scispace - formally typeset
Search or ask a question

Showing papers in "Etri Journal in 2008"


Journal ArticleDOI
TL;DR: A representative set of new applications is described and several key research challenges are identified that must be overcome to make this vision a reality.
Abstract: The technologies for wireless communication, sensing, and computation are each progressing at faster and faster rates. Notably, they are also being combined for an amazingly large multiplicative effect. It can be envisioned that the world will eventually be covered by networks of networks of smart sensors and actuators. This fact will give rise to revolutionary applications. However, to make this vision a reality, many research challenges must be overcome. This paper describes a representative set of new applications and identifies several key research challenges. Keywords: Wireless, communications, sensors, networks, knowledge creation, robustness, openness, security, privacy.

124 citations


Journal ArticleDOI
TL;DR: An innovative time synchronization solution using a counter and two latching registers is proposed and can achieve a time synchronization accuracy of 0.1 ms if INS can provide a hard‐wired timing signal.
Abstract: The necessity for the precise time synchronization of measurement data from multiple sensors is widely recognized in the field of global positioning system/inertial navigation system (GPS/INS) integration. Having precise time synchronization is critical for achieving high data fusion performance. The limitations and advantages of various time synchronization scenarios and existing solutions are investigated in this paper. A criterion for evaluating synchronization accuracy requirements is derived on the basis of a comparison of the Kalman filter innovation series and the platform dynamics. An innovative time synchronization solution using a counter and two latching registers is proposed. The proposed solution has been implemented with off-the-shelf components and tested. The resolution and accuracy analysis shows that the proposed solution can achieve a time synchronization accuracy of 0.1 ms if INS can provide a hard-wired timing signal. A synchronization accuracy of 2 ms was achieved when the test system was used to synchronize a low-grade micro-electromechanical inertial measurement unit (IMU), which has only an RS-232 data output interface.

66 citations


Journal ArticleDOI
TL;DR: The sensor network common interface is introduced which defines a standardized communication protocol and message formats used between the COSMOS and sensor networks.
Abstract: With the increasing need for intelligent environment monitoring applications and the decreasing cost of manufacturing sensor devices, it is likely that a wide variety of sensor networks will be deployed in the near future In this environment, the way to access heterogeneous sensor networks and the way to integrate various sensor data are very important This paper proposes the common system for middleware of sensor networks (COSMOS), which provides integrated data processing over multiple heterogeneous sensor networks based on sensor network abstraction called the sensor network common interface Specifically, this paper introduces the sensor network common interface which defines a standardized communication protocol and message formats used between the COSMOS and sensor networks

66 citations


Journal ArticleDOI
TL;DR: Performance results show that the Lightweight NEMO protocol can minimize total signaling costs and handoff signaling delay and the signaling overhead between 6LoWPAN mobile routers and 6Lo WPAN gateways by using a compressed mobility header.
Abstract: The Network Mobility (NEMO) and IPv6 over Low power WPAN (6LoWPAN) protocols are the two most important technologies in current networking research and are vital for the future ubiquitous environment. In this paper, we propose a compressed packet header format to support the mobility of 6LoWPAN. Also, a Lightweight NEMO protocol is proposed to minimize the signaling overhead between 6LoWPAN mobile routers and 6LoWPAN gateways by using a compressed mobility header. Performance results show that our Lightweight NEMO protocol can minimize total signaling costs and handoff signaling delay.

66 citations


Journal ArticleDOI
TL;DR: The proposed S‐box is more secure against differential and linear cryptanalysis compared to recently proposed chaotic S‐boxes and based on the mixing property of piecewise linear chaotic maps.
Abstract: A substitution box (S-box) plays a central role in cryptographic algorithms. In this paper, an efficient method for designing S-boxes based on chaotic maps is proposed. The proposed method is based on the mixing property of piecewise linear chaotic maps. The S-box so constructed has very low differential and linear approximation probabilities. The proposed S-box is more secure against differential and linear cryptanalysis compared to recently proposed chaotic S-boxes.

65 citations


Journal ArticleDOI
TL;DR: An eye detection method for facial images using Zernike moments with a support vector machine (SVM) is proposed, which is robust against rotation and achieves a higher performance level than that achievable by the method that uses gray values with an SVM.
Abstract: An eye detection method for facial images using Zernike moments with a support vector machine (SVM) is proposed. Eye/non-eye patterns are represented in terms of the magnitude of Zernike moments and then classified by the SVM. Due to the rotation-invariant characteristics of the magnitude of Zernike moments, the method is robust against rotation, which is demonstrated using rotated images from the ORL database. Experiments with TV drama videos showed that the proposed method achieved a 94.6% detection rate, which is a higher performance level than that achievable by the method that uses gray values with an SVM.

