SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Innovative Systems Design and Engineering                                                  www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 7, 2011

The Tent Chaotic Mapping: Analysis for Generation of Binary
     Codes for Better Performance by Using MATLAB
                                       Annepu .Venkata NagaVamsi
                    Dept of E.I.E, AITAM, Tekkali -532201, Andhra Pradesh, India.
                                     E-mail: vamsikrishna_avn@yahoo.co.in
                                         G.S.S.S.S.V.K.Mohan
                    Dept of E.I.E, AITAM, Tekkali -532201, Andhra Pradesh, India.
                                       E-mail: g_k_mohan@yahoo.com
                                          M.S.Pradeep Kumar Patnaik
                     Dept of E.I.E, AITAM, Tekkali -532201, Andhra Pradesh, India.
                                     E-mail: patnaik_mspk@yahoo.com


Received: October 29, 2011
Accepted: October 30, 2011
Published: November 4, 2011

Abstract:
 In this paper, the Tent map is analyzed as a source of pseudorandom bits. To evaluate the performance of
the proposed pseudorandom bit generator, different issues were considered, such as the period length, the
discriminator value and the merit factor. The Tent mapping is a suitable alternative to other tradinational
low-complexity pseudorandom bit generators.
Keywords: Tent map, discrimination value, merit factor, chaotic signal.

1. Introduction
The generation of random numbers is required in several applications, including measurement and testing
of digital circuits and telecommunication systems (eg, to perform their functional verification and evaluate
their immunity to noise), the aim is to achieve a satisfactory tradeoff among the best merit factor. In radar
or sonar applications, linear chirps are the most typically used signals to achieve pulse compression. The
pulse being of finite length, the amplitude is a rectangle function. If the transmitted signal has a duration T,
begins at t = 0 and linearly sweeps the frequency band Δf centered on carrier f0, it can be written
              (            )
     = {A                           if 0 t<T
                       0          otherwise ...........1.1
 for best performance, the autocorrelation pattern of the optimum coded waveform must have a large peak
value for zero shift and zero value for non-zero shifts. In this paper, good binary codes are generated using
Tent –map equation to achieve a low PSL. It is possible to generate infinite number of codes at larger
lengths easily, by changing the initial conditions by very small increment, threshold level and bifurcation
factor.


2. How can chaotic waveform help?
They are deterministic (defined by an iterative map or differential equations), and can therefore be
practically implemented.



78 | P a g e
www.iiste.org
Innovative Systems Design and Engineering                                                www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 7, 2011
 They are non – periodic, which suggests there are potential advantages in security and can be used as
(infinitely) long spreading sequences.
They are sensitive to initial conditions so that the behaviour of two systems with small difference in the
initial system state (or) a parameter diverges exponentially in time while both systems remain bounded by
the operation of the non-linearity a property useful in efficient high power transmission.
Chaotic systems have a very sensitive dependence on their initial conditions. This sensitive dependence can
be demonstrated by giving two very close initial points to the iterative map. After a few iterations, the two
resulting sequences will look completely uncorrelated. Hence; an abundant source of almost uncorrelated
signals has been discovered: a slight change in the initial condition will produce a completely different
signal.


3. Tent mapping-Chaotic Equation
Here in this paper we are dealing with the Tent mapping. A deal of chaotic behaviour can be described by
one simple, fairly innocuous looking equation, the Tent map as shown in the Figure1.,and the bifurcation
for the tent map in Figure 2.
The chaotic mapping is as follows
           Xn+1 = f (xn)                     .........1.1
Tent mapping:
           Xn+1 = A - (B (xn))     A>1         .....1.2
           The chaotic regime:
Xn belongs to [A (1-B), A] 0<B<2             ……1.3


4. Proposed technique for code generation
As the Tent chaotic mapping, we can generate different sequences and by selecting the best sequence
among the sequences, the best sequence is taken and is been coded in binary for the best results.
The threshold for the binary codes is done as below
X (n) >0     xx (n) = 1                     ..........1.4
X (n) <0      xx (n) = -1                   ..........1.5
The applied function is auto –correlation pattern
X (n) is an N length sequence the auto correlation function is defined as
R (k) = ∑ x (n) x (n+k) limits from
 n= 0 to N-1-k                                ......1.6
From the autocorrelation pattern, the discriminator factor (D) can be formed as,

         R (0)
   D=    …….                     Where k≠0 ………..1.7
        Max(R (k)


5. Side lobe Reduction Using Window
function
The main disadvantage of pulse compression is the appearance of side lobes in the autocorrelation function
which will mask the weak reflections from other targets, this can be overcome by reducing the side lobes,
there are various techniques for this purpose, and one such is the windowing techniques.

