Top Banner
SPEECH PROJECTS SDS-01 SPEECH RECOGNITION USING CEPSTRAL COEFFICIENTS Speech Recognition is the process of recognizing the word (predefined) spoken by the speaker on the basis of information included in speech waves. Cepstral Coefficients (MFCC/LPCC) technique compares the cepstral coefficients generated by speech samples in the training and testing phase. Furthermore this technique makes it possible to use the speakers voice to verify their identity. This project is implemented in ADSP 2181 processor. SDS-02 ADAPTIVE DIFFERENTIAL PULSE CODE MODULATION BASED SPEECH CODING The aim of the project is to design an Adaptive Differential Pulse Code Modulation (ADPCM) for speech or audio compression. It is one of the compression techniques which involves adaptive predictor to take advantage of the redundancies present in the signals. ADPCM is more efficient to transmit than PCM. It compares a signal sample with the previous sample and transmits the difference between the two. This reduces the number of bits needed to reproduce the speech. This project is implemented in ADSP SHARC processor. SDS-03 ROBOTIC CONTROL THROUGH SPEECH USING LPCC
35
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Dsp

SPEECH PROJECTS

SDS-01 SPEECH RECOGNITION USING CEPSTRAL COEFFICIENTS

Speech Recognition is the process of recognizing the word (predefined) spoken by the

speaker on the basis of information included in speech waves. Cepstral Coefficients

(MFCC/LPCC) technique compares the cepstral coefficients generated by speech samples in the

training and testing phase. Furthermore this technique makes it possible to use the speakers voice

to verify their identity. This project is implemented in ADSP 2181 processor.

SDS-02 ADAPTIVE DIFFERENTIAL PULSE CODE MODULATION BASED SPEECH

CODING

The aim of the project is to design an Adaptive Differential Pulse Code Modulation

(ADPCM) for speech or audio compression. It is one of the compression techniques which

involves adaptive predictor to take advantage of the redundancies present in the signals. ADPCM

is more efficient to transmit than PCM. It compares a signal sample with the previous sample and

transmits the difference between the two. This reduces the number of bits needed to reproduce

the speech. This project is implemented in ADSP SHARC processor.

SDS-03 ROBOTIC CONTROL THROUGH SPEECH USING LPCC

To implement Robotic control through speech using Linear Predictive Cepstral

Coefficient (LPCC) technique, the user speaks a command and the corresponding predefined

controlling action will be carried out. The recognized speech is used to control the arm

movement with different direction (right ,left) ,varying heights (up and down) and perform the

arm function (pick and place the specified object) with the help of stepper and dc motors .This

project is implemented in ADSP 2181 processor.

Page 2: Dsp

SDS-04 ROBUST SPEECH RECOGNITION USING GMM

To implement Speech Recognition using Gaussian Mixture Model(GMM). In this two

approaches of acoustical features and pattern recognition were used. The first method is based on

Mel frequency cepstral coefficient with Gaussian mixture model classifier, and the other is based

on LPC coefficient and reduced dimensional LPC residual with Gaussian mixture model

classifier. The performances of both approaches provides effective speech recognition. This

project is implemented in ADSP 2181 processor.

SDS-05 WAVELET BASED SPEECH COMPRESSION AND DECOMPRESSION

The goal of this project was to design and implement a Discrete Wavelet Transform

(DWT) encoder/decoder for low-bit rate speech compression. There is an important need for

speech signal compression over bandwidth-limited channels in areas such as real-time Internet

audio and in wireless communications. For these applications, one wants to produce the smallest

signal possible while tolerating a minimal loss in audible speech quality. This project is

implemented in ADSP SHARC processor.

SDS-06 VOICE ACTIVATED PRINTER CONTROL SYSTEM USING MFCC

To implement voice activated device control system using Mel Frequency Cepstral

Coefficient (MFCC) algorithm, the user speaks a command and the predefined action will be

carried out. The recognized speech is used to control the specific device like CD player. DSP,

which performs speech processing in order to recognize the user’s command and perform the

corresponding controlling action with the specific device. This project is implemented in ADSP

2181 processor.

SDS-07 NOISE CANCELLATION SYSTEM USING WAVELET

Adaptive filtering has been used for speech denoising in the time domain. This project

Page 3: Dsp

aims to use adaptive filtering in the Wavelet transform domain. It propose a hybrid method of

using adaptive filters on the lower scales of a wavelet transformed speech together with the

conventional methods (Thresholding, Spectral Subtraction, and Wiener filtering) on the higher

scale coefficients.