53 citations


Journal ArticleDOI
TL;DR: This paper presents solutions based on parallel architectures for high throughput and power efficient FFT cores and shows that up to 38% and 55% power savings can be achieved by the proposed pipelined F FTs and parallel‐pipelined FFTs respectively, compared to the conventional pipelining FFT processor architectures.
Abstract: Recently, the power consumption of integrated circuits has been attracting increasing attention. Many techniques have been studied to improve the power efficiency of digital signal processing units such as fast Fourier transform (FFT) processors, which are popularly employed in both traditional research fields, such as satellite communications, and thriving consumer electronics, such as wireless communications. This paper presents solutions based on parallel architectures for high throughput and power efficient FFT cores. Different combinations of hybrid low-power techniques are exploited to reduce power consumption, such as multiplierless units which replace the complex multipliers in FFTs, low-power commutators based on an advanced interconnection, and parallel-pipelined architectures. A number of FFT cores are implemented and evaluated for their power/area performance. The results show that up to 38% and 55% power savings can be achieved by the proposed pipelined FFTs and parallel-pipelined FFTs respectively, compared to the conventional pipelined FFT processor architectures.

44 citations


Journal ArticleDOI
TL;DR: The results show that the proposed sub‐optimal control can lead to performance close to the optimal control, but with much simpler strategies for long periods of time in practical use.
Abstract: The security threat posed by worms has steadily increased in recent years. This paper discusses the application of the optimal and sub-optimal Internet worm control via Pontryagin's maximum principle. To this end, a control variable representing the optimal treatment strategy for infectious hosts is introduced into the two-factor worm model. The numerical optimal control laws are implemented by the multiple shooting method and the sub-optimal solution is computed using genetic algorithms. Simulation results demonstrate the effectiveness of the proposed optimal and sub-optimal strategies. It also provides a theoretical interpretation of the practical experience that the maximum implementation of treatment in the early stage is critically important in controlling outbreaks of Internet worms. Furthermore, our results show that the proposed sub-optimal control can lead to performance close to the optimal control, but with much simpler strategies for long periods of time in practical use.

35 citations


Journal ArticleDOI
TL;DR: In this paper, the authors proposed a customer satisfaction index (CSI) model for mobile radio frequency identification (RFID) services and measured the CSI to derive practical implications for their providers and pointers related to the improvement of service.
Abstract: One of the ubiquitous technology fields that have received the most attention recently from technology communities worldwide is mobile radio frequency identification (RFID). Mobile handsets loaded with RFID readers enable the identification and retrieval of information on RFID tagged objects. In Korea, a variety of mobile RFID services are currently being piloted, and their commercial roll-out looks imminent. The goal of this study is to propose, ahead of the commercial launch of mobile RFID services, a customer satisfaction index (CSI) model for this service category and to then measure the CSI to derive practical implications for their providers and pointers related to the improvement of service. A web survey was conducted on Korean mobile phone subscribers who had participated in a mobile RFID pilot program. Using the results of this survey, we tested the CSI model and its hypotheses by employing a partial leastsquares-based structural equation model analysis and calculated the index. We further conducted an importance-performance analysis in order to provide insights that may be useful for improving the quality of mobile RFID services.

33 citations


Journal ArticleDOI
TL;DR: In this article, side channel analysis attack resistance of various FPGA hardware implementations of the ARIA block cipher was investigated on an FPGAs test board dedicated to side channel attacks, and it was shown that an unprotected implementation of ARIA allows one to recover the secret key with a low number of power or electromagnetic measurements.
Abstract: In this paper, we first investigate the side channel analysis attack resistance of various FPGA hardware implementations of the ARIA block cipher. The analysis is performed on an FPGA test board dedicated to side channel attacks. Our results show that an unprotected implementation of ARIA allows one to recover the secret key with a low number of power or electromagnetic measurements. We also present a masking countermeasure and analyze its second-order side channel resistance by using various suitable preprocessing functions. Our experimental results clearly confirm that second-order differential side channel analysis attacks also remain a practical threat for masked hardware implementations of ARIA.

