International Journal of Innovative Computing, Information and Control
EditorinChief
Peng Shi, Faculty of Advanced Technology, University of Glamorgan, Pontypridd, CF37 1DL, United Kingdom (Email: pshi@glam.ac.uk)
CoEditorinChief
JengShyang Pan, Department of Electronic Engineering, National Kaohsiung University of Applied Sciences, Kaohsiung 807, Taiwan (Email: jspan@cc.kuas.edu.tw)
Executive Editor
Yan Shi, School of Industrial Engineering, Tokai University, 911, Toroku, Kumamoto 8628652, Japan (Email: yshi@ktmail.tokaiu.jp)
Advisory Board
Ramesh Agarwal, USA ChinChen Chang, Taiwan Tom Heskes, Netherlands Jerry M. Mendel, USA Witold Pedrycz, Canada Junzo Watada, Japan Naoyoshi Yubazaki, Japan
Associate Editors
Michael V. Basin, Mexico Liya Ding, Macau TzungPei Hong, Taiwan HsiangCheh Huang, Taiwan Bin Jiang, China Lei Li, Japan Magdi Mahmoud, Saudi Arabia Jagadis C. Misra, India Sing Kiong Nguang, New Zealand Pavel Pakshin, Russia Xiangshi Ren, Japan Koklay Teo, Australia Yuanqing Xia, China Jianqiang Yi, China
2011 ICIC INTERNATIONAL
Steve P. Banks, UK Hanfu Chen, China Lakhmi C. Jain, Australia Masaharu Mizumoto, Japan Bion L. Pierson, USA Xiaopeng Wei, China Lotfi A. Zadeh, USA
ShyiMing Chen, Taiwan Vasile Dragan, Romania ChaoHsing Hsu, Taiwan Yunfu Huo, China Katsuari Kamei, Japan BinYih Liao, Taiwan Anatolii Martynyuk, Ukraine Saeid Nahavandi, Australia Ngoc Thanh Nguyen, Poland Charles E. M. Pearce, Australia Hirofumi Sasaki, Japan Shaocheng Tong, China Mingqing Xiao, USA Lixian Zhang, China
ISSN 13494198
Tianyou Chai, China WaiChi Fang, USA V. Lakshmikantham, USA Chengsheng Pan, China Jianrong Tan, China Takeshi Yamakawa, Japan
Ozer Ciftcioglu, Netherlands Hugang Han, Japan Xiangpei Hu, China Gerardo Iovane, Italy Jien Kato, Japan Wenyuan Liu, China Angelo Miele, USA Masahiro Nakano, Japan Nikos Nikolaidis, Greece Fuji Ren, Japan M. N. S. Swamy, Canada Shuoyu Wang, Japan Edwin Engin Yaz, USA Lindu Zhao, China
PRINTED IN JAPAN
IJICIC
ISSN 13494198
Volume 7, Number 3, March 2011
International Journal of Innovative Computing, Information & Control
Sponsored by
Science Communication Institute, China Dalian University, China
Published by ICIC International http://www.ijicic.org
International Journal of Innovative Computing, Information and Control
Volume 7, Number 3, March 2011
CONTENTS
The Improvement of allDigital AmplitudeLocked Loop Separation Analysis Combined MIMO System GwoJia Jong and GwoJiun Horng 
1001 
Value Based Intelligent Requirement Prioritization (VIRP): Expert Driven Fuzzy Logic Based Prioritization Technique Muhammad Ramzan, M. Arfan Jaffar and Arshad Ali Shahid 
1017 
Generalization of Proxy Signature Based on Factorization ChengChi Lee, TzuChun Lin, ShiangFeng Tzeng and MinShiang Hwang 
1039 
A Novel High Capacity 3D Steganographic Algorithm MengTsan Li, NienChing Huang and ChungMing Wang 
1055 
RealTime Decentralized Neural Block Control: Application to a Two DOF Robot Manipulator R. GarciaHernandez, E. N. Sanchez, E. BayroCorrochano, V. Santibanez and Jose A. RuzHernandez 
1075 
A Supervising Authenticated Encryption Scheme for Multilevel Security ChienLung Hsu, LiangPeng Chang and TzongChen Wu 
1087 
Aesthetic Emotions in HumanRobot Interaction. Implications on Interaction Design of Robotic Artists Catalin Buiu and Nirvana Popescu 
1097 
Modeling, Design and Experiment of Improved SuperMini Underwater Robot Xin Song, ZaoJian Zou and JiaWei Ye 
1109 
Design and Approximation Capabilities Analysis of TimeVariant Fuzzy Systems Degang Wang, Wenyan Song and Hongxing Li 
1121 
Encoding Prior Knowledge into Data Driven Design of Interval Type2 Fuzzy Logic Systems Chengdong Li, Jianqiang Yi and Tiechao Wang 
1133 
Generation and Application of Decision Rules within DominanceBased Rough Set Approach to Multicriteria Sorting Liping An, Zengqiang Chen and Lingyun Tong 
1145 
Automatic Classification of Driving Mental Fatigue with EEG by Wavelet Packet Energy and KPCASVM Chunlin Zhao, Chongxun Zheng, Min Zhao, Jianping Liu and Yaling Tu 
1157 
3D Triangle Mesh Compression Based on Vector Quantization with k Ring Vector Prediction LinLin Tang, ZheMing Lu, FaXin Yu, PingHui Wang and Zhen Li 
1169 
( Continued ) 
2011 ICIC INTERNATIONAL
ISSN 13494198
PRINTED IN JAPAN
International Journal of Innovative Computing, Information and Control
Volume 7, Number 3, March 2011
CONTENTS ( Continued )
An Efficient Simulated Annealing with a Valid Solution Mechanism for TDMA Broadcast Scheduling Problem Gon Kim, Sung Soo Kim, IlHwan Kim, Dong Hoi Kim, V. Mani and JaeKi Moon 
1181 

Scalable and Systolic Dual Basis Multiplier over GF(2 ^{m} ) LiangHwa Chen, PoLun Chang, ChiouYng Lee and YingKuei Yang 
1193 

A 
FuzzyBased Rough Sets Classifier for Forecasting Quarterly PGR in the Stock 

Market (Part II) ChingHsue Cheng and YoushYang Chen 
1209 

ReEvaluation of Adaptive 
X 
Control Charts: A CostEffectiveness Perspective 
1229 

YanKwang Chen, HungChang Liao and HsuHwa Chang 

Inventory Management in a (Q,r) Inventory Model with Two Demand Classes and Flexible Delivery 
1243 

Shuo Huang, Bo Liao and David J. Robb 

A 
Novel Text Watermarking Algorithm Using Image Watermark 
1255 

Zunera Jalil, M. Arfan Jaffar and Anwar M. Mirza 

An Efficient and Secure ThreePass Authenticated Key Agreement Elliptic Curve Based Protocol 
1273 

Zeyad Mohammad, ChienLung Hsu, YawChung Chen and ChiChun Lo 

Indicator of the Quality of the Sensor Set Up: A Study Using Surface EMG on SubBand ICA 
1285 

Ganesh R Naik and Dinesh K Kumar 

H _{} Filtering for Markovian Jump Systems with TimeVarying Delays Jinliang Liu, Zhou Gu and Songlin Hu 
1299 

Surface Texture Characterization of Fibers Using Fractional Brownian Motion Model 
1311 

JiunJian Liaw, ChuanPin Lu and LinHuang Chang 

Power Grid Node and Line Delta Centrality Measures for Selection of Critical Lines 

in 
Terms of Blackouts with Cascading Failures 
1321 

Hwachang Song, Rodel D. Dosano and Byongjun Lee 

Optimizing MIMOSDMA Smart Antennas by Using Linear Array Phase Perturbations Based on Particle Swarm Optimization 
1331 

ChaoHsing Hsu 

An Environmental Visual Features Based Navigation Method for Autonomous Mobile Robots 
1341 

Fairul Azni Jafar, Yasunori Suzuki, Yuki Tateno, Kazutaka Yokota and Takeshi Matsuoka 

( Continued ) 
2011 ICIC INTERNATIONAL
ISSN 13494198
PRINTED IN JAPAN
International Journal of Innovative Computing, Information and Control
Volume 7, Number 3, March 2011
CONTENTS ( Continued )
ObserverBased Iterative Learning Control with Evolutionary Programming Algorithm for MIMO Nonlinear Systems 1357 

YanYi Du, Jason ShengHong Tsai, ShuMei Guo, TeJen Su and ChiaWei Chen 

Reversible Data Hiding for VQ Indices Using Prediction Errors 
1375 

Zhihui Wang, ChinChen Chang, Huynh Ngoc Tu and MingChu Li 

A 
Novel Technique for Designing Decentralized Stabilizers for Robust Control 

in 
Power Systems Using an H _{} Criterion Alexandre C. Castro, Jose M. Araujo, Eduardo T. F. Santos, Fabricio G. S. Silva and Clivaldo S. de Araujo 
1387 
A 
Study of Three Novel LineBased Techniques for MultiTarget Selection 
1397 
Jibin Yin and Xiangshi Ren 