SDS-08 FREQUENCY TRANSFORMATION BASED SECURED SPEECH TRANSMISSION

SYSTEM

The objective of the project is Speech security using Frequency Transformation (FT)

technique. Speech is the most commonly used means of communication by humans. In practical

application like “Defense”, we should see to it that the speech reaches only the intended

listeners, and not others, which would end up in trouble. Our project aims at designing such a

system where in speech is converted to a form, unrecognizable by a casual listener. The intended

receiver would alone be able to interpret the transformed speech. This project is implemented in

ADSP 2181 processor.

SDS-09 SPEECH CODING USING LPC

The objective of the project is to create a voice coding system for low-bit rate

transmission, using Linear Predictive Coding (LPC) technique. LPC technique models the

human vocal tract as a time varying filter. It is based on the concept that a sample is achieved by

a linear combination of Previous (P) samples, where P is a number of filter coefficients. It

encodes speech from 64kbps to 5kbps. This project is implemented in TMS320C 5416 and

ADSP 2181 processors.

SDS-10 SPEED CONTROL THROUGH SPEECH USING HMM

To implement speed control through speech using Hidden Markov Modeling (HMM), the

user speaks a command and the corresponding predefined controlling action will be carried out.

The recognized speech is used to run the motor with different speed. DSP, which performs

Page 4: Dsp

speech processing in order to recognize the user’s command and perform the corresponding

controlling action that is speed control of the motor . This project is implemented in ADSP 2181

processor.

SDS-11 PRINCIPLE COMPONENT ANALYSIS BASED SPEECH RECOGNITION

The most commonly used recognition techniques are based on the spectral domain

operation, and then for speech recognition, like MFCC is computed, where DCT is applied to

the mel-scale filter bank output. This paper describes a new Principle Component Analysis

(PCA)-based speech enhancement algorithm using kernel PCA instead of DCT, kernel PCA

improves the recognition rates higher than the normal MFCC.

AUDIO PROJECTS

SDA-01 ADAPTIVE EQUALIZER FOR DIGITAL SYSTEM

The equalizer aims at the suppression or selection of a particular band of frequency. The

audio signal consists of many instruments played at a time. The user may wish to hear audio of a

particular instrument or to avoid a particular instrument. The particular band of frequencies can

be suppressed to hear audio of all the instruments other than the specific instrument. This can be

implemented by converting the time domain audio signal into frequency domain audio signal.

Then the frequency domain signal is converted into time domain signal, which gives the audio

signal with a particular band suppressed. This project is implemented in 2181 processor (ADSP).

SDA-02 LMS BASED ECHO CANCELLATION SYSTEM

Page 5: Dsp

This project aims at canceling the unwanted Echo signals that are generated in the long

distance communication channels. In real time applications like transmission of speech signals

over long telephone channels, the undesirable echo signals are generated. So, a special circuit

called the echo cancellation circuit is required to cancel the unwanted echo signals produced in

the channel. The "Echo Canceller" performs Adaptive Filtering employing the "Least Mean

Square (LMS)" algorithm with the automatically adjustable filter coefficients. This subsequently

helps us to retain the original signal. This project is implemented in 5416 processor (TI)

.

SDA-03 DIGITAL KAROKE

Karaoke is the mixer of voice signal with the audio signal. The audio signal with or

without vocals will be played back and the voice from the microphone is mixed with the audio

signal by suppressing the vocals. The input can be given from any music devices like tape

recorder or Walkman through stereo jack. Similarly the voice is given from a microphone. The

voice and audio signals are mixed in the frequency domain and converted to time domain and

transmitted through CODEC. This project is implemented in SHARC processor (ADSP).

SDA-04 WAVELET DECOMPOSITION FOR AUDIO COMPRESSION

There is an important need for audio signal compression over bandwidth-limited channels

in areas such as real-time Internet audio and in wireless communications. For these applications,

one wants to produce the smallest signal possible while tolerating a minimal loss in audible

quality. The goal of this project was to design and implement a wavelet transform

encoder/decoder for audio compression. This project is implemented in 5416 processor (TI).

SDA-05 MPEG 4 ALS

Although modern lossy coding standards such as MP3 or AAC. These methods are not

suitable for achieving performance. A new emerging standard MPEG-4 ALS introduces an

efficient lossless audio coding that enables the compression of digital data with perfect

Page 6: Dsp

reconstruction of the original signal. It employs linear prediction s over the most recent subset of

the audio streams to predict the next stream and encodes the difference between the actual and

predicted values.

SDA-06 AUDIO CODING USING PSYCHOACOUSTIC MODELING

This aim is to present a technique to incorporate psychoacoustic models into an adaptive

wavelet packet scheme to achieve perceptually transparent compression of high-quality audio

signals. The filter bank structure adapts according to psychoacoustic criteria and according to the

computational complexity that is available at the decoder. This provides wavelet packets and

perceptual coding to construct an algorithm that is well suited to high-quality audio transfer for

Internet and storage applications. This project is implemented in ADSP SHARC processor.