28 citations


Journal ArticleDOI
TL;DR: In this paper, a new QoS management architecture, flow-aggregate-based services (FAbS), is proposed, which has two novel building blocks: inter-domain flow aggregation and endpoint implicit admission control.
Abstract: At the extremes of the complexity-performance plane, there are two exemplary QoS management architectures: Integrated Services (IntServ) and Differentiated Services (DiffServ). IntServ performs ideally but is not scalable. Diffserv is simple enough to be adopted in today's core networks, but without any performance guarantee. Many compromise solutions have been proposed. These schemes, called quasi-stateful IntServ or stateful Diffserv, however, have not attracted much attention due to their inherently compromising natures. Two disruptive flow-based architectures have been recently introduced: the flow-aware network (FAN) and the flow-state-aware network (FSA). FAN's control is implicit without any signaling. FSA's control is even more sophisticated than that of IntServ. In this paper, we survey established QoS architectures, review disruptive architectures, discuss their rationales, and points out their disadvantages. A new QoS management architecture, flow-aggregate-based services (FAbS), is then proposed. The FAbS architecture has two novel building blocks: inter-domain flow aggregation and endpoint implicit admission control.

Journal ArticleDOI
TL;DR: This work addresses the outage performance for the opportunistic amplify-and-forward relaying strategies under Nakagami-m fading channels and derives a closed-form expression for the outage probability.
Abstract: We address the outage performance for the opportunistic amplify-and-forward relaying strategies under Nakagami-m fading channels. A closed-form expression for the outage probability is derived. Simulation results verify our theoretical solutions.

Journal ArticleDOI
TL;DR: An operational orbit determination (OD) and prediction system for the geostationary Communication, Ocean, and Meteorological Satellite (COMS) mission requires accurate satellite positioning knowledge to accomplish image navigation registration on the ground.
Abstract: An operational orbit determination (OD) and prediction system for the geostationary Communication, Ocean, and Meteorological Satellite (COMS) mission requires accurate satellite positioning knowledge to accomplish image navigation registration on the ground. Ranging and tracking data from a single ground station is used for COMS OD in normal operation. However, the orbital longitude of the COMS is so close to that of satellite tracking sites that geometric singularity affects observability. A method to solve the azimuth bias of a single station in singularity is to periodically apply an estimated azimuth bias using the ranging and tracking data of two stations. Velocity increments of a wheel off-loading maneuver which is performed twice a day are fixed by planned values without considering maneuver efficiency during OD. Using only single-station data with the correction of the azimuth bias, OD can achieve three-sigma position accuracy on the order of 1.5 km root-sum-square.

Journal ArticleDOI
TL;DR: In this paper, the authors proposed a compact, energy-efficient, and smart gas sensor platform technology for ubiquitous sensor network (USN) applications, which is realized by employing silicon-on-insulator (SOI) technology.
Abstract: This paper proposes a compact, energy-efficient, and smart gas sensor platform technology for ubiquitous sensor network (USN) applications. The compact design of the platform is realized by employing silicon-on-insulator (SOI) technology. The sensing element is fully integrated with SOI CMOS circuits for signal processing and communication. Also, the micro-hotplate operates at high temperatures with extremely low power consumption, which is important for USN applications. ZnO nanowires are synthesized onto the micro-hotplate by a simple hydrothermal process and are patterned by a lift-off to form the gas sensor. The sensor was operated at 200 degrees C and showed a good response to 100 ppb NO2 gas.

Journal ArticleDOI
TL;DR: In this article, a small and low profile RFID tag antenna in the UHF band that can be mounted on metallic objects is presented, which uses a ceramic material as a substrate, consisting of a radiating patch and a microstrip line with two shorting pins for a proximity-coupled feeding structure.
Abstract: This letter presents the design of a small and low-profile RFID tag antenna in the UHF band that can be mounted on metallic objects. The designed tag antenna, which uses a ceramic material as a substrate, consists of a radiating patch and a microstrip line with two shorting pins for a proximity-coupled feeding structure. Using this structure, impedance matching can be simply obtained between the antenna and tag chip without a matching network. The fractional impedance bandwidth for S 11<3 dB and radiation efficiency are about 1.4% and 56% at 911 MHz, respectively. The read range is approximately from 5 m to 6 m when the tag antenna is mounted on a metallic surface.