A 
Novel Modal Series Representation Approach to Solve a Class of Nonlinear 

Optimal Control Problems 
1413 

Amin Jajarmi, Naser Pariz, Ali Vahidian Kamyad and Sohrab Effati 

Adaptive Frame Length Method for Hardware ContextSwitching in Dynamic Partial SelfReconfigurable Systems 
1427 

TrongYen Lee, CheCheng Hu, YangKun Huang and ChiaChun Tsai 

An IDBased Access Control in a Hierarchical Key Management for Mobile Agent 
1443 

ChiaHui Liu, YuFang Chung, TzerShyong Chen and ShengDe Wang 

Meaningful Shadow Based Multiple Gray Level Visual Cryptography without Size Expansion 
1457 

PeiYan Pai, ChinChen Chang, YungKuan Chan and ChiCheng Liao 

ServiceOriented Routing and Clustering Strategies for Vehicle Infotainment Dissemination 
1467 

ChennJung Huang, ChinFa Lin, ChingYu Li, CheYu Lee, HengMing Chen HungYen Shen, YouJia Chen and IFan Chen 

An Optimal Fuzzy Controller for a HighPerformance Drilling Process Implemented Over an Industrial Network 
1481 

Rodolfo E. Haber, Agustin Gajate, Steven Y. Liang, Rodolfo HaberHaber and Raul M. del Toro 

New Secret Key Traitor Tracing Scheme with Dispute Settlement from Bilinear Maps 1499 
KuoYu Tsai, TzongChen Wu and ChienLung Hsu
2011 ICIC INTERNATIONAL
ISSN 13494198
PRINTED IN JAPAN
International Journal of Innovative Computing, Information and Control
AIMS AND SCOPE OF IJICIC
The primary aim of the International Journal of Innovative Computing, Information and Control (IJICIC) is to publish highquality papers of new developments and trends, novel techniques and approaches, innovative methodologies and technologies on the theory and applications of intelligent systems, information and control. The IJICIC is a peerreviewed English language journal and is published monthly.
The scope of the IJICIC is in the broad areas of intelligent systems, information and control, includes but not limited to:
1. Intelligent Systems and Innovative Computing
Artificial intelligence and expert systems, approximate reasoning, fuzzy systems and rough sets, fuzzy optimization and decision making, evolutionary computation, intelligent information systems, image and speech signal processing, humanmachine learning, neural networks, knowledge discovery, data mining, clustering and data analysis, decision support systems, intelligent fault detection and identification, knowledgebased systems, hybrid intelligent systems, soft computing, management science
2. Information and Control
Information theory and applications, optimal, adaptive, predictive, robust, fuzzy and reliable control and filtering on linear and nonlinear systems, stochastic systems, hybrid systems, supervisory systems, guidance and navigation systems, realtime systems, discrete event systems, signal and image processing, system identification, optimization techniques, robustness analysis, learning systems, fault detection, robotics and motion control, manufacturing systems, power systems, networked control systems, environmental and bioengineering, complex and large scale systems, bioinformatics, control education, transportation systems
SUBSCRIPTION
Library/Institutional/ Individual Rates:
Hard copy (Printing): JPY66,000 CD: JPY33,000 Hard copy with CD: JPY90,000
The charge includes postage, packing, handling and surface delivery of all issues.
IJICIC Editorial Office Tokai University, Kumamoto Campus 911, Toroku, Kumamoto 8628652, Japan Phone: +81963862666 Fax: +81963862666 Email: office@ijicic.org
2011 ICIC INTERNATIONAL
ISSN 13494198
PRINTED IN JAPAN
International Journal of Innovative Computing, Information and Control Volume 7, Number 3, March 2011
ICIC International ⃝c 2011 ISSN 13494198
pp. 1001–1015
THE IMPROVEMENT OF ALLDIGITAL AMPLITUDELOCKED LOOP SEPARATION ANALYSIS COMBINED MIMO SYSTEM
GwoJia Jong and GwoJiun Horng
Department of Electronic Engineering National Kaohsiung University of Applied Sciences Chien Kung Campus 415, Chien Kung Road, Kaohsiung 807, Taiwan gjjong@cc.kuas.edu.tw
Received July 2009; revised June 2010
Abstract. The mobile communication is often interfered by any type of noises. The all digital phaselocked loop (ADPLL) system has been successfully used for decades in order to track the carrier phase of a frequency modulation (FM) signal. In this paper, we com bine the ADPLL and the alldigital amplitudelocked loop (ADALL) system structure for modulation signals of the separation cochannel transmission system. It is demonstrated cochannel separation signals from FM system with the results of simulation experiments. The least mean square (LMS) theory is introduced more eﬃciently to eliminate the noise interference and to separate the multichannel signals. This paper is also shown and demonstrated the multichannel signal in FM system which is combined the ADPLL and the ADALL algorithms with an adaptive ﬁnite impulse response (FIR) ﬁlter. The multi channel transmission with the additive white Gaussian noise (AWGN) interference has been solved by using the proposed algorithm. The demodulated signals are operated and demodulated by the LMS algorithm. The separation signals of the multichannel can be obtained the prefect performance and process for high speed and low cost. The proposed system of this paper is the virtue and advantage to implement the communication security ﬁeld. In general words, it can be substituted and replaced the encryption (or decryption) system. Keywords: ADPLL, ADALL, FM, FIR, LMS, Communication security, Encryption
1. Introduction. Over the last decades, digital communication has become one of the basic technologies for out modern life. Only when using digital transmission, information can be transported with moderate power consumption, high ﬂexibility and especially over long distance, with much higher reliability than by using conventional analog modulation. Thus, the communication world has been going digital [1]. When regarding digital transmission, we have to consider two dominant impairments. Firstly, the signal is corrupted by additive white Gaussian noise environment, which can be thermal noise of the receiver frontend or crosstalk caused by other users transmitting in the same frequency band. Secondly, the transmission media is dispersive. This situation can be described as a linear system with some speciﬁc transfer function, where attenuation and phase coeﬃcients are varied with frequency. This property causes the frequency components to be aﬀected diﬀerently. The channel transmission signal is distorted for the transmitted pulses in the time domain [26]. The ADPLL system has been successfully used for decades in order to track the car rier phase of an FM signal. It is proposed to analysis suppress the inband interference problem eﬃciently. The ADPLL demodulated outputs contain large inband spikes and get some unintelligible turbulence. In this paper, a novel separation algorithm is pro posed for canceling cochannel interference (CCI) communication system by the ADALL