SDA-07 LSB AUDIO STEGANOGRAPHY

To encrypt an audio file in to an audio without causing any deformation and retrieving the

audio file at the receiver. This project involves embedding an audio in to an audio source file. So

that the information is hidden in the audio source without deforming the source file. This project

is implemented in 2181 processor (ADSP).

SDA-08 AUDIO COMPRESSION USING MDCT

This project aims to implement (MDCT) algorithm to audio compression, specifically

used for the MP3 standard. It is having four primary parts of the compression process, namely

the filter bank, psychoacoustics, quantization, and bit stream formatting. It uses Fast Fourier

transform (FFT) in psychoacoustics and the role of Huffman coding in quantization.

SDA-09 AUDIO SIGNAL PROCESSING FOR MULTI EFFECTS

The objective of this project is to process an audio signal in different ways to get different

types of audio effects like flanging effect, reverberation effect and echo or delay effect and the

output is given to the CODEC. By giving different keyboard interrupt, corresponding effect can

Page 7: Dsp

be given as the output to the CODEC. This project is implemented in 5416 processor (TI).

SDA-10 AUDIO WATERMARKING FOR COPYRIGHT PROTECTION OF DIGITAL

AUDIO DATA

The main objective of this project is to embed a data in to an audio signal without

degrading the quality of the audio signal. Here the concept called psycho acoustic model based

on the human auditory system was implemented for water marking. The signal with lower energy

lying at the intermediate frequency is not audible. Here we will be nullifying those low-level

energy signals and embedding some other data’s without affecting the nature of the signal. In this

project, we will be having two parts. One will be watermark generation and the next one is

watermark embedding. This project is implemented in 2181 processor (ADSP).

IMAGE PROCESSING PROJECTS

SDI-01 VOTING SYSTEM USING FINGERPRINT

To recognize the finger print pattern and to provide authentication using DSP techniques.

Finger image is captured using sensor and converted to frequency domain to extract features. The

features are then stored in database along with the user details. Extracted features is compared

with the already existing features obtained during the enrollment phase. Then by matching

algorithms the fingerprint is recognized and the user details are displayed This project can be

used in Smart Cards and Mobile Applications. This project is implemented in SHARC (ADSP)

processor.

SDI-02 PERFORMANCE ANALYSIS OF HAAR WAVELET BASED IMAGE

Page 8: Dsp

COMPRESSION

Digital images require large amount of memory to store and when there is a requirement

to transfer the same through a band limited channel as in the case of internet and wireless

communication, it takes a huge amount of time. The goal of this project was to design and

implement a wavelet transform(Haar Wavelets) encoder/decoder for images. This project aims to

investigate the role of Wavelets in the coding or compression and decoding or decompression of

images. This project is implemented in 5416 (TI) and 6713 (TI) processor.

SDI-03 DATA HIDE AND SEEK TECHNIQUE-STEG ANALYSIS

Steganography, means covered, or secret writing and is a long practical form of hiding

information. Although related to cryptography, they are not the same. Steganography’s intent is

to hide the existence of the message, while cryptography scrambles a message so that it cannot

be understood. The goal of steganography is to hide message inside other harmless messages in a

way that does not allow any enemy to even detect that there is a second secret message present.

This project is implemented in 2181 (ADSP) processor.

SDI-04-IMPLEMENTATION OF JPEG2000 STANDARD

This project aims in implementation of JPEG2000 compression standard, which is

recognized as ISO standard. JPEG2000 is designed for compressing either full color or gray

scale images of natural real world scenes. JPEG2000 is lossy and it can be very effectively

applied to a 24- bit color image. By varying the compression parameters we can vary the degree

of losses during JPEG2000 compression. This project was implemented in SHARC (ADSP)

processor.

SDI-05-DATA COMPRESSION CODER AND DECODER USING TRANSFORM

CODING

Page 9: Dsp

In sub band coding, a set of low-pass and high-pass filters, known as a filter bank, is used

to split the frequency spectrum into sub bands, which are then quantized separately. The idea is

that different bit rates, or even different quantization schemes, can be used for each sub band,

depending on the statistics of that band. Then the high frequency components are compressed

using the run length encoding.Now the compressed image is given as the input to the

reconstruction segment to obtain the original image back. This project is implemented in

SHARC (ADSP) processor.