Journal ArticleDOI
TL;DR: An efficient single‐resource task scheduling algorithm for the Communication, Ocean, and Meteorological Satellite, which resolves conflict among tasks which have an exclusion relation and the same priority is proposed.
Abstract: In this paper, we propose an efficient single-resource task scheduling algorithm for the Communication, Ocean, and Meteorological Satellite. Among general satellite planning functions such as constraint check, priority check, and task scheduling, this paper focuses on the task scheduling algorithm, which resolves conflict among tasks which have an exclusion relation and the same priority. The goal of the proposed task scheduling algorithm is to maximize the number of tasks that can be scheduled. The rationale of the algorithm is that a discarded task can be scheduled instead of a previously selected one depending on the expected benefit acquired by doing so. The evaluation results show that the proposed algorithm enhances the number of tasks that can be scheduled considerably.

Journal ArticleDOI
TL;DR: The design of a low-power 512-bit synchronous EEPROM for a passive UHF RFID tag chip is presented and low- power schemes, such as dual power supply voltage, clocked inverter sensing, voltage-up converter, I/O interface, and Dickson charge pump are applied.
Abstract: 【In this paper, the design of a low-power 512-bit synchronous EEPROM for a passive UHF RFID tag chip is presented. We apply low-power schemes, such as dual power supply voltage (VDD=1.5 V and VDDP=2.5 V), clocked inverter sensing, voltage-up converter, I/O interface, and Dickson charge pump using Schottky diode. An EEPROM is fabricated with the 0.25 ${\mu}m$ EEPROM process. Power dissipation is 32.78 ${\mu}W$ in the read cycle and 78.05 ${\mu}W$ in the write cycle. The layout size is 449.3 ${\mu}m$ ${\times}$ 480.67 ${\mu}m$ .】

Journal ArticleDOI
TL;DR: In this article, a transcutaneous energy transmission (TET) system was developed for transmitting electrical power to an implanted device, such as an artificial heart in a patient's body.
Abstract: A new transcutaneous energy transmission (TET) system was developed for transmitting electrical power to an implanted device, such as an artificial heart in a patient's body. This new design can maintain a stable output voltage independent of the load resistance. The system includes a compensation capacitor to reduce energy loss and increase power transfer efficiency. Experimental results show that the output voltage of the receiving coil changes very little as the load resistance varies from 14.8 Ω to 15 kΩ, which corresponds to a change in output power from 0.1 to 97 W.

Journal ArticleDOI
TL;DR: A high quality visualization platform which creates images that look similar to real mobile devices in addition to real‐time simulation of realistic motions and functions of mobile devices and a system which consists of a mixed‐reality‐based testing platform for measuring hand load.
Abstract: In this paper, we present a design evaluation system with visualization and interaction of mobile devices using virtual-reality-based prototypes which can be used to easily change design parameters and simulate embedded software. To evaluate and predict affective-engineering-based design preferences for mobile devices under a virtual environment, we have developed a high quality visualization platform which creates images that look similar to real mobile devices in addition to real-time simulation of realistic motions and functions of mobile devices. To support a quantitative usability test scenario for external design shape, we also have built a system which consists of a mixed-reality-based testing platform for measuring hand load.

Journal ArticleDOI
TL;DR: A dynamic traffic identification method to dynamically prioritize traffic according to the traffic characteristics of applications could be a good alternative to deep packet inspection, which requires handling of the IP packet header and payload.
Abstract: In this paper, we propose quality of service mechanisms for flow-based routers which have to handle several million flows at wire speed in high-speed networks. Traffic management mechanisms are proposed for guaranteed traffic and non-guaranteed traffic separately, and then the effective harmonization of the two mechanisms is introduced for real networks in which both traffic types are mixed together. A simple non-work-conserving fair queuing algorithm is proposed for guaranteed traffic, and an adaptive flow-based random early drop algorithm is proposed for non-guaranteed traffic. Based on that basic architecture, we propose a dynamic traffic identification method to dynamically prioritize traffic according to the traffic characteristics of applications. In a high-speed router system, the dynamic traffic identification method could be a good alternative to deep packet inspection, which requires handling of the IP packet header and payload. Through numerical analysis, simulation, and a real system experiment, we demonstrate the performance of the proposed mechanisms.

