriers which makes the possibility of large data transfer. OFDM has two major drawbacks namely inter-symbol interference (ISI) problem and peak-to-average power ratio (PAPR). Coherent addition of independently modulated carriers, of an OFDM signal can give a large peak-to-average power ratio. Among those PAPR reduction methods, clipping method is the simplest method to use. However, using Clipping causes both in-band distortion and out-of-band distortion which are undesirable but this can be reduce by using filtering after Clipping. Another Possibility of PAPR reduction can be reserving several tones to generate a peak-cancelling signal (PCS). However, this method suffers from high computational complexity. To address this problem, this paper proposes a simple algorithm using residual noise reduction which is left after clipping and Filtering to satisfy tone reservation (TR) constraints and scaling with a scaling factor determined to minimize the out-of-range power generates the PCS. Our Simulations show a significant reduction in PAPR and Error rates.
Authors and Affiliations
Siva Prasad Valluri, Prashant K Shah
Identity Based Encryption Techniques for Secure Broker Less publish And Subscribe Systems
Far off data integrity checking is of relevant importance in cloud storage. It may possibly reach the consumers confirm whether or not their outsourced data is stored intact without downloading the whole data. In som...
Efficient Current Mode Multipliers in Signal Processing
This paper explains about the operation of the current mode multiplier circuits in signal processing. The multiplier/divider presents the advantage of very small linearity errors that can be obtained as a result of t...
Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE)
Attackers can look at vulnerabilities of a cloud system and compromise virtual machines to organize additional large-scale Distributed Denialof-Service (DDoS). DDoS attacks generally occupy early stage actions such as...
Finger Vein Based User Identification Using Differential Box Counting
The personal information can be protected in the form of biometrics which uses human physiological or behavioural features for personal identification. Finger vein ID is a biometric authentication system that matches...
Data Security in Cloud Computing using RSA Algorithm
Cloud Computing is an emerging paradigm which has become today’s hottest research area due to its ability to reduce the costs associated with computing. In today’s era, it is most interesting and enticing technology whi...