SDI-06 DCT BASED CONTENT SECURITY SYSTEM USING ADDITIVE

ALGORITHM

As multimedia data becomes wide spread, such as on the internet, there is a need to

address issues related to the security and protection of such data. While access restriction can be

provided using electronic keys, they do not offer protection against illegal distribution of such

data. Image watermarking is one approach to managing this problem by encoding user or other

copyright information directly in the data while not restricting access. The proposed scheme

distributes the signature information in the discrete wavelet transform.This project is

implemented in SHARC (ADSP) processor.

SDI-07 VISUAL HALF TONING-MINI PROJECT

The objective of the project is to encrypt an image using secret sharing concept. Visual

Cryptographic Solutions operate on binary or binarized inputs. Therefore, natural

images(continuous-tone)must be first converted into halftone images to stimulate the gray levels

Page 10: Dsp

with a binary representation. Then, halftone version of the input image is used instead of the

original information to produce the shares. The decrypted image is obtained by stacking the

shares together. The requirement of inputs in the binary or dithered nature only limits the

applicability of the Visual Cryptography.This system can be extremely useful for secure

information sharing in internet communication, multimedia systems, medical imaging, military

communication, etc. This project is implemented in 5416 (TI) processor.

SDI-08 DWT BASED SCENE ADAPTIVE COLOR QUANTIZATION

Color quantization is the process of reducing the number of colors in an image. Color

quantization maps a large number of colors into a much smaller number of representative colors

while keeping color distortion to an acceptable level. The project utilizes the discrete wavelet

transform to achieve a computationally efficient implementation of the multi-scale clustering

algorithm in a 3D color space. The performance is evaluated in terms of number of the

representative colors. This project is implemented in 6713 (TI) processor.

SDI-09 HUMAN IDENTIFICATION SYSTEM USING IRIS

Iris recognition,a relatively new biometric technology,has great advantages,such as

variability,stability and security,thus it is the most promising for high security environments.

New iris recognition algorithm is proposed, which adopts independent component analysis(ICA)

to extract iris texture feature and competitive learning mechanism to recognize iris pattern.

Experimental results shows that the algorithm is efficient and adaptive to environment, e.g it

works well even for blurred iris image,variable illumination,and interference of eyelids and

eyelashes. This project is implemented in 6713 (TI) processor.

SDI-10 2D D4 - WAVELET TRANSFORM IN IMAGE COMPRESSION

Digital images require large amount of memory to store and when there is a requirement

to transfer the same through a band limited channel as in the case of internet and wireless

Page 11: Dsp

communication, it takes a huge amount of time.The goal of this project was to design and

implement a wavelet transform(Daubachies Wavelets) encoder/decoder for images. This project

aims to investigate the role of Wavelets in the coding or compression and decoding or

decompression of images. This project is implemented in 6713 (TI) and 5416 (TI) processor

SDI-11 LOST PIXEL RECOVERY IN WAVELET CODING DOMAIN

To implement the wavelet transform to a lost blocks and analyze the transient so obtained

and finally indicate its application to an image. The aim of the project is to implement the

Wavelet Transform to any time varying signal and analyze the signal obtained and to show the

shortcomings of Fourier Transform. The sharp discontinuities or spikes present in the signal can

be viewed due to the special property of wavelet transforms which is to indicate at what time

what frequency is present. The ultimate goal is to implement its typical and most common

application to an image and show excellent results of compression using wavelets and how

information in the image is retained. This project is implemented in 5416 (TI) processor.

SDI-12 IMAGE WATER MARKING USING WAVELETS

With the increasing use of internet and effortless copying, tempering and distribution of

digital data, copyright protection for multimedia data has become an important issue. Digital

watermarking emerged as a tool for protecting the multimedia data from copyright infringement.

In digital watermarking an imperceptible signal “mark” is embedded into the host image, which

uniquely identifies the ownership. After embedding the watermark, there should be no perceptual

degradation. These watermarks should not be removable by unauthorized person and should be

robust against intentional and unintentional attacks. Discrete wavelet transform (DWT) based

watermarking techniques are gaining more popularity because DWT has a number of advantages

over other transform such as progressive and low bit-rate transmission, quality scalability and

region-of-interest (ROI) coding demand more efficient and versatile image.This project is

implemented in BALCKFIN BF535(ADSP) processor.

SDI-13 FINGER PRINTING-SECURED TECHNIQUE FOR INTERNET

Page 12: Dsp

APPLICATIONS

A Homomorphic property of public-key cryptosystems is applied for several

cryptographic protocols, such as electronic cash, voting system, bidding protocols, etc. Several

fingerprinting protocols also exploit the property to achieve an asymmetric system. However,

their enciphering rate is extremely low and the implementation of watermarking technique is

difficult.. In this we use Okamoto–Uchiyama algorithm. In this project we propose a new

fingerprinting protocol applying additive encryption scheme.. We study the problem of

implementation of watermarking technique and propose a successful method to embed an

encrypted information without knowing the plain value. The security can also be protected for

both a buyer and a merchant in our scheme.This project is implemented in SHARC (ADSP)

processor.