Journal ArticleDOI
TL;DR: A model of interference at a sink considering two kinds of interference: multiple access interference (MAI) and node interference (NI) is introduced and the sink capacity is determined, which is defined as the maximum number of concurrent sensor nodes located one hop away from the sink.
Abstract: We evaluate the sink capacity of wireless code division multiple access (CDMA) sensor networks with layered architecture. We introduce a model of interference at a sink considering two kinds of interference: multiple access interference (MAI) and node interference (NI). We also investigate the activity of sensor nodes around the sink in relation to gathering data under a layered architecture. Based on the interference model and the activity of sensor nodes around the sink, we derive the failure probability of the transmission from a source node located one hop away from the sink using Gaussian approximation. Under the requirement of 1% failure probability of transmission, we determine the sink capacity, which is defined as the maximum number of concurrent sensor nodes located one hop away from the sink. We demonstrate that as the node activity of the MAI decreases, the variation of the sink capacity due to the node activity of the NI becomes more significant. The analysis results are verified through computer simulations.

Journal ArticleDOI
TL;DR: The back propagation neural network (BPNN) is used to classify the faults in the designed charge‐pump PLL, and the proposed method of fault classification gave fault coverage of 99.58%.
Abstract: Phase-locked loops (PLLs) are among the most important mixed-signal building blocks of modern communication and control circuits, where they are used for frequency and phase synchronization, modulation, and demodulation as well as frequency synthesis. The growing popularity of PLLs has increased the need to test these devices during prototyping and production. The problem of distinguishing and classifying the responses of analog integrated circuits containing catastrophic faults has aroused recent interest. This is because most analog and mixed signal circuits are tested by their functionality, which is both time consuming and expensive. The problem is made more difficult when parametric variations are taken into account. Hence, statistical methods and techniques can be employed to automate fault classification. As a possible solution, we use the back propagation neural network (BPNN) to classify the faults in the designed charge-pump PLL. In order to classify the faults, the BPNN was trained with various training algorithms and their performance for the test structure was analyzed. The proposed method of fault classification gave fault coverage of 99.58%.

Journal ArticleDOI
TL;DR: A new technique to discover frequent spatiotemporal patterns from a moving object database is offered, to employ the algorithm AllMOP to discover the frequent movement patterns in the user's historical movements, from which frequent movement rules are generated.
Abstract: In this paper, we offer a new technique to discover frequent spatiotemporal patterns from a moving object database. Though the search space for spatiotemporal knowledge is extremely challenging, imposing spatial and timing constraints on moving sequences makes the computation feasible. The proposed technique includes two algorithms, AllMOP and MaxMOP, to find all frequent patterns and maximal patterns, respectively. In addition, to support the service provider in sending information to a user in a push-driven manner, we propose a rule-based location prediction technique to predict the future location of the user. The idea is to employ the algorithm AllMOP to discover the frequent movement patterns in the user’s historical movements, from which frequent movement rules are generated. These rules are then used to estimate the future location of the user. The performance is assessed with respect to precision and recall. The proposed techniques could be quite efficiently applied in a location-based service (LBS) system in which diverse types of data are integrated to support a variety of LBSs.

Journal ArticleDOI
TL;DR: The simulated and measured results show good agreement, which confirms the usefulness of the proposed tri- band spatial filter.
Abstract: We propose a novel spatial multi-band-stop filter using modified multiple loop array elements to block electromagnetic waves or signals of mobile phones in public facilities. It operates at the following frequency bands: Korean cellular (824 MHz to 894 MHz), Personal Communication Service (PCS) (1.75 GHz to 1.87 GHz), and IMT-2000 (1.92 GHz to 2.17 GHz). Two frequency selective surfaces with modified multiple-loop elements are printed on the top and bottom of a pair-glass pane, which is a pair of glass panes with an air gap between them. A modified multiple-loop element with a meander line is used to make the size of the filter compact. The simulated and measured results show good agreement, which confirms the usefulness of the proposed tri- band spatial filter.

Journal ArticleDOI
TL;DR: Implementation results show that the proposed VD architecture is suitable for multiband orthogonal frequency-division multiplexing (MB-OFDM) ultra-wideband (UWB) systems, which can support the data rate of 480 Mbps even when implemented using 0.18-µm CMOS technology.
Abstract: This letter presents a power efficient 64-state Viterbi decoder (VD) employing a two-stage radix-4 add- compare-select architecture. A class of VD architectures is implemented, and their hardware complexity, maximum operating speed, and power consumption are compared. Implementation results show that the proposed VD architecture is suitable for multiband orthogonal frequency-division multiplexing (MB-OFDM) ultra-wideband (UWB) systems, which can support the data rate of 480 Mbps even when implemented using 0.18-µm CMOS technology.