1001
1002
G.J. JONG AND G.J. HORNG
method. This technique is adopted to eliminate the interference of the ADPLL in wire less transmission channel. It includes to solve many extrinsic factors such as intersymbol interference (ISI), multipath interference, ﬂatfading channel and AWGN channel. The ADALL system can separate the dominant and the subdominant signals each other. This scheme is obtained got the low complex computation and compressed the CCI eﬀect.
2. A Digital Procedure of AllDigital PLL. Phaselocked loops (PLL) are widely used in modern electronic systems. The applications include synchronization, tracking demodulation, ranging, etc. The continued progress in increasing performance, speed and the simultaneous in size and cost of integrated circuits have resulted in strong interest in the implementation of the ADPLL, which can be made more ﬂexible, versatile, compact, stable and reliable than its analog counterpart. The classic PLL consists of three major function units: a phase detector (PD), a loop ﬁlter (LF) and a voltagecontrolled oscillator (VCO). For ADPLL, the voltagecontrolled oscillator is named numericallycontrolled oscillator (NCO) or digitallycontrolled oscilla tor (DCO) [7]. The synchronization concept plays a major role in the ﬁelds of digital data transmission, radar and navigation system. The phase detection is an important topic in the synchro nization problems of digital communication systems. Based on the maximum likelihood estimation principle, the conventional analog PLL system has been developed to treat the nonlinear phase detection problem. The ADPLL has been also studied over year. However, this conventional ADPLL is a gradientbased searching algorithm to solve the highly nonlinear problem, it may lead to a local result. Furthermore, the conventional ADPLL is sensitive to the initial conditions, variation of parameters [8].
A. Basic Model of AllDigital PhaseLocked Loop. A block diagram of ADPLL and its phase model are shown in Figures 1 and 2, respectively [7]. The loop’s output signal is desired and named by the phase error φ = θ _{i} − θ _{o} .
Figure 1. Block diagram of ADPLL
Figure 2. Phase model of ADPLL
The discrete input and output signals of Figure 1 can be written as
V _{i} (k) = V _{i} sin [ω _{0} Tk + θ _{i} (k)] ,
k = 0, 1, 2,
(1)
THE IMPROVEMENT OF ADALL SEPARATION ANALYSIS
1003
(2)
where ω _{0} is the central angular frequency of the input signal to be tracked, V _{i} (k) and V _{o} (k) are the maximum amplitudes of the signals sampled by k. The phase detector considered is a multiplier whose output is given by
V _{o} (k) = V _{o} cos [ω _{0} Tk + θ _{o} (k)] ,
k = 0, 1, 2,
V _{d} (k) = K _{d} V _{i} (k) V _{o} (k)
K d V i V o
_{=}
_{2}
{sin [θ _{i} (k) − θ _{o} (k)] + sin [2ω _{o} Tk + θ _{i} (k) + θ _{o} (k)]} _{,}
k = 0, 1, 2,
(3)
where K _{d} is represented the phase detector gain. Equation (3) is deﬁned a secondharmonic term added to a nonlinear function of ϕ (k). It is a common assumption that the secondharmonic term of (3) and Figure 2 will be ﬁltered by the discretetime loop ﬁlter. The discretetime loop ﬁlter is considered and characterized by a ﬁrstorder transfer function, shown as:
(4)
Since the order of loop is the order of its loop ﬁlter plus one. The ADPLL is a second
order loop whose dynamics can be described by the following diﬀerence equation:
C 2
1 −
_{z} _{−}_{1}
D(z) = C _{1} +
ϕ (k + 2) − 2ϕ (k + 1) + ϕ (k) = θ (k + 2) − 2θ (k + 1) + θ (k) − rK _{1} sin [ϕ (k + 1)]
+ K _{1} sin [ϕ (k)] ,
k = 0, 1, 2,
(5)
digitallycontrolled
oscillator gain. When the phase error is small, then the approximation sin ϕ ≈ ϕ is valid and the sinusoidal nonlinear can be removed. ADPLLs are being implemented in the coherent communication systems for a long time in carrier regenerating and clock time recovery purposes. The theory and the design techniques of an ADPLL are well known. ADPLLs are drawing the attention of research workers till now because they are basically nonlinear feedback control loops in the discrete time domain and their dynamical behavior is not completely known [9].
where K _{1} = K _{o} K _{d} C _{1} , r = 1 + C _{2} /C _{1} and K _{o} is represented the
3. AllDigital AmplitudeLocked Loop of CCI.
A. Frequency Modulation (FM). A narrowband digital FM with frequency detection
has been widely used. A conventional [1012] PLL has been often operated as a frequency detector. The PLL detector (PLD) has the native frequency tracking ability as a tracking ﬁlter and is possible to track very rapid center frequency variation of the input FM signal such as Doppler shifts from low earth orbit (LEO) satellites. We adopt the FM scheme to analyze the FM separation, it can be rewritten as follows:
y (t) = A _{c} cos [ω _{c} t + ϕ _{1} (t)] + mA _{c} [cos ω _{c} t + ϕ _{2} (t)] = r (t) cos [φ _{1} (t)] (6)
where
(7)
ω _{d} t = ϕ _{2} (t) − ϕ _{1} (t)
B. Cochannel Interference under AWGN Channel. Typical methods for reducing
cochannel FM interference, it estimates the stronger signal’s instantaneous frequency amplitude and phase. CCI is the interference due to the mixture of signals with similar carrier frequencies. It is necessary to ﬁnd eﬃcient techniques to reduce the harmful eﬀects of CCI in FM analogue or digital communication system. The mobile users often operate in the presence of cumbersome interference along with multipath, Rayleigh fading channel and AWGN channel that leads to signal distortion
1004
G.J. JONG AND G.J. HORNG
and signal fading at the receiver. The interference between signals from these cells is called CCI. The cochannel signals are transmitted by the same carrier frequency f _{c} in the AWGN channel. Accordingly, the complex representation of the received signal is deﬁned as
y(t) = y _{1} (t) + my _{2} (t)
=
A _{c}
= A
_{c}
cos [ 2πf _{c} t + 2πk _{f}
cos [2πf _{c} t + θ _{1} (t)]
∫ t m _{1} (τ )dτ ] + mA _{c} cos [ 2πf _{c} t + 2πk _{f} ∫ t m _{2} (τ )dτ ]
0
0
+ mA _{c} cos [2πf _{c} t + θ _{2} (t)]
and
θ _{i} (t) = 2πk _{f} ∫ t m _{i} (τ )dτ,
0
i = 1, 2
(8)
(9)
The parameter m is deﬁned as the interference to carrier ratio (ICR). It is denoted in Equation (8) and the vector diagram is shown in Figure 3.
y(t) = A _{c} {cos [2πf _{c} t + θ _{1} (t)] + mA _{c} cos [2πf _{c} t + θ _{2} (t)]} = r(t) cos φ _{1} (t) (10)
where
(11)
ω _{d} t = θ _{2} (t) − θ _{1} (t)
Figure 3. Phase diagram of phase modulation with noise
From Figure 3, it can be found a(t) = mA _{c} cos ω _{d} t, b(t) = mA _{c} sin ω _{d} t for the following equations:.
r(t) = √ [A _{c} + a(t)] ^{2} + b ^{2} (t)
= 2A _{c} a(t) + a ^{2} (t) + b ^{2} (t)
^{√} A 2 c 
+ 