SDI-14-COLOR TO GRAY AND BACK:COLOR EMBEDDING IN TO TEXTURE GRAY

IMAGES

In this project we developed a reversible method to convert color graphics and pictures to

gray images. This method is based on mapping colors to low-visibility high-frequency textures

that are applied onto the gray image. After receiving a monochrome textured image, the decoder

can identify the textures and recover the color information. More specifically, the image is

textured by carrying a sub band (wavelet) transform and replacing band pass sub bands by the

chrominance signals. The low-pass sub band is the same as that of the luminance signal. The

decoder performs a wavelet transform on the received gray image and recovers the chrominance

channels. The aim of our project is to convert color images to black and white image and to

recover the color information in the receiver side. This project is implemented in SHARC

(ADSP) processor.

SDI-15-PRE\POST FILTERING FOR DCT-BASED BLOCK CODING SYSTEMS

Block coding based on the discrete cosine transform (DCT) is very popular in image and

video compression. Pre/post-filtering can be attached to a DCT-based block coding system to

improve coding efficiency as well as to mitigate blocking artifacts. Previously designed pre/post-

filters are optimized to maximize coding efficiency solely. For image and video communication

Page 13: Dsp

over unreliable channels, those pre/post-filters are sensitive to transmission errors. This Projects

addresses the problem of designing pre/post-filters which are more error resilient. Reconstruction

performance is measured by

how low the average reconstruction error is, and how uniformly the reconstruction error is

distributed.This project is implemented in BALCKFIN BF533(ADSP) processor.

SDI-16-COCKTAIL WATER MARKING FOR SECURE DATA HIDING

Transferring digitized media via the Internet has become very popular in recent Years.

However, this frequent use of the Internet has created a need for security. As a consequence, to

prevent information which belongs to rightful owners from being intentionally or unwittingly

used by others, information protection is indispensable. A commonly suggested method is to

insert watermarks into original information so that rightful ownership can be declared. This is the

so-called watermarking technique. An effective watermarking procedure usually requires

satisfaction of a set of typical requirements. A novel image protection scheme called “cocktail

watermarking” is proposed in this Project. We analyze and point out the inadequacy of the

modulation techniques commonly used in ordinary spread spectrum watermarking methods and

the visual model-based ones.This project is implemented in BF 535 processor.

SDI-17 NUMBER PLATE RECOGNITION

Due to a huge number of vehicles, modern cities need to establish effectively systems for

traffic management and scheduling. One of the most useful systems is the number Plate

Recognition System which captures images of vehicles and read these plates’ registration

numbers .Our system consists of three main modules: number plate detection, plate number

segmentation, and plate number recognition. In detection module, we propose an efficient

method (sobel edge detector) combining the Hough transform This method optimizes speed and

accuracy in processing images taken from various positions. The detected information is

compared with data base number plate to display the address of the owner. This project is

implemented in BLACKFIN BF535(ADSP) processor.

Page 14: Dsp

AUTOMOTIVE ELECTRONICS

SDAE-01 CAN Based Industrial Automation

Nowadays, remote control of industrial appliances is possible only for a short distance since they

involve complex circuitry and many wired connections between the appliance and the control circuit. So,

when we need to go for long distance remote control the requirements keeps on increasing. Here in this

project a CAN based industrial automation has been proposed wherein the control information has been

sent through a two wired CAN protocol.This project has been implemented in TMS320LF2812A.

SDAE-02 CAN Based Car Security System

This project aims at the design of a security system for cars. Here the control of the door

opening system is secured with the help of a password which has been enrolled in a EEPROM

and stored in the ECU (Engine control unit).Also a controller interfaced with a keypad is placed

near the door where the password is typed .This password is transferred to the ECU through

CAN bus and is crosschecked with the enrolled password and if found to be correct the door

opens. Else the door remains closed. This project has been implemented in TMS320LF2812A.

SDAE-03 Automatic Vehicle Speed Management system

This project aims at restricting the speed of the vehicle in restricted zones like schools

and hospitals. Near the school zone a RFID transmitter is placed in the lamp post in road divider

and a RFID receiver is placed inside the vehicle’s ECU(Engine control unit). Also the speed of

the vehicle is measured by another controller and is transferred to the ECU through the CAN

Page 15: Dsp

bus. Whenever any speed information is received from the RFID txer, The ECU checks the speed

of the car and compares it with the RFID value. If found to be greater, the speed gets restricted

through the control circuit. Automatically. This project has been implemented in

TMS320LF2812A.