Journal ArticleDOI
TL;DR: A dual addressing scheme (DAS) for IPv6 over IEEE 802.15.4 wireless sensor networks (WSN) that combines a global unicast address to cope with association link changes and node mobility, and it links local addresses to lighten the overhead of the system to save energy and resources.
Abstract: This paper proposes a dual addressing scheme (DAS) for IPv6 over IEEE 802.15.4 wireless sensor networks (WSN). DAS combines a global unicast address to cope with association link changes and node mobility, and it links local addresses to lighten the overhead of the system to save energy and resources. This paper describes DAS address formats, address autoconfiguration, and address translation tables in the gateway. A detailed description of DAS is provided through examples. Simulations are performed to demonstrate the performance improvements of the DAS compared with the IPv6-based WSN, which uses the conventional single address.

Journal ArticleDOI
TL;DR: IPEN is an accurate and fine grain power estimation tool, using an instruction‐level simulator, independent of the operating system, so many different kinds of sensor node software can be simulated for estimation.
Abstract: In sensor networks, analyzing power consumption before actual deployment is crucial for maximizing service lifetime. This paper proposes an instruction-level power estimator (IPEN) for sensor networks. IPEN is an accurate and fine grain power estimation tool, using an instructionlevel simulator. It is independent of the operating system, so many different kinds of sensor node software can be simulated for estimation. We have developed the power model of a Micaz-compatible mote. The power consumption of the ATmega128L microcontroller is modeled with the base energy cost and the instruction overheads. The CC2420 communication component and other peripherals are modeled according to their operation states. The energy consumption estimation module profiles peripheral accesses and function calls while an application is running. IPEN has shown excellent power estimation accuracy, with less than 5% estimation error compared to real sensor network implementation. With IPEN’s high precision instruction-level energy prediction, users can accurately estimate a sensor network’s energy consumption and achieve fine-grained optimization of their software.

Journal ArticleDOI
TL;DR: The experimental results of a lowpower low-cost RF transceiver for the 915 MHz band IEEE 802.15.4b standard are presented, achieving low power and low cost by optimizing the transceiver architecture and circuit design techniques.
Abstract: This paper presents the experimental results of a lowpower low-cost RF transceiver for the 915 MHz band IEEE 802.15.4b standard. Low power and low cost are achieved by optimizing the transceiver architecture and circuit design techniques. The proposed transceiver shares the analog baseband section for both receive and transmit modes to reduce the silicon area. The RF transceiver consumes 11.2 mA in receive mode and 22.5 mA in transmit mode under a supply voltage of 1.8 V, in which 5 mA of quadrature voltage controlled oscillator is included. The proposed transceiver is implemented in a 0.18 μm CMOS process and occupies 10 mm 2 of silicon area.

Journal ArticleDOI
TL;DR: By computer simulation, it is demonstrated that, under a CR environment, the proposed CR OFDM architecture outperforms conventional OFDM systems in terms of throughput and BER performance.
Abstract: Cognitive radio (CR) has been proposed as an effective technology for flexible use of the radio spectrum. The interference between primary users and CR users, however, becomes a critical problem when they are using adjacent frequency channels with different transmission power levels. In this paper, a robust CR orthogonal frequency division multiplexing (OFDM) architecture, which can effectively suppress interference to nearby primary users and overcome adjacent channel interference (ACI) to the CR user, is proposed. This new approach is characterized by adaptive data repetition for subcarriers under heavy ACI, and adaptive time spreading for subcarriers near the borders of the CR user’s spectrum. The data repetition scheme provides extra power gain against the ACI coming from primary users. Time spreading guarantees an acceptable interference level to nearby primary users. By computer simulation, we demonstrate that, under a CR environment, the proposed CR OFDM architecture outperforms conventional OFDM systems in terms of throughput and BER performance.

Journal ArticleDOI
TL;DR: In this article, the authors compare the performance of a wavelength remodulated wavelength division multiplexed passive optical network implemented using Manchester-coded or IRZ-coded signal downstream and non-return-to-zero remodulated signal upstream.
Abstract: We compare the performance of a wavelength remodulated wavelength-division-multiplexed passive optical network implemented using Manchester-coded or inverse-return-to-zero (IRZ)-coded signal downstream and non-return-to-zero remodulated signal upstream. We investigate the effects of varying differences between downstream and upstream bit rates on the two coding schemes. When the bit rate ratio of upstream to downstream is less than or equal to 50%, the performance of Manchester coding is better than that of IRZ coding. However, when the bit rate ratio of upstream to downstream is higher than 50%, Manchester code requires appropriate time delay between upstream and downstream signals, whereas IRZ code needs reduced extinction ratio in the downstream signal.