√ A 2 c 
+ 
2 
cos ω _{d} t + A 
2 
m ^{2} cos ^{2} ω _{d} t + A 
2 
m ^{2} sin ^{2} ω _{d} t 

c 
c 
c 
= 2mA
= A _{c} ^{√} 1 + 2m cos ω _{d} t + m ^{2}
(12)
THE IMPROVEMENT OF ADALL SEPARATION ANALYSIS
φ(t) = tan ^{−}^{1}
^{b}^{(}^{t}^{)}
A _{c} + a(t) ^{=} ^{t}^{a}^{n} _{−}_{1}
mA _{c} sin ω _{d} t ω d t _{=} _{t}_{a}_{n} _{−}_{1} A _{c} + mA _{c} cos
φ _{1} (t) = 2πf _{c} t + θ _{1} (t) +
φ(t)
m sin ω _{d} t
1 + m cos _{ω} _{d} _{t}
1005
^{(}^{1}^{3}^{)}
(14)
In this paper, the FM transmitted signals are operated at the same carrier frequency, the transmission channel results in the cochannel interference (CCI). For the convenient reason, we adopt the ADPLL FM model for the FM scheme to analyze the FM separation system. In wireless transmission channel system, it is included many extrinsic noise interference factors such as ﬂatfading channel, AWGN channel, multipath channel, etc. This com posite signals go through ideal bandpass ﬁlter (BPF) completely and the wideband noise naturally because the narrownband noise. The bandlimited noise is obtained in terms of inphase and quadrature components and represented by
n(t) = n _{I} (t) cos(2πf _{c} t) − n _{Q} (t) sin(2πf _{c} t) (15)
where n _{I} (t) and n _{Q} (t) are the inphase and quadrature noise components of n(t), respec tively. Equivalently, we may express n(t) in terms of its envelope and phase as
(16)
where
n(t) = r _{n} (t) cos [2πf _{c} t + ϕ(t)]
and
r _{n} (t) = √ n _{I} (t) + n _{Q} (t)
2
2
ϕ _{n} (t) = tan ^{−}^{1} ^{n} n ^{Q} _{I} (t) ^{(}^{t}^{)}
Figure 4. ADPLL FM model with noise
The phase diagram of phase modulation with noise signal is shown as Figure 4. The mathematical representation of this two modulated cochannel FM signals under AWGN channel can be described as:
y _{n} (t)
= s(t) + i(t) + n(t)
= A _{c} cos [2πf _{c} t + θ _{1} (t)] + mA _{c} cos [2πf _{c} t + θ _{2} (t)] + r _{n} (t) cos [2πf _{c} t + ϕ _{n} (t)]
= r(t) cos φ(t) + r _{n} (t) cos
= R(t) cos φ _{2} (t)
[2πf _{c} t + ϕ _{n} (t)]
φ _{2} (t) = 2πf _{c} t + θ _{1} (t) + φ(t) + φ _{n} (t)
(17)
(18)
1006
where
and
G.J. JONG AND G.J. HORNG
ω _{d} t = θ _{2} (t) − θ _{1} (t)
˙
˙
ω _{d} = θ _{2} (t) − θ _{1} (t)
ω _{n} t = ϕ _{n} (t) − θ _{1} (t) − φ(t)
˙ ˙
ω _{n} = ϕ _{n} (t) − θ _{1} (t) − φ˙ (t)
(19)
(20)
Figure 5. Systemlevel depiction of ALL application
From Figure 5, it can be found c(t) = r _{n} (t) cos ω _{n} t, d(t) = r _{n} (t) sin ω _{n} t
R(t) = √ [r(t) + c(t)] ^{2} + d ^{2} (t)
= √ r ^{2} (t) + 2r(t)r _{n} (t) cos ω _{n} t + r _{n} (t) cos ^{2} ω _{n} t + r _{n} (t) sin ^{2} ω _{n} t
2
2
= ^{√} r ^{2} (t) + 2r(t)r _{n} (t) cos ω _{n} t + r _{n} (t)
2
φ _{n} (t) = tan ^{−}^{1}
^{d}^{(}^{t}^{)}
r _{n} (t) sin ω _{n} t
r(t) + c(t) ^{=} ^{t}^{a}^{n} _{−}_{1} r(t) + r _{n} (t) cos _{ω} _{n} _{t}
(21)
^{(}^{2}^{2}^{)}
The envelope and phase of the receiver are represented (21) and (22), respectively. The phase mathematical representation of two modulated cochannel FM signals under AWGN channel for ADPLL model is shown as Figure 5.
C. ADALL Analysis in the DiscreteTime. The conventional amplitudelocked loop (ALL) conﬁguration is a feedbackbased control system, the dual of the familiar phase locked loop (PLL). The ALL functions have been provided for applications such as tuning the Qfactor in integrated bandpass ﬁlters, noise cancellation, suppression of cochannel FM interference and demodulation of suppressed carrier signals [1]. More recently, ALLs have begun to adopt in high data rate wireless communication systems. Many modulation schemes used to achieve high data rates have nonconstant envelopes, creating stringent linearity requirements for power ampliﬁers (PAs) [13]. To proceed with the ADALL analysis, we replace each blocks of Figure 5. It is demon strated the systemlevel depiction of ALL application for the frequencydomain equivalent, individually. It is shown and represented as Figure 6. Here A _{D}_{E}_{S} is the desired amplitude input to the comparator and A _{O}_{U}_{T} is represented by a summing junction and the gain block Kc. The loop ﬁlter is assumed to have a transfer function F (s), the variable gain amplitude (VGA) is assumed to have a linear gain characteristic with a slope of K _{V} _{G}_{A} , and the peak detector is approximated as having a onepole response with a lowfrequency gain of K _{P}_{D} . In this ADALL analysis, we assume that the amplitude of the input signals to the K _{V} _{G}_{A} and A _{I}_{N} , remains constant and thus is incorporated into the gain of the
K V GA .
THE IMPROVEMENT OF ADALL SEPARATION ANALYSIS
1007
Figure 6. Frequencydomain analysis model of ADALL
The transfer function of Figure 6 for the frequencydomain for of the system is deﬁned as:
A _{O}_{U}_{T} (s)
_{(}_{s}_{)} = H(s) =
A DES
KF (s)(1 +
ω
^{s}
PD
)
s
1 + _{ω} PD + KF(s)
^{(}^{2}^{3}^{)}
where it is assumed K _{P}_{D} = 1 and K = K _{C} A _{I}_{N} K _{V} _{G}_{A} . It is also expressed the loop gain of the system as:
(24)
^{K}^{F}^{(}^{s}^{)}
^{s}
G(s) =
1 +
ω PD
We substitute in the transfer function for various choices of loop ﬁlters, and examine their eﬀects on the stability and transient response of the ALL. Consider the case for the loop ﬁlter is a simple gain, which can be incorporated into the constant K. From (24), we consider the loop is unconditionally stable and from (23) we express the closedloop transfer function as:
H(s) =
^{K}
1 + K
1 +
^{s}
ω
PD
s
1 + _{ω} PD ^{(}^{1} + K)
(25)
From this, we see that the setting time will be determined by the pole of the peak detector, ω _{P}_{D} , in conjunction with the gain factor K. It is also clear that the output will have a steadystate amplitude error, determined by the size of K. As K increases, the steadystate amplitude error reduced. To eliminate the steadystate amplitude error, we replace the simple gain with an integrator. From (24), we see that the loop remains unconditionally stable; however, it may be necessary to add a zero to the loop ﬁlter to maintain a desired phase margin. From (23), it is replaced the new closedloop transfer function as:
Kω _{P}_{D} (1 +
^{s}
ω
PD
)
(26)
s ^{2} + sω _{P}_{D} + Kω where we have again incorporated the loop ﬁlter gain into the constant K. By equating the denominator to the standard form of the secondorder characteristic equation, we can solve the damping factor and the natural frequency of the loop:
H(s) =
PD
ξ
= ^{1}
_{2} √ ^{ω} ^{P}^{D} ,
K
ω _{n} = ^{√} Kω _{P}_{D}
(27)
Using (27), we design the loop to achieve the desired loop dynamics. More complex loop ﬁlter choices are also possible, and can be analyzed for stability and transient behavior in a manner to that carried out above.
1008
G.J. JONG AND G.J. HORNG
D. The Separation Signal for the ADPLL and ADALL Analysis for Adaptive FIR Filter. The separation system of transmission communication system block model is shown in Figure 7. The adaptive FIR ﬁlter is proposed for detecting the variation of the dominant and subdominant signals. Both of dominant and subdominant signals are through the ADPLL and ADALL separation model. We developed and derived new algorithm for the discrete and digital mathematical representations of the ADPLL and ADALL discrete output signals.
Figure 7. The separation system for the ADPLL and ADALL analysis for adaptive FIR ﬁlter
It is demodulated by an ideal ADPLL demodulator for the output signal f _{A}_{D}_{P} _{L}_{L} (τ ). The detail derivation mathematical functions are shown as the following equations and Appendix 1 [35].
f ADALL (τ) =
· τ ) _{2} ^{)} × 1 + 4m · cos (
1
_{·} _{τ} ) , √ 2 ·
−m (m − 1) ^{2} ) ^{×}
2ω _{d} · τ ) 2
1
×
×
−2 · ( 1 − cos (
1
− 2m + m ^{2}
2ω _{d}
2ω _{d}
√ (m − 1) ^{2}
1 − 2m + m ^{2}
sin (
2 · ω _{d} · τ )
1
EllipticE ( cos (
√ 1 + 4m · cos (
2ω _{d} · τ ) 2
1
− 2m + m ^{2}
τ
The dominant signal is derivative as follows:
1
f ADP LL (τ) × f ADALL−2 (τ) =
2
ω _{d} · di log(m · e ^{i}^{ω} d ^{τ} + 1) ^{·} ^{s} ^{1} ^{(}^{τ}^{)}
+
1
2
) · f _{A}_{D}_{A}_{L}_{L}_{−}_{1} (τ) · s _{2} (τ)
ω _{d} · di log ( −
_{e} iω _{d} τ
m
(28)
^{(}^{2}^{9}^{)}
THE IMPROVEMENT OF ADALL SEPARATION ANALYSIS
1009
The subdominant signal is derivative as follows:
f ADP LL (τ) × f −(ADALL−1) (τ)
1 2 f ADALL−1
(τ)