SDAE-04 Speedometer Implementation using CAN

This project aims at sensing and displaying the speed and distance travelled by

an vehicle on a Graphical LCD. The speed of the vehicle is calculated using spectral analysis

method and using this speed and the time duration travelled, the distance travelled is calculated.

These calculated values are then transmitted from the transmitter through the CAN module of

one DSC and received by the user end through the CAN module of the DSC. This project is

implemented using (TI)2812.

SDAE-05 Automatic Vehicle Parking System

Unmanned vehicle driving systems are getting interesting for the automobile industry.

Automatic parking systems are about making the best use of available space above and below

ground. The main objective of our project is to automatically acquire the place where the vehicle

can be parked. The enough free space to park the vehicle has been found by placing the ultrasonic

sensors on all the corners of the vehicle. The information acquired from those sensors is fed to the

controller depending on which the parking space is found.

SDAE-06 Implementation of Airbag system in a Vehicle

This project aims at the implementation of working of airbag system in a vehicle using

the CAN (Controller Area Network) protocol. When an accident occurs, the force exerted is taken as the

input by the CAN transmitter module which transmits the data to the control terminal. This control

terminal releases the airbag to prevent the persons inside the vehicle. This project is implemented using

(TI)2812.

Page 16: Dsp

Communication Projects

SDC-01 SECURED COMMUNICATION USING FREQUENCY HOPPING

In this project the message to be transmitted is digitized and mixed with a

pseudo-Random sequence which is many times the rate of the information signal.This results in

spreading the signal over a wider bandwidth .Each word thus generated is assigned a particular

frequency (within the available bandwidth) and then it is transmitted. The signal thus transmitted bears

no resemblance to the original message and so it can't be received by any "random" receiver.only the

receiver having the same PN sequence can decode the message.

SDC- 02 Space-Time Coded OFDM Systems

Orthogonal frequency division multiplexing (OFDM) has proven to be an effective technique

while compensating the effect of a frequency-selective radio channel, since it transforms a frequency-

selective channel into series of parallel flat-fading channels. Space-time coding (STC) on the other hand

is a transmit diversity method that is capable of enhancing the system performance by exploiting the

diversity in both space and time domains. The combination of OFDM and STC techniques seems to offer

a very promising ground for the research targeted for high data-rate communication systems.

The transmission and receiving side is implemented by using IFFT and FFT algorithm. The OFDM

modulation is generated by using a 16 point IFFT which produces multiplexed signals (of 1 KHz, 2 KHz

and 3 KHz). This time domain signal is called OFDM symbol. The data is encoded in the frequency

domain into each sub carriers (2 bits for each sub carriers in the case of QPSK modulation). In

demodulation, FFT is performed on the multiplex signal of sub carriers, converting into the frequency

domain and retrieving the encoded bits.

SDC-03 Multi Carrier DS-CDMA System

Page 17: Dsp

The input data is taken from different users .The PN sequences used for encoding the data

for security purpose. Each user having different PN sequences. The User data is scrambled with

PN sequences and given as input for Modulator. The 16-PSK (M-ary PSK) modulation technique

is implemented in modulator. In 16-PSK modulation, 16 sub carriers are assigned for encrypted

data. The Band width efficiency is achieved through 16-PSK Modulation. The data is transmitted

through DSSS concept. In receiver module, the data is received through demodulator and

decoder.

SDC-04 Time Frequency Spread OFDM/FHMA System

A combined scheme based on Orthogonal freguency-division multiplexing and Frequency-

hopped Multiple Access(OFDM/FHMA) is proposed,in which the transmitted data is spread over both

the time and frequency axes without expanding the bandwidth. The OFDM system advocated employs

the WHT for spreading the data in the frequency domain and weights the received signal by the

estimated Signal-to-Interference Ratio(SIR) for the sake of reducing the effects of interference. The

performance recorded,when communicating over an interference limited channel suggests that the

achievable BER improvement is as much as an order of magnitude in comparison to that of an

OFDM/FHMA scheme dispensing with WHT.

SDC-05 Coded Data Transmission System using Iterative Decoding

Technique

To Transmit the coded datas nothing but the encoded symbols of the users in high data

rate mode the Turbo Iterative Decoders are used. Comparing with Other Error correcting and detecting

decoders Turbo's BER is high. In this project ,in transmitter side we are giving character datas as input.

Then this datas are encrypted using Concatenated Encoders with addition of Inter-leavers. In the

Receiver Side the corresponding De-interleavers are designed and corresponding decoders are

implemented. Now the encrypted datas are given as input to the decoder,and decoder doing the error

correcting and detecting and resulting the original data bits.