The following window functions have been applied.

79 | P a g e
www.iiste.org
Innovative Systems Design and Engineering                                                   www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 7, 2011
    1.    Hamming window-

         W (n) =0.54+0.46cos (2pi*n/N+1) , 0 ≤ n ≤ N

    2.    Hanning window-

         w (n)= 0.5+0.5*cos (pi*n/N+1), 0 ≤ n ≤ N
    3.     Triangular Window-
          W (n) = 1-n/2(N+1)            0 ≤ N ≤ N+1
5.1 Results for binary codes and its response to a matched filter is show in the Table 1.

6. Results and Conclusion
Good binary codes were generated using Tent map. At different lengths, good sequences were obtained and
it was found that the discrimination factor increases with the length of the sequence. At lower lengths the
performance with the hanning and hamming windows function were found to be superior compared to
triangular window. The best sequences were found from the triangular window function at higher lengths.
Further improvement in the result can be obtained by reducing the incremental value in the algorithm and
search for new good codes.


7. Graphical Results
The graphical result shows the exactly the differences in the rectangular window, hanning window,
hamming window and triangular window as in the Figure 3,Figure 4,Figure 5,Figure 6 and the tent map out
put                     in                     the                       Figure                       7

References
 “Ling cong, Sun Songgeng. A chaotic spreading sequence generator,”                 Chinese journal ACTA
ELECTRNICASINICA.vol.20, no.2, pp. 235-239, 1998
Ghobad, H.B. Chaotic signals for digital communication.Ph.D Thesis for Purdue University, 1992
”Radar signal processing” LEWIS, B.L, BAUEL, INC, 1996, PP325-329.
”Base band model for distance and bearing estimation”, A.bauel, proc.IEEE, ISCAS-3, MONTERY,
California, pp. 275-278, 1998.
Chaotic Phase Code for radar pulse compression Xinwu, Weixian Liu, Lei Zhao and Jeffrey S.Fu, IEEE
Radar Conf.2001, pp 279-283.
AJ Fenwick C Williams S A Harman “Chaotic signals in radar and sonar” Proc. Of the international
conferences on Waveform Diversity and Design 2006 January 2006 Kuhai USA.
Base band model for distance and bearing estimation”, A.bauel, proc.IEEE, ISCAS-3, MONTERY,
California, pp. 275-278, 1998.
Ternary Pulse Compression Sequence”, INST, MOHORIR, P.S.RAJA RAJESWARI and VENKATA
RAO.K, PP.146-149, 1998.
 A Chaotic Sequence Spread-Spectrum” IEEE Transactions on Communications. vol. 25(2/3/9), pp. 1126-
1129, 1996.MAKOTO ITOH,
Ternary Pulse Compression Sequence by logistic map” ”, IEEE, MOHORIR, PP.2512-2515, 1998
Direct Sequence –Radar Communication System” vol.19, pp 529- 531, 2008
International Journal on Chaotic Signals “, vol.12, no.23, pp.236-239, 1999
D. Middleton, An Introduction to Statistical Communication Theory. New York: McGraw-Hill, 1988.


80 | P a g e
www.iiste.org
Innovative Systems Design and Engineering                                         www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 7, 2011
 ”Chaotic pulse code for radar pulse compression “IEEE Radar Conference, 2001, LEIZHAO and
JEFFREY, PP 279-283.
 G. Heidari-Bateni and C. D. McGillem, “A chaotic direct-sequence spread-spectrum Communication
system,” IEEE Trans Commun., vol.42, pp. 1524– 1527,Feb./Mar./Apr. 1994




                                  Figure 1. Graph of Tent map function




                                 Figure 2. Bifurcation diagram for the tent map




                               Figure 3. Discrimination curve for the hamming window

81 | P a g e
www.iiste.org
Innovative Systems Design and Engineering                                      www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 7, 2011




                             Figure 4. Discrimination curve for the Triangular window




                             Figure 5. Discrimination curve for the rectangular window




                             Figure 6. Discrimination curve for the hanning window

82 | P a g e
www.iiste.org
Innovative Systems Design and Engineering                                   www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 7, 2011




                                   Figure 6. Output for Tent mapping

                                                  Table 1
                                             DISCRIMINATION FACTOR
                             Length
                                          Drec        Dhan     Dham     Dtri
                                          value       value    value    value