= ω _{d} · di log(m · e ^{i}^{ω} d ^{τ} + 1) ^{·}
f ADALL−2 (τ) ^{·} ^{s} ^{1} ^{(}^{τ}^{)}
+
1 2 ) · f −(ADALL−1) (τ) · f ADALL−1 (τ)
_{e} iω _{d} τ
m
f ADALL−2 (τ)
ω _{d} · di log ( −
·
s _{2} (τ)
(30)
4. MultiChannel FM Signals with MultiInput MultiOutput (MIMO) Model for Adaptive FIR Filter llDigital AmplitudeLocked Loop of CCI. We present the theory and application of optimum linear ﬁlters and predictors. It is concentrated on linear ﬁlters for the optimum in the sense of minimizing the mean square error (MSE). The minimum MSE (MMSE) criterion leads to a theory of linear ﬁltering that is elegant and simple, involves only secondorder statistics and is useful in many practical applications. The optimum ﬁlter is designed for a given set of secondorder moments can be used for any realizations of stochastic processes with the same moments [25]. The MIMO communication techniques have been an important area of focus for next generation wireless systems because of their potential for high capacity, increased diversity and interference suppression. For applications such as wireless and mobile communica tions, MIMO systems will likely be deployed in environments where a single base be communicated with many users simultaneously [30]. Wireless systems with transmit and receive diversity have become a very attractive area of research due to the potential of achieving extraordinarily high data bit rates and high spectral eﬃciency. In this section, we suggest a systematic design procedure to the adaptive equalization problem for timevarying channels [26]. For given adaptive ﬁnite impulse response (FIR) MIMO channels with maximum al lowable average input powers, the transmitter and receiver adaptive FIR MIMO ﬁlters are jointly optimized such that the MSE between the desired and reconstructed signals is minimized [29]. It is well known that in a MIMO system with n _{T} transmit and n _{R} receive antennas. The communication channel capacity grows linearly with min (n _{T} , n _{R} ). It is also desirable to transmit the same informationbearing signal over several channels. The mode of transmission is used primarily in situations where there is high probability that one or more of the channels will be unreliable from time to time [32]. The MIMO channel with n _{T} transmitters and n _{R} receivers is typically represented as a matrix H of dimensions n _{R} × n _{T} , where each of the coeﬃcients [H] _{i}_{,}_{j} represents the transfer function from the j ^{t}^{h} transmitter to the i ^{t}^{h} receiver. We denote the signal or symbol transmitted from the j ^{t}^{h} transmitter y _{j} , and collect all such symbols into an n _{T} dimensional vector y. With this notation, the matrix model of the channel is
(31)
s = Hy + w
where w is a vector of additive noise with a variance of σ _{n} and s is the vector of received data, with an element in w and s for each receive antenna. In a pointtopoint MIMO link (singleuser case), all outputs are available to the user for processing. In the multiuser case, the n _{R} receivers are distributed among diﬀerent users; for example, if each user has only one antenna, each user has access to only one element of s. H is the narrowband transmission matrix of the MIMO channel, the complex correlation coeﬃcient between antenna elements i and j at the transmitter or at the receiver side is
2
1010
given in accordance with as:
G.J. JONG AND G.J. HORNG
_{ρ} T _{x} ,R _{x} i,j
=
R
T _{x} ,R _{x}
i,j
√
σ
T _{x} ,R
i
2
x
T _{x} ,R
j
σ
2
x
(32)
between the interacting
antenna elements i and j at the transmitter or at the receiver and the respective variances
σ
matrices R ^{T}^{x} and R ^{R}^{x} as follows:
. Antenna correlations at the T _{x} and R _{x} sides are combined in correlation
Antenna correlation ρ ^{T} ^{x} ^{R} ^{x} depends on antenna covariance R
i,j
T _{x} R
i
2
x
and σ
T _{x} R
j
2
x
T x R x i,j
_{R} T _{x} ,R _{x} _{=}
_{ρ} T x R x
11
_{ρ} T x R x
21
.
.
.
_{ρ} T x R x
n1
···
···
.
···
···
···
^{.}
^{.}
.
···
ρ ^{T} ^{x} ^{R} ^{x}
1n
ρ ^{T} ^{x} ^{R} ^{x}
2n
.
ρ ^{T} ^{x} ^{R} ^{x} nn
_{n} T x ,R x _{×}_{n} T x ,R x
(33)
For this reason, R ^{T} ^{x} and R ^{R} ^{x} explicitly determine the correlations within the regarded channel model. Subsequently, the eigenanalysis method is used to compute the eigen
values λ _{k} with k = 1,
gains of the respective subchannels, where [·] ^{H} denotes Hermitian transpose. Each chan nel matrix is given by n ^{T} ^{x} transmit and n ^{R} ^{x} receive antennas, it oﬀers K ≤ min ^{(} n ^{T} ^{x} , n ^{R} ^{x} ^{)} parallel subchannels. It is also provided a uniform power allocation at the T _{x} antenna array, the information theoretic MIMO channel capacity may be evaluated as a sum of the singular capacity values for each of the K subchannels:
, K of the instantaneous matrix HH ^{H} that represent the power
C =
K
∑
k=1
log _{2} ( 1 + λ _{k} ^{P} ^{k} )
σ
2
n
(34)
In (34), P _{k} denotes the amount of power assigned to the k ^{t}^{h} subchannel and σ _{n} is the total noise power at the receiver. The signaltonoise ratio (SNR) amount to:
2
SNR = ^{E} ^{[}^{P} ^{T} ^{x} ^{]}
σ
2
n
(35)
where E [·] is represented the expectation operator to compute the expectation of the total signal power P _{T} _{x} at the transmitter. An important tool for characterizing any communication channel is capacity. In a single user channel, capacity is the maximum amount of information that can be transmitted as a function of available bandwidth given a constraint on transmitted power. In singleuser MIMO channels, it is common to assume that there is a constraint on the total power broadcast by all transmitted antennas. For the multiuser MIMO channel, the separation signal model for the ADPLL and ADALL analysis with MIMO system.
5. Simulated Performance. The CCI problem could be become a serious impairment for any mobile communication system. This simulation results demonstrate the per formance of the ADALL combined with the ADPLL separation model using the novel adaptive FIR ﬁlter. This simulations present to verify how cochannel FM signal can be separated. The simulations of sinusoidal and mobile signals are indicated to improve the separation performance capability comparing the ADALL and novel separation system models [13,13]. The proposed cochannel FM signal demodulation and separation systems with noise interference environment consists the following subsystems: the FM signal generator, the ADPLL combined ADALL model and the adaptive FIR ﬁlter with noise canceller. Figure
THE IMPROVEMENT OF ADALL SEPARATION ANALYSIS
1011
8 is shown the dominant and subdominant signals are separated using proposed model at m = 0.1. The simulations demonstrate the performance of the proposed cochannel signal separation model design with AWGN channel based on the adaptive FIR ﬁlter algorithm. The MMSE criteria using the step size and the optimum weight coeﬃcient values are deﬁned by WienerHopf with steepest descent method. The demodulated output signals are approximately approached to the desired signals. The impairments of the channel noise aﬀect the MMSE value. By assuming the input SNR ratio ranged between −20dB and 20dB step 10dB, it is operated at the random statistic process in this paper.
Figure 8. The separation dominant and subdominant signals for adaptive FIR ﬁlter at m = 0.1
Two important improvement performance cases are discussed in simulation results. The proposed algorithm of this paper can be suited to implement the perfect separation performance index for both of the low SNR and the large ICR conditions for the proposed algorithm. The simulated performances can be presented the ADPLL with ADALL model for the adaptive FIR ﬁlter better then ADPLL with ADALL for the butterworth ﬁlter. The performance of MMSE via SNR ratio is shown as Figure 9 by varying diﬀerent m values. In Table 1, we summarize the MMSE of proposed and conventional methods with dominant signal by varying ICR (i.e. m) and the SNR ratios.
Figure 9. The performance of MMSE via SNR ratio
1012
G.J. JONG AND G.J. HORNG
Table 1. The MMSE with dominant signal for SNR via ICR
(a) Proposed method for ADPLL and ADALL
❳ ❳ ❳ ❳ ❳ ❳ ^{❳} ^{❳} ^{❳} ❳ ❳❳ ICR SNR (dB) 
−20dB 
−10dB 
0dB 
10dB 
20dB 