Page 18: Dsp

SDC-06 Implementation of FFH System for increasing Frequency Diversity

In this treatise we demonstrate, how a high spatial and frequency diversity can be achieved by

combining Differential Space-Time Block Coding (DSTBC) and Fast Frequency Hopping (FFH). The

proposed FFH assisted DSTBC scheme is capable of achieving a high diversity order given by the product

of the frequency diversity order achieved by FFH and by the spatial diversity order offered by the DSTBC

arrangement. Hence, the system is capable of exploiting the advantages of both DSTBC and FFH.

Furthermore it is less vulnerable to some of their individual disadvantages, such as the performance

degradation of DSTBC due to fast fading and the large bandwidth requirement of the FFH system. The

proposed system also benefits from the employment of sphere packing and iterative turbo detection.

WIRELESS COMMUNICATION PROJECTS

SDW-01 IEEE 802.11a Protocol Implementation for WLAN Physical Layer Transceiver Module

The 802.11a standard specifies the PHY entity for OFDM system and the additions that have to

be made to the base standard to accommodate the OFDM PHY. This radio frequency LAN is aimed for 5

GHz unlicensed National Information Structure Band. The OFDM system provides a wireless LAN with

Page 19: Dsp

payload capabilities of various Data Rates. In this Project, the Transmitter Module of the WLAN system is

going to be implemented with Data Rates. The system uses 52 sub carriers that are modulated using

Binary Phase Shift Keying (BPSK). Forward Error Correction Coding (Convolution Coding) is used with a

coding rate of ½ and ¾ for any two data rates.The purpose of forward error correction (FEC) in wireless

system is to improve the capacity of a channel by adding some carefully designed redundant

information to the data being transmitted through the channel. The process of adding this redundant

information is known as channel coding. Convolution codes operate on serial data, one or a few bits at a

time. Convolution encoding with Viterbi decoding is a FEC technique that is particularly suited to a

channel in which the transmitted signal is corrupted mainly by additive white Gaussian noise (AWGN).

SDW-02 IEEE 802.15.1 Protocol Implementation for BLUETOOTH Physical Layer Transceiver Module

This standard defines the protocol and interconnection of devices or networks in a wireless personal

area network (WPAN). The standard uses carrier sense multiple access with a collision avoidance

medium access mechanism and supports peer-to-peer and point to multi point topologies. The purpose

of forward error correction (FEC) in wireless system is to improve the capacity of a channel by adding

some carefully designed redundant information to the data being transmitted through the channel. The

process of adding this redundant information is known as channel coding. Convolution codes operate on

serial data, one or a few bits at a time. Convolution encoding with Viterbi decoding is a FEC technique

that is particularly suited to a channel in which the transmitted signal is corrupted mainly by additive

white Gaussian noise (AWGN). The Data Whitening block is used for scrambling and security. The CRC is

used to determine whether the transmission error is occurred or not. Frequency Hopping Spread

Spectrum (FHSS) is used for modulation. Wireless personal area networks (WPANs) are used to convey

information over relatively short distances (10m).

SDW-04 IEEE 802.15.4 Protocol Implementation for ZIGBEE Physical Layer Transceiver Module

Page 20: Dsp

This standard defines the protocol and interconnection of devices or networks in a wireless personal

area network (WPAN). The standard uses carrier sense multiple access with a collision avoidance

medium access mechanism and supports peer-to-peer and point to multi point topologies. The purpose

of forward error correction (FEC) in wireless system is to improve the capacity of a channel by adding

some carefully designed redundant information to the data being transmitted through the channel. The

process of adding this redundant information is known as channel coding. Convolution codes operate on

serial data, one or a few bits at a time. Convolution encoding with Viterbi decoding is a FEC technique

that is particularly suited to a channel in which the transmitted signal is corrupted mainly by additive

white Gaussian noise (AWGN). The Data Whitening block is used for scrambling and security. The CRC is

used to determine whether the transmission error is occurred or not. Direct Sequence Spread Spectrum

(DSSS) is used for modulation. The QPSK modulation technique is processed in Modulator. Hence four

sub carrier is enough to represent our data bits. Wireless personal area networks (WPANs) are used to

convey information over relatively short distances (10m).

SDW-05 IEEE 802.16d Protocol Implementation for WIMAX Physical Layer Transceiver Module

This standard defines the protocol and interconnection of devices or networks via radio

communication in a metropolitan area network (MAN). The standard uses carrier sense multiple access

with a collision avoidance medium access mechanism and supports star, peer-to-peer and point to multi

point topologies. The media access is contention based on the optional super frame structure. Wireless

metropolitan area networks (WMANs) are used to convey information over relatively long distances.