                             20           7.665       9.761    10.822   8.309

                             50           8.142       9.034    12.385   8.996

                             100          12.353      13.236   15.221   9.473

                             500          15.822      15.145   16.375   13.694

                             1000         16.381      16.679   18.765   16.726

                             1500         17.643      18.667   19.504   18.848

                             2000         19.414      19.237   20.305   20.476

                             2500         21.321      22.560   21.824   21.960


                             3000         22.496      23.359   22.272   23.702


                             3500         22.602      23.691   23.383   24.432




83 | P a g e
www.iiste.org

Weitere ähnliche Inhalte

Was ist angesagt?

Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
IJRAT
 
A comprehensive survey of contemporary
A comprehensive survey of contemporaryA comprehensive survey of contemporary
A comprehensive survey of contemporary
prjpublications
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130
IJRAT
 
Linked CP Tensor Decomposition (presented by ICONIP2012)
Linked CP Tensor Decomposition (presented by ICONIP2012)Linked CP Tensor Decomposition (presented by ICONIP2012)
Linked CP Tensor Decomposition (presented by ICONIP2012)
Tatsuya Yokota
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464
IJRAT
 
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
paperpublications3
 
A simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representationsA simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representations
Devansh16
 

Was ist angesagt? (19)

Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 
A comprehensive survey of contemporary
A comprehensive survey of contemporaryA comprehensive survey of contemporary
A comprehensive survey of contemporary
 
Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful Shares
 
Blind Audio Source Separation (Bass): An Unsuperwised Approach
Blind Audio Source Separation (Bass): An Unsuperwised Approach Blind Audio Source Separation (Bass): An Unsuperwised Approach
Blind Audio Source Separation (Bass): An Unsuperwised Approach
 
40120140501004
4012014050100440120140501004
40120140501004
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130
 
Linked CP Tensor Decomposition (presented by ICONIP2012)
Linked CP Tensor Decomposition (presented by ICONIP2012)Linked CP Tensor Decomposition (presented by ICONIP2012)
Linked CP Tensor Decomposition (presented by ICONIP2012)
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464
 
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
 
AlexNet
AlexNetAlexNet
AlexNet
 
Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...
Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...
Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...
 
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
 
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
 
Performance evaluation of ds cdma
Performance evaluation of ds cdmaPerformance evaluation of ds cdma
Performance evaluation of ds cdma
 
Implementation of a modified counterpropagation neural network model in onlin...
Implementation of a modified counterpropagation neural network model in onlin...Implementation of a modified counterpropagation neural network model in onlin...
Implementation of a modified counterpropagation neural network model in onlin...
 
A simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representationsA simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representations
 
Principal Component Analysis for Tensor Analysis and EEG classification
Principal Component Analysis for Tensor Analysis and EEG classificationPrincipal Component Analysis for Tensor Analysis and EEG classification
Principal Component Analysis for Tensor Analysis and EEG classification
 
PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...
PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...
PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...
 
Deep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingDeep Learning for Natural Language Processing
Deep Learning for Natural Language Processing
 

Andere mochten auch

9° tarea bullying. Cllaret Tovar
9° tarea bullying. Cllaret Tovar9° tarea bullying. Cllaret Tovar
9° tarea bullying. Cllaret Tovar
Claret Uny
 
9. thong tin ts dh, cd vung db song cuu long
9. thong tin ts dh, cd vung db song cuu long9. thong tin ts dh, cd vung db song cuu long
9. thong tin ts dh, cd vung db song cuu long
Linh Nguyễn
 
9th grade field trip 2
9th grade field trip 29th grade field trip 2
9th grade field trip 2
Media Center
 
9 reasons why she should be craved for...
9 reasons why she should be craved for...9 reasons why she should be craved for...
9 reasons why she should be craved for...
Preeti Khattri
 
9 produtos que você deve ter em sua casa e que pode servir como remédio
9 produtos que você deve ter em sua casa e que pode servir como remédio9 produtos que você deve ter em sua casa e que pode servir como remédio
9 produtos que você deve ter em sua casa e que pode servir como remédio
Juli Ferreira
 
9 tanaman termahal
9 tanaman termahal9 tanaman termahal
9 tanaman termahal
Ajang Wahyu
 

Andere mochten auch (17)

PROVIA-led research prioritization for vulnerability, impacts and adaptation
PROVIA-led research prioritization for vulnerability, impacts and adaptationPROVIA-led research prioritization for vulnerability, impacts and adaptation
PROVIA-led research prioritization for vulnerability, impacts and adaptation
 