0.1 
0.0017 
0.0009 
0.00015 
0.000098 
0.000011 

0.5 
0.0029 
0.0012 
0.00023 
0.000105 
0.000023 

0.9 
0.0047 
0.0014 
0.00030 
0.000160 
0.000037 

(b) Traditional method for PLL and ALL 

❳ ❳ ❳ ❳ ❳ ❳ ^{❳} ^{❳} ^{❳} ❳ ❳❳ ICR SNR (dB) 
−20dB 
−10dB 
0dB 
10dB 
20dB 

0.1 
0.3705 
0.1855 
0.0391 
0.0108 
0.0015 

0.5 
0.4294 
0.2421 
0.0502 
0.0115 
0.0032 

0.9 
0.5053 
0.2999 
0.0546 
0.0125 
0.0061 
6. Conclusions. In this paper, the proposed algorithm combined the ADPLL with the ADALL system for alldigital analysis that is more perfect to separate the CCI or multi channel FM signals in the same carrier frequency environment. It is also found to suppress the distortion that caused by the AWGN channel transmission. The new combined alldigital method can achieve the expectative goal by modifying the conventional ALL system (i.e. analog ALL) with the adaptive ﬁlter algorithm. For CCI FM signal with AWGN interference, the dominant and subdominant signals have been separated completely. The proposed algorithms recover the multiple original or modulating signals and suppressed the distortion caused by conventional all analog ALL or PLL systems [1]. It also solve the cochannel or multichannel transmission problems for suppressing the AWGN interference in the noisy transmission channel. The major contribution of paper adopts to separate cochannel and multichannel transmissions by using MIMO system. In this paper, the performance of the fully digital separation system can be obtained more eﬀectively. The advantage of the adaptive FIR ﬁlter is proved to obtain the better tracking ca pability and all of the weights are updated to MMSE value. We compare ADPLL and ADALL with all analog PLL and ALL for channel SNR ratio between −20dB and 20dB, the performance index diﬀerence is approximately 260 times. The proposed method can be adopted to the monitor and security systems for the signal intercepted applications for the future. The proposed system of this paper is the virtue and advantage to implement the security ﬁeld. In general words, it is substituted and replaced the encryption and decryption systems but operated at no multiaccess communication systems to save the cost and complex circuits.
Appendix 1.
y [n] =
τ
K d ∫
1
n
τ
n−1
φ(τ )dτ + e _{L} [n] =
τ
K d ∫
1
n
τ
n−1
2πf _{c} τ + θ _{1} (τ) + ϕ(τ) + φ _{n} (τ )dτ
f _{A}_{D}_{P} _{L}_{L} (τ) = ∫ [2πf _{c} τ + θ _{1} (τ) + ϕ (τ) + φ _{n} (τ )] · dτ
= πf _{c} τ ^{2} + ∫ θ _{1} (τ )dτ + [ − _{2} iτ log ^{(} e ^{i}^{w} ^{d} ^{τ} ^{)} +
1
1
2
w _{d} · di log(m · e ^{i}^{w} d ^{τ} + 1)
(A.1)
(A.2)
THE IMPROVEMENT OF ADALL SEPARATION ANALYSIS
1
2
1
2
1
_{4}
1
2
w _{d} τ ^{2} ]
+
w _{d} · di log ( −
_{e} iw _{d} τ
m
) +
w _{d} · log (e ^{i}^{w} d ^{τ} + m) · log ( −
1
2
w _{n} · di log ( − ^{r} ^{n} ^{(}^{τ}^{)}^{·}^{e} ^{i}^{w} ^{n} ^{τ}
r(τ)
) +
_{e} iw _{d} τ
m
) −
+ [ − ^{1} _{2} iτ log ^{(} e ^{i}^{w} ^{n} ^{τ} ^{)} −
w _{n} · di log ( − ^{r}^{(}^{τ}^{)}^{·}^{e} ^{i}^{w} ^{n} ^{τ}
r _{n} (τ)
)
1
2
+ w _{n} · log (r (τ ) · e ^{i}^{w} n ^{τ} + r _{n} (τ )) · log ( − ^{r}^{(}^{τ}^{)}^{·}^{e} ^{i}^{w} ^{n} ^{τ}
r _{n} (τ)
) −
1
_{4}
w _{n} τ ^{2} ]
f _{A}_{D}_{P} _{L}_{L} (τ) = −
_{2} 1 iτ log ^{(} e ^{i}^{w} ^{d} ^{τ} ^{)} + πf _{c} τ ^{2} + ∫ θ _{1} (τ )dτ −
1
4
w _{n} · log (e ^{i}^{w} n ^{τ} ) ^{2}
1013
1 
1 
2 
2 
−
+
+
+
+
w _{d} · di log ( −
m·e ^{i}^{w} n ^{τ}
r(τ)
) −
1
2
w _{n} · di log ( − ^{r} ^{n} ^{(}^{τ}^{)}^{·}^{e} ^{i}^{w} ^{n} ^{τ}
r(τ)
)
1
2
w _{n} · log (m · e ^{i}^{w} n ^{τ} + r (τ )) · log ( −
m·e ^{i}^{w} n ^{τ}
r(τ)
)
w _{n} · log (r (τ ) · e ^{i}^{w} n ^{τ} + r _{n} (τ )) · log ( − ^{r}^{(}^{τ}^{)}^{·}^{e} ^{i}^{w} ^{n} ^{τ}
m
)
1
2
w _{d} · di log (m · e ^{i}^{w} d ^{τ} + 1) ^{+}
1
2
w _{d} · di log ( −
_{e} iw _{d} τ
m
)
1
2
w _{d} · log (e ^{i}^{w} d ^{τ} + m) · log ( −
_{e} iw _{d} τ
m
) −
1
_{4}
w _{d} τ ^{2} ]
f ADP LL1 (τ) =
f ADP LL2 (τ) =
1
2
ω _{d} · di log(m · e ^{i}^{ω} d ^{τ} + 1) ^{·} ^{s} ^{1}
1
2
ω _{d} · di log ( −
_{e} iω _{d} τ
m
) · s _{2}
REFERENCES
(A.3)
^{(}^{A}^{.}^{4}^{)}
(A.5)
[1] A. M. Pettigrew, The AmplitudeLocked Loop the Theory and Operation of the FM 201/5 High Performance FM Demodulator, Ampsys Company Document, 1996. [2] G. J. Jong, T. J. Su and T. J. Moir, The performance of the amplitudelocked loop with cochannel interference, Electronics Letters, vol.34, no.8, pp.719720, 1998. [3] G. J. Jong, T. J. Moir, A. M. Peettigrew and T. J. Su, Improvement of FM demodulator with cochannel FM interference, Electronics Letters, vol.35, no.20, pp.17581759, 1999. [4] J. E. Ohlson, Phasedlocked loop operation in the presence of impulsive and gaussian noise, IEEE Trans. on Communications, vol.Com21, no.9, pp.991996, 1973. [5] T. J. Moir and A. M. Pettigrew, Inband noise canceling in FM systems: The white noise case, Electronics Letters, vol.28, no.9, pp.814815, 1992. [6] B. C. Sarkar, Phase error dynamics of a ﬁrstorder phase locked loop in the presence of cochannel tone interference additive noise, IEEE Trans. on Communications, vol.38, no.7, pp.962965, 1990. [7] Y. L. Dong and G. Y. He, On spurious phase modulation caused by secondharmonic terms for digital phaselocked loop, Proc. of the 6th International Conference on ITS Telecommunications, pp.11801183, 2006. [8] M.T. Liu, A Fuzzy Rulebased DPLL for Maximum Likelihood Phase Estimation in Signal Trans mission, Master Thesis, National Tsing Hua University, 1995.
1014
G.J. JONG AND G.J. HORNG
[9] T. Banerjee and B. C. Sarkar, Phase error dynamics of a class of DPLLs in presence of cochannel interference, Signal Processing, vol.85, no.6, pp.11391147, 2005. [10] W. Li and J. Meiners, Introduction to phaselocked loop system modeling, Analog Applications Journal, pp.510, 2000. [11] S. Haykin, Communication System, 4th Edition, Wiley, 2001. [12] G. J. Jong, T. J. Moir and A. M. Pettigrew, Cochannel FM interference suppressed by using the amplitudelocked loop for digital communication, Electronics Letters, vol.34, no.8, pp.719720, 1998. [13] C. T. Charles and D. J. Allstot, Amplitudelocked loop analysis for calibration applications, Elec tronics Letters, vol.42, no.11, pp.614615, 2006. [14] Y.J. Chen, G.J. Horng and G.J. Jong, The separated speech signals combined the hybrid adaptive algorithms by using power spectral density and total harmonic distortion, Multimedia and Ubiquitous Engineering, pp.825830, 2007. [15] Y.J. Chen, G.J. Horng, G.J. Jong and T.J. Su, The amplitudelocked loop system of cochannel interference in AWGN channel, Proc. of the 6th Annual Conference on Wireless Telecommunications Symposium, Pomona, CA, 2007. [16] G.J. Jong, P.J. Liao, C.Y. Jung and T.J. Su, Multichannel interference separation for the AWGN channel, Intelligent Signal Processing and Communication Systems, pp.581584, 2005. [17] J. Gaspar, S. F. Chen, A. Gordillo, M. Hepp, P. Ferreyra and C. Marqu´es, Digital lock in ampliﬁer:
Study, design and development with a digital signal processor, Microprocessors and Microsystems, vol.28, no.4, pp.157162, 2004. [18] Y. Iwanami, A DSP DPLL demodulator with sequence estimator for CPFSK signals in the presence of large Doppler shift, Universal Personal Communications, vol.1, pp.351356, 1998. [19] Y. Iwanami, A DSP DPLL demodulator with sequence estimation for MSK signal in the presence of Doppler shift on Rician fading channel, Personal, Indoor and Mobile Radio Communications, Wireless NetworksCatching the Mobile Future, vol.1, pp.332337, 1994. [20] B. C. Sarkar and S. Chattopadhyay, Symmetric lockrange multilevel quantized digital phase locked FM demodulator, IEEE Trans. on Communications, vol.38, no.12, pp.21142116, 1990. [21] A. Jameel, M. Y. Siyal and N. Ahmed, Transformdomain and DSP based secure speech communi cation system, Microprocessors and Microsystems, vol.31, no.5, pp.335346, 2007. [22] I. Galton, Analoginput digital phaselocked loops for precise frequency and phase demodulation, IEEE Trans. on Circuits and Systems II: Analog and Digital Signal Processing, vol.42, no.10, pp.621 630, 1995. [23] T. Banerjee and B. C. Sarkar, Phase error dynamics of a class of modiﬁed secondorder digital phaselocked loops in the background of cochannel interference, Signal Processing, vol.85, no.8, pp.16111622, 2005. [24] J. G. Proakis, Digital Signal Processing, John Wiely & Sons, pp.258272, 2000. [25] D. G. Manolakis and V. K. Ingle, Statistical and Adaptive Signal Processing: Spectral Estimation, Signal Modeling, Adaptive Filtering, and Array Processing, Artech House Inc., 2005. [26] H. M. Karkhanechi, E. A. Fain and B. C. Levy, An investigation of carrier recovery techniques for spacetime coded MIMO wireless systems, Wireless Communications and Networking Conference, vol.1, pp.454458, 2002. [27] T. K. Yeung and S. F. Yau, A multiinput multioutput adaptive FIR ﬁlter with guaranteed conver gence for feedforward ANC system, Proc. of the 1999 IEEE International Symposium on Circuits and Systems, vol.3, pp.1720, 1999. [28] A. MalekiTehrani, B. Sayyarrodsari, B. Hassibi, J. How and J. Cioﬃ, Estimationbased synthesis of H _{∞} optimal adaptive equalizers over wireless channels, Proc. of GLOBECOM, vol.1A, pp.457461,
1999.
[29] A. Hjorungnes, Minimum MSE transmitter and receiver FIR MIMO ﬁlters for multiuser uplink com munications, Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol.4, pp.497500, 2004. [30] Q. H. Spencer, C. B. Peel, A. L. Swindlehurst and M. Haardt, An introduction to the multiuser MIMO downlink, IEEE Communications Magazine, vol.42, no.10, pp.6067, 2004. [31] O. Klemp and H. Eul, Analytical approach for MIMO performance and electromagnetic coupling in linear dipole arrays, Wireless Communication Systems, pp.586590, 2005. [32] J. G. Proakis, Digital Signal Processing, John Wiely & Sons, pp.709, 2000. [33] M. Hassani, Approximation of the dilogarithm function, Journal of Inequalities in Pure and Applied Mathematics, vol.8, no.1, pp.310, 2007.
THE IMPROVEMENT OF ADALL SEPARATION ANALYSIS
1015
