Академический Документы
Профессиональный Документы
Культура Документы
2, May 2014
,
mirrored version of the reference signal block, 2+1 . received signal by the received signal delayed by 2M and
mapped by V(.). Again.Recalling our definition for the
XM b o XM XM+1 b1XM+1 XM+2 b2XM+2 mapped samples in (2)
XM b o XM b1X'M XM+1 b2XM+1 b3X'M+1
Fig. 1. Transmitted signal time slots for the conventional DCSK (upper part) (1 ,2 , )=( ,1 , 1 )
and for the E-DCSK (lower part).
Correlator outputs 1 and 2 can be formulated as:
B. Transmitter Description
The transmitter generates a chaotic reference sequence 1 = =1 (4)
of length M as shown in Fig. 2. To transmit the first bit of
information, the sequence will be followed by the same 2 = =1 2 (5)
sequence multiplied by first bit2 , The second information
For the first correlator, when (4 + 1) <
bit 2+1 will be sent by multiplying the delayed and
4 + 2
mirrored block of the original reference signal with2+1 and
The decision variable 1 can be written as:
without sending another reference signal. Thus, the
transmitted signal for any pair of bits 2 and 2+1 can be
described as
1 = ( + )( + )
=1
xi 4kM < i (4k+1)M
Si = b2k xi-M (4k+1)M< i (4k+2)M = (2 + )( + )
B 2k+12 (4k+2)M<i (4k+3)M
=1
2
=2 =1 + =1 (6)
2 = ( + )(2 + 2 )
=1
Fig. 2. Transmitter structure.
If the chaotic samples block is considered to be vector X 2 = ( + )(2 + 2 )
=1
with dimension M where X= ( 1 2... M). Then
X'=V(X) = X= (1 2 . . . ). =
(2+1 2
+ )(2
+ 2 )
where P is a simple mapping matrix with of size M M and it
=1
is defined as 2
=2+1 =1 2 + =1 (7)
00 1
P= 0 0 1 0
where
10 0
Then = + 2 + (8)
(1 2 . . . )= ( M M-1...1 ) (2) ,
= 2 + 2+1 2 2 + 2 (9)
2Mrepresents the mapped block after delay of 2M.
For simplicity, we will keep using samples notation rather
than matrix notation.
C. Receiver
Now, pair of information bits has been transmitted using
single reference signal. Under the assumption that channel is
Additive White Gaussian Noise, received signal sample can
be written as:
where is a stationary random process with E( ) = 0 and The first two terms in (6) and (7) are the useful terms
, are statistically independent for any . which contain the signal information, while the others terms
The receiver structure is shown in Fig. 3. In order to and represent the undesired signal components. The
recover the first transmitted bit 2 , the received signal is terms and consist of noise terms and intrasignal
multiplied by the received signal delayed by M, . The interferenceterms which affects the information bearing
second information bit is recovered by multiplying the signal part constructively and destructively [9]. Due to
192
Lecture Notes on Software Engineering, Vol. 2, No. 2, May 2014
where 2 2+1 are the decoded bits. Thus, equation can be rewritten as
1 4 4 32 1
= ( ( + + ) ) (11)
2 9 3 2 45
III. PERFORMANCE ANALYSIS
To analyze the output for each correlator 1 and 2 , the
following assumptions are considered; is stationary and its IV. SIMULATION
distribution is uniform. Hence E( ) = 0 [6]. Correlation
between chaotic samples and +1 decay quickly. The
same standard assumptions are also applied to, . and are
statistically independent for all and . For relatively large
value of spreading factor, Gaussian approximation can be
used to model the system which can be fully characterize by
computing mean and variance for1 and 2 respectively [11].
Under the aforementioned assumptions, it can be easily
verified that the cross correlation of the three terms in
equations (8) and (9) have an average value of zero [9] .The
correlator output 1 in equation (4) can be rewritten as:
1 =2 + 2 + (10)
+1 = 1 1.99
2 2 162
2 =(2 )2 =
3 5 45
2
2 = 2
=1 2 + 2
=1 2 + 2
=1 2 = 2 +
3
2
+ 2 + .4
3
We will define 2 = , where is the noise spectral
2
power density in the channel, then
4 4 2
2 = . + . . = . +M.
3 2 2 2 3 4
Therefore
193
Lecture Notes on Software Engineering, Vol. 2, No. 2, May 2014
194