WLANs are connected or communicated through WMANs. These are broadband access with the

maximum data rate of 120 Mbps at 10-66 GHz and 11 GHz.

Page 21: Dsp

SDW-06 Implementation of Physical Layer Transceiver Module for Beyond 3rd Generation Time

Division Duplex System

In 3G communication, convolution coding and turbo coding are adopted for speed and

data traffic, respectively. B3G systems are required to support higher data rates (tens of megabits

per second) with higher spectrum efficiency and relatively low transmit power. The combination

of STC with convolution coding, the conjugation of forward error correction (FEC) coding are

hot research topics concerning novel channel coding/decoding. Space-time coding (STC) on the

other hand is a transmit diversity method that is capable of enhancing the system performance by

exploiting the diversity in both space and time domains.

The purpose of forward error correction (FEC) in wireless system is to improve the capacity of a

channel by adding some carefully designed redundant information to the data being transmitted

through the channel. The process of adding this redundant information is known as channel coding.

Convolution codes operate on serial data, one or a few bits at a time. Convolution encoding with Viterbi

decoding is a FEC technique that is particularly suited to a channel in which the transmitted signal is

corrupted mainly by additive white Gaussian noise (AWGN).

SDW-07 Implementation of Physical Layer Transceiver Module for WCDMA System

Transmitting the datas,voice signal and images in the secured manner is achieved in the Narrow

band CDMA systems. To increase the users and high data rates we are moving to the 3G technologies

Named as WCDMA. By this, No. of users and High data rate communication achieved.

Here the spread sequences are used to separated the users. This is give the identity of the user to the

receiver. Through the corresponding the channel coders,Multiplexers,Spread code Generator and the

Modulators the transmitter operations are happening. In the receiver the decoders and demodulators

doing reciprocal operations.

Page 22: Dsp

SDW-08 Implementation of Physical Layer Transceiver Module for Software Defined Radio

Software defined radios (SDR) are highly configurable hardware platforms that provide the

technology for realizing the rapidly expanding third (and future) generation digital wireless

communication infrastructure. The use of the term software may give the impression that the radio is

realized entirely on a processor-based platform. The software in a SDR defines the system personality,

but currently, the implementation is often a mix of analog hardware, ASICs, FPGAs and DSP software.

Through the corresponding the channel coders,Multiplexers,Spread code Generator ,the Modulators

and spread spectrum communicators the transmitter operations are happening. In the receiver the

decoders and demodulators doing reciprocal operations.

SDW-09 Implementation of Physical Layer Transceiver Module for EDGE System

With an increasing demand on multimedia services, a design of high-speed data networks is an

important task in the wireless mobile environment. EDGE (Enhanced Data rates for Global

Evolution) is the next step in the evolution of GSM and IS-136 offering high data rate capabilities

in the existing GSM spectrum. EDGE introduces the new modulation scheme linear 8 Phase Shift Keying

(8PSK).n addition to GMSK, EDGE uses 8PSK for the upper five of its nine modulation and coding

schemes. EDGE produces a 3-bit word for every change in carrier phase. This effectively triples the gross

Page 23: Dsp

data rate offered by GSM. EDGE, like GPRS uses a rate adaptation algorithm that adapts the modulation

and coding scheme (MCS) according to the quality of the radio channel, and thus the bit rate and

robustness of data transmission. It introduces a new technology not found in GPRS, which, instead of

retransmitting disturbed packets, sends more redundancy information to be combined in the receiver.

This increases the probability of correct decoding.

SDW-10 Luby Transform Coding Aided Bit-Interleaved Coded Modulation for the Wireless Internet

The channels that we consider here are packet-based, and each packet has a header including a unique

identifier. We assume that error-correcting codes are used to detect and correct errors within a packet.

If a packet contains more errors than can be corrected by these codes, the packet is discarded and

treated as a loss. Thus, a packet either arrives completely intact and error-free, or it is lost. Bit-

Interleaved Coded Modulation using Iterative Decoding(BICM-ID) is amalgamated with Luby Transform

(LT) coding. The resultant joint design of the physical and data link layer substantially improves the

attainable Bit Error Rate (BER) performance. A Cyclic Redundancy Check (CRC) combined with a novel

Log-Likelihood Ratio(LLR) based packet reliability estimation method is proposed for the sake of

detecting and disposing of erroneous packets. Subsequently, bit-by-bit LT decoding is proposed, which

Page 24: Dsp

facilitates a further BER improvement at a lower number of BICM-ID iterations. Finally, we revisit the

pseudo random generator function used for designing the LT generator matrix.