9° tarea bullying. Cllaret Tovar
9° tarea bullying. Cllaret Tovar9° tarea bullying. Cllaret Tovar
9° tarea bullying. Cllaret Tovar
 
9. thong tin ts dh, cd vung db song cuu long
9. thong tin ts dh, cd vung db song cuu long9. thong tin ts dh, cd vung db song cuu long
9. thong tin ts dh, cd vung db song cuu long
 
Regione Umbria tavola tutela delle acque
Regione Umbria tavola tutela delle acqueRegione Umbria tavola tutela delle acque
Regione Umbria tavola tutela delle acque
 
9th grade field trip 2
9th grade field trip 29th grade field trip 2
9th grade field trip 2
 
9 zapreshchaetsya
9 zapreshchaetsya9 zapreshchaetsya
9 zapreshchaetsya
 
9 reasons why she should be craved for...
9 reasons why she should be craved for...9 reasons why she should be craved for...
9 reasons why she should be craved for...
 
9. some famous artists
9. some famous artists9. some famous artists
9. some famous artists
 
9. Portafolio Richar Romero
9. Portafolio Richar Romero9. Portafolio Richar Romero
9. Portafolio Richar Romero
 
9.tammy attitude of 71 77
9.tammy attitude of 71 779.tammy attitude of 71 77
9.tammy attitude of 71 77
 
9 produtos que você deve ter em sua casa e que pode servir como remédio
9 produtos que você deve ter em sua casa e que pode servir como remédio9 produtos que você deve ter em sua casa e que pode servir como remédio
9 produtos que você deve ter em sua casa e que pode servir como remédio
 
9th Alan Webb memorial lecture: International Working - A few pictures, 210715
9th Alan Webb memorial lecture: International Working - A few pictures, 2107159th Alan Webb memorial lecture: International Working - A few pictures, 210715
9th Alan Webb memorial lecture: International Working - A few pictures, 210715
 
9 tanaman termahal
9 tanaman termahal9 tanaman termahal
9 tanaman termahal
 
9.yersinia elika...
9.yersinia elika...9.yersinia elika...
9.yersinia elika...
 
9roy 120119192039-phpapp02
9roy 120119192039-phpapp029roy 120119192039-phpapp02
9roy 120119192039-phpapp02
 
Dan Paget, RCS presentation - 9th Multi-stakeholder Forum for Responsible Min...
Dan Paget, RCS presentation - 9th Multi-stakeholder Forum for Responsible Min...Dan Paget, RCS presentation - 9th Multi-stakeholder Forum for Responsible Min...
Dan Paget, RCS presentation - 9th Multi-stakeholder Forum for Responsible Min...
 
9 What is Your Greatest Boast? Galatians 6:11-18
9 What is Your Greatest Boast? Galatians 6:11-189 What is Your Greatest Boast? Galatians 6:11-18
9 What is Your Greatest Boast? Galatians 6:11-18
 

Ähnlich wie 9.venkata naga vamsi. a

Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijripublishers Ijri
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijripublishers Ijri
 
Paper id 21201483
Paper id 21201483Paper id 21201483
Paper id 21201483
IJRAT
 
"An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ..."An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ...
butest
 

Ähnlich wie 9.venkata naga vamsi. a (20)

literature.pptx
literature.pptxliterature.pptx
literature.pptx
 
06075626 (1)
06075626 (1)06075626 (1)
06075626 (1)
 
06075626
0607562606075626
06075626
 
New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral Recognition
 
Particle Swarm Optimization Algorithm Based Window Function Design
Particle Swarm Optimization Algorithm Based Window Function DesignParticle Swarm Optimization Algorithm Based Window Function Design
Particle Swarm Optimization Algorithm Based Window Function Design
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
 
Paper id 26201482
Paper id 26201482Paper id 26201482
Paper id 26201482
 
Clock mesh sizing slides
Clock mesh sizing slidesClock mesh sizing slides
Clock mesh sizing slides
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
 
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
 
Project 2: Baseband Data Communication
Project 2: Baseband Data CommunicationProject 2: Baseband Data Communication
Project 2: Baseband Data Communication
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
 
Paper id 21201483
Paper id 21201483Paper id 21201483
Paper id 21201483
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
"An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ..."An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ...
 