[34] E. S. Ginsberg and D. Zaborowski, The dilogarithm function of a real argument, Communications of the ACM, vol.18, no.4, pp.200202, 1975. [35] G.J. Horng, AllDigital AmplitudeLocked Loop Separation System for Adaptive FIR Filter Anal ysis, Master Thesis, Institute of Electronic Engineering National Kaohsiung University of Applied Sciences, 1997. [36] C.H. Hsu, Downlink MIMOSDMA optimization of smart antennas by phaseamplitude perturba tions based on memetic algorithms for wireless and mobile communication systems, International Journal of Innovative Computing, Information and Control, vol.5, no.2, pp.443460, 2009. [37] H.F. Huang, C.W. Chan, C.H. Lin and H.W. Wang, A lowcomputation conference key system for mobile communications, International Journal of Innovative Computing, Information and Control, vol.5, no.2, pp.461466, 2009. [38] K. Yamada, K. Kimura, H. Yuki and K. Yoshida, The home network system by mutual complement of wireless and wired communications, ICIC Express Letters, vol.2, no.1, pp.7379, 2008. [39] H. Chen, Q. Ding, L. Ding and X. Dong, Experimental study on secure communication of diﬀerent scroll chaotic systems with identical structure, ICIC Express Letters, vol.2, no.2, pp.201206, 2008.
International Journal of Innovative Computing, Information and Control Volume 7, Number 3, March 2011
ICIC International ⃝c 2011 ISSN 13494198
pp. 1017–1038
VALUE BASED INTELLIGENT REQUIREMENT PRIORITIZATION (VIRP): EXPERT DRIVEN FUZZY LOGIC BASED PRIORITIZATION TECHNIQUE
Muhammad Ramzan, M. Arfan Jaffar and Arshad Ali Shahid
Department of Computer Science National University of Computer and Emerging Sciences (FASTNU) A. K. Brohi Road, H11/4 Islamabad, Pakistan { muhammad.ramzan; arfan.jaﬀar; arshad.a.shahid }@nu.edu.pk
Received July 2009; revised November 2009
Abstract. Requirement Prioritization is a very critical but often neglected area of re quirement engineering. Experience has shown that without proper prioritization of re quirements presented by various stakeholders, the end product usually fails to meet its objectives optimally. In fact in many instances, the product is considered a failure be cause it fails to meet its core objectives. Several requirement prioritization techniques have been presented by various researchers over the past years. Working with these tech niques has exposed several limitations when applied in software projects. In this paper, we have presented a novel multilevel value based intelligent requirement prioritization technique using fuzzy logic. We have introduced and applied the concept of requirement value to prioritize requirements. We have performed extensive experimentation using our proposed technique along with existing techniques. Results have shown that our technique has achieved superior prioritization results and consistency. The experiments have also shown that proposed technique is capable of delivering impressive prioritization under various circumstances. Keywords: Requirement engineering, Requirements prioritization, Fuzzy systems, In telligent requirements prioritization
1. Introduction. Software Engineering is one of the youngest engineering domains which
emerged as recently as somewhere in the middle of 1980 as an accepted engineering disci pline. The aim of SE is to create software products, services or their artifacts in order to meet the requirements posed by stakeholders while meeting quality constraints imposed on them. In order to meet both these objectives, any software development derives its pur pose and meaning from the requirements posed by various stakeholders. In this context, better elicitation, modeling and analysis of requirements plays a very critical role towards development of a quality software. Requirement Engineering is an established domain of knowledge within software engineering which establishes practices and principles for eﬀective requirement elicitation, modeling, speciﬁcation, documentation, etc. One very important but often neglected practice of software requirement engineering is requirement prioritization. Requirement prioritization is the process of establishing worth and value of various requirements posed by multiple stakeholders based on certain established cri teria of their utility for the ultimate software product. Several requirement prioritization techniques have been presented by authors. These techniques are both quantitative and qualitative in their nature. Some well known requirement prioritization techniques include Analytical Hierarchy Process (AHP), Cumulative Voting, Numerical Assignment, Rank ing, Theory W, Requirement Triage and Wieger’s Method, etc. And there are several other techniques which we shall discuss in this paper.
1017
1018
M. RAMZAN, M. A. JAFFAR AND A. A. SHAHID
Requirement prioritization enables us to understand the signiﬁcance of requirements vis`avis the system to be developed and among requirements as well. With requirement prioritization, we can identify the focus areas which need most of our attention in order to develop a product which optimally meets the requirements of the stakeholders. In most of the situations, due to budget and time constraints, it becomes impossible to implement all the requirements posed by stakeholders. Also the nature of many projects is such that requirements are implemented in a staged environment. In both of these scenarios, we need requirement prioritization. We can prioritize requirement to realize which requirements can be delayed or altered so that other urgent requirements can be implemented and to what degree. We can also use requirement prioritization to determine which requirements to be implemented in earlier stages or later stages. We have been working with several funded projects during our research. These projects are faced with both of the above mentioned situations. We have found it very important to prioritize requirements in their true sense in order to develop a meaningful and successful product. Requirement prioritization was a new practice in our speciﬁc development environment. So, our project needs required us to study further into various requirements prioritiza tion techniques so that we can select one which can best suit our peculiar development environment. Our ﬁnding was that there is severe deﬁciency of any experimental results to determine which technique to prefer. Consequently, during this period of research and development, we studied various requirement prioritization techniques and tried to imple ment them on experimental level at various projects. We soon realized that all of these techniques worked well within certain situations but had some inherent problems attached with them which made it impossible to implement any one of these across the organization for all diﬀerent kinds of projects. The main hindrances faced by us while implementing these techniques were related to cost, time and handling of evolving and creeping require ments. It was very important for us to work with a time and cost eﬃcient prioritization technique. Since we were testing these techniques for small to medium software projects which needed a very eﬃcient prioritization mechanism, our ultimate aim was to decide upon a technique which yielded better accuracy in requirement prioritization while at the same being eﬃcient in terms of cost and time. We also were in search of a technique which could reduce the dependence on human factor due to certain obvious reasons which we shall elaborate in later sections. Unfortunately any of existing techniques could not satis factorily answer all these problems. If some techniques like cumulative voting or ranking were eﬃcient in terms of cost and time, their results were not very impressive. On the other hand, better techniques like AHP required very skilled human resource and a lot of capital to be applied in a proper environment. In order to overcome these problems, one solution before us was to develop an artiﬁcially intelligent expert driven requirement prioritization technique. In one of our previous works, we had presented the initial sketch of a “value based requirements prioritization” technique [52]. This technique was very much similar to Theory W. In this approach, the end users and experts were asked to prioritize their requirements based upon the value that accomplishment of this requirement may have for the system. The salient feature of this technique was a combination of end users and experts in the process of requirement prioritization process. However, while implementing this technique, we encountered two major problems.
• The technique generated a lot of conﬂicts at the end of requirement prioritization process. Conﬂict resolution was a very long and time consuming process which needed to be followed at the end of every prioritization session.
VALUE BASED INTELLIGENT REQUIREMENT PRIORITIZATION
1019
• The technique was completely manual. The prioritization was done through human endeavor and element of human bias was noticeable. While applying the technique proposed in [48], we realized the need for an automated requirement prioritization technique in order to overcome both the above mentioned lim itations. In this paper, we have proposed and elaborated upon a fuzzy logic based intel ligent requirement prioritization technique. This technique uses fuzzy logic to prioritize requirements presented by various stakeholders. This modiﬁed scheme is basically a mul tilevel prioritization where end users, experts and intelligent system perform requirement prioritization at various levels. By using this technique, we achieved multiple beneﬁts. On one hand, we achieved certain degree of automation which ultimately resulted in a more eﬃcient technique. On the other hand, we were also able to reduce the emphasis of our approach on skilled requirement engineer solely as now intelligent component as well as end user was also contributing towards ultimate prioritization. At the same time developing this technique also oﬀered us with the opportunity of eliminating the role of requirement engineer altogether since we are currently working on incorporating a neural network based component to replace engineer during second stage of prioritization. In order to establish the utility of intelligent requirement prioritization technique, we applied this as well as a representative group of other techniques on several projects and determined the degree of success. We have also presented these ﬁndings and observations in this paper. Based on these, we have established the case for an artiﬁcially intelligent hybridized technique on which we are currently working. We have also presented a frame work for future evaluations of results acquired by application of our proposed mechanism with existing requirements prioritization techniques. We have presented preliminary re sults of application of this framework on various techniques. The paper is arranged as follows: After a brief introduction in Section 1, we have described a comprehensive literature review in Section 2. In Section 3, we have presented an elaborate overview of existing requirement prioritization techniques. In Section 4, we have described the concept and implementation of fuzzy logic based intelligent requirement prioritization technique. These techniques have been applied on several projects to observe their performance. Findings and evaluations of these experiments have been presented in Section 5. Conclusion and future work is described in Section 6.
1.1. 
Major contributions. Following are the major contributions: 
• 
In this paper, we have proposed and elaborated upon a fuzzy logic based intelligent requirement prioritization technique. This technique uses fuzzy logic to prioritize requirements presented by various stakeholders. 
• 
This modiﬁed scheme is basically a multilevel prioritization where end users, experts and intelligent system perform requirement prioritization at various levels. 
• 
In order to establish the utility of intelligent requirement prioritization technique, we applied this as well as a representative group of other techniques on several projects and determined the degree of success. We have also presented these ﬁndings and observations in this paper. Based on these, we have established the case for an artiﬁcially intelligent hybridized technique on which we are currently working. 
• 
We have also presented a framework for future evaluations of results acquired by ap plication of our proposed mechanism with existing requirements prioritization tech niques. We have presented preliminary results of application of this framework on various techniques. 
1.2. 
Paper organization. The paper is arranged as follows: After a brief introduction 
in Section 1, we have described a comprehensive literature review in Section 2. In Section
1020
M. RAMZAN, M. A. JAFFAR AND A. A. SHAHID
3, we have presented an elaborate overview of existing requirement prioritization tech
niques. In Section 4, we have described the concept and implementation of fuzzy logic based intelligent requirement prioritization technique. These techniques have been ap
plied on several projects to observe their performance. Findings and evaluations of these experiments have been presented in Section 5. Conclusion and future work is described
in Section 6.
2. Literature Review. Requirement Engineering (RE) is one of the earliest and very critical phases of software engineering. RE as a knowledge stream is basically aimed
at acquisition, modeling and documentation of requirements for the software product.
Requirement Engineering is a unique discipline in the sense that it not only incorporates
the concepts of engineering but also of human and social sciences. Sometimes, referred
to as requirements analysis, RE is treated as a sub discipline of system engineering and
software engineering. Requirement engineering aims to deﬁne precisely the requirements that need to be met. This is not an ordinary task. According to Fred Brooks, deciding what needs to be built is the most diﬃcult part of software development [1]. We can visualize one software requirement as one documented need that software product should accomplish. Usually requirements are classiﬁed as either as process based and product based or functional and non functional requirements. Software requirement can best be deﬁned as the description of system functionality along with its quality concerns. Requirement prioritization is the next logical task once requirements have been elic itated and properly analyzed. In most cases, it is really diﬃcult to meet all the re quirements that have been given by various stakeholders. Most of the times, elicitated requirements are vague, conﬂicting or out rightly false. Over period of time, as our un derstanding of the system becomes more and more clear, the requirements start attaining their actual or speciﬁc shape. Similarly, in many cases, requirements are implemented in a staggered fashion. In such circumstances, it becomes important to arrange the require
ments in a prioritized order to develop the system in more realistic way. This task becomes even more diﬃcult when performed early in the lifecycle. According to Karlsson et al. [2], one of the greatest problems of software engineers is development of such a product which doesn’t satisfy the needs and expectations of stakeholders. To overcome this problem, same authors came up with the idea of prioritizing the requirements according to their value in the paper [3] titled “A CostValue Approach for Prioritizing Requirements”. Sub sequently, many other researchers [4,5] emphasized upon the signiﬁcance of requirement prioritization. According to Ed Yourdon, prioritization of requirements is an extremely important issue [6] where as Lubars et al. stated that prioritization of requirements was one major topic of discussion during the survey that they undertook[7]. There are various methods for prioritizing requirements [8]. Some major techniques are Analytical Hierarchy Process (AHP) [911], Binary Search Trees [1215], 100 points method [16,17], planning game [18,19], numerical assignment technique [20,21] and theory
W 20 [22], etc. The consensus of all of these studies is that the project’s success or failure
is strongly determined by how eﬀectively, we can prioritize the requirements. Computational Intelligence and soft computing are established techniques which have helped resolve many real world problems. These methodologies include Artiﬁcial Neural
Networks, Fuzzy Logic, and Evolutionary Computing etc. Fuzzy logic is a technique centered on fuzzy set theory. Thus it is considered as an extension of classical set theory [23,24]. The concept of fuzzy sets as introduced by Lotﬁ Zadeh [25] can be considered
as generalization of the classical sets which are crisp in their nature. The purpose of
fuzzy logic is to both reduce the complexity of existing solutions as well as increasing the accessibility of control theory [26]. Computational intelligence based techniques including
VALUE BASED INTELLIGENT REQUIREMENT PRIORITIZATION
1021
fuzzy logic have been widely used recently to tackle many real world problems. Some of the recent applications of computational intelligence can be found in [27,28]. Fuzzy logic has also found its way in software engineering where it has most recently been used in eﬀort estimation [29], software project similarity [30], software development [31], project evaluation [32], software evolution [33] etc. Fuzzy logic has been used in requirement engineering as well for various tasks [34,35]. Chengdong Li et al. [36] presented a novel approach for using prior knowledge and sampled data in fuzzy systems. Some other recent developments in the domain of fuzzy logic [3739] have also presented new vistas of research in software engineering. What is evident after studying extensively is the fact that researchers in software engineering need to apply artiﬁcial intelligence in various domains of knowledge of SE to propose such techniques which are evolvable and can intelligently generate eﬃcient results. In this paper, we have proposed another application of fuzzy logic in software engineering. We have proposed to use fuzzy logic in the domain of requirement engineering. We suggest introducing fuzzy logic to determine the priority of requirements. The next section is devoted to elaboration of this proposed technique. In this paper, we proposed another application of fuzzy logic in the domain of re quirement engineering. We suggest introducing fuzzy logic to determine the priority of requirements. The next section is devoted to elaboration of this proposed technique.
3. Requirement Prioritization Techniques: An Overview. As mentioned in the literature review, there are various requirement prioritization techniques. However, no evaluation of these techniques has been made so far so that their utility and relevance can be determined. In this section, we give a comprehensive overview of various requirement prioritization techniques.
3.1. Analytical hierarchy process (AHP). AHP is a relative assessment based sta tistical technique to prioritize requirements for software products. If we have n number of requirements, AHP makes nx(n − 1)/2 comparisons at each hierarchy level. In real life, we are usually working with requirements which have multiple objectives. AHP works as an eﬃcient technique in these kinds of situations by making pair wise comparison to calculate relative value and cost of each requirement against the other one. This sig niﬁcantly large number of comparisons makes the technique less eﬀective as increase in number of comparisons always takes place at the rate of O(n ^{2} ). AHP is regarded as a ﬁve step method.
1. Establish completeness of requirements.
2. Apply the pairwise comparison method to assess the relative value.
3. Apply the pairwise comparison method to assess the relative cost.
4. Calculate each candidate requirement’s relative value and implementations cost, and plot each on a costvalue diagram.
5. Use the costvalue diagram as a map for analyzing the candidate requirement.
A sample cost value diagram is shown in Figure 1. A large number of studies have been made in recent past to determine the eﬀectiveness of AHP for requirements prioritization. Karlsson [3,40] has made a number of studies which have shown the eﬀectiveness of this technique in industrial settings. At the same time, some other studies [19,41] have talked about AHP as being diﬃcult, less eﬃcient and time consuming. AHP can be considered as a highly sophisticated and complex technique which can establish prioritization at the level of individual requirements. Eﬀorts have been made to reduce the number of comparisons. However, this has al ways enhanced the margin of error. In our opinion, this tradeoﬀ is necessary since some comparisons may actually never bee needed.
1022
M. RAMZAN, M. A. JAFFAR AND A. A. SHAHID
Гораздо больше, чем просто документы.
Откройте для себя все, что может предложить Scribd, включая книги и аудиокниги от крупных издательств.
Отменить можно в любой момент.