On the realization of non linear pseudo-noise generator for various signal pr...
On the realization of non linear pseudo-noise generator for various signal pr...On the realization of non linear pseudo-noise generator for various signal pr...
On the realization of non linear pseudo-noise generator for various signal pr...
 
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...
 
Pg3426762678
Pg3426762678Pg3426762678
Pg3426762678
 
R044120124
R044120124R044120124
R044120124
 

Mehr von Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Alexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
Alexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
Alexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
Alexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
Alexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
Alexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
Alexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
Alexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
Alexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
Alexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
Alexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
Alexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
Alexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
Alexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
Alexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
Alexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
Alexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
Alexander Decker
 

Mehr von Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

9.venkata naga vamsi. a

  • 1. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 7, 2011 The Tent Chaotic Mapping: Analysis for Generation of Binary Codes for Better Performance by Using MATLAB Annepu .Venkata NagaVamsi Dept of E.I.E, AITAM, Tekkali -532201, Andhra Pradesh, India. E-mail: vamsikrishna_avn@yahoo.co.in G.S.S.S.S.V.K.Mohan Dept of E.I.E, AITAM, Tekkali -532201, Andhra Pradesh, India. E-mail: g_k_mohan@yahoo.com M.S.Pradeep Kumar Patnaik Dept of E.I.E, AITAM, Tekkali -532201, Andhra Pradesh, India. E-mail: patnaik_mspk@yahoo.com Received: October 29, 2011 Accepted: October 30, 2011 Published: November 4, 2011 Abstract: In this paper, the Tent map is analyzed as a source of pseudorandom bits. To evaluate the performance of the proposed pseudorandom bit generator, different issues were considered, such as the period length, the discriminator value and the merit factor. The Tent mapping is a suitable alternative to other tradinational low-complexity pseudorandom bit generators. Keywords: Tent map, discrimination value, merit factor, chaotic signal. 1. Introduction The generation of random numbers is required in several applications, including measurement and testing of digital circuits and telecommunication systems (eg, to perform their functional verification and evaluate their immunity to noise), the aim is to achieve a satisfactory tradeoff among the best merit factor. In radar or sonar applications, linear chirps are the most typically used signals to achieve pulse compression. The pulse being of finite length, the amplitude is a rectangle function. If the transmitted signal has a duration T, begins at t = 0 and linearly sweeps the frequency band Δf centered on carrier f0, it can be written ( ) = {A if 0 t<T 0 otherwise ...........1.1 for best performance, the autocorrelation pattern of the optimum coded waveform must have a large peak value for zero shift and zero value for non-zero shifts. In this paper, good binary codes are generated using Tent –map equation to achieve a low PSL. It is possible to generate infinite number of codes at larger lengths easily, by changing the initial conditions by very small increment, threshold level and bifurcation factor. 2. How can chaotic waveform help? They are deterministic (defined by an iterative map or differential equations), and can therefore be practically implemented. 78 | P a g e www.iiste.org
  • 2. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 7, 2011 They are non – periodic, which suggests there are potential advantages in security and can be used as (infinitely) long spreading sequences. They are sensitive to initial conditions so that the behaviour of two systems with small difference in the initial system state (or) a parameter diverges exponentially in time while both systems remain bounded by the operation of the non-linearity a property useful in efficient high power transmission. Chaotic systems have a very sensitive dependence on their initial conditions. This sensitive dependence can be demonstrated by giving two very close initial points to the iterative map. After a few iterations, the two resulting sequences will look completely uncorrelated. Hence; an abundant source of almost uncorrelated signals has been discovered: a slight change in the initial condition will produce a completely different signal. 3. Tent mapping-Chaotic Equation Here in this paper we are dealing with the Tent mapping. A deal of chaotic behaviour can be described by one simple, fairly innocuous looking equation, the Tent map as shown in the Figure1.,and the bifurcation for the tent map in Figure 2. The chaotic mapping is as follows Xn+1 = f (xn) .........1.1 Tent mapping: Xn+1 = A - (B (xn)) A>1 .....1.2 The chaotic regime: Xn belongs to [A (1-B), A] 0<B<2 ……1.3 4. Proposed technique for code generation As the Tent chaotic mapping, we can generate different sequences and by selecting the best sequence among the sequences, the best sequence is taken and is been coded in binary for the best results. The threshold for the binary codes is done as below X (n) >0 xx (n) = 1 ..........1.4 X (n) <0 xx (n) = -1 ..........1.5 The applied function is auto –correlation pattern X (n) is an N length sequence the auto correlation function is defined as R (k) = ∑ x (n) x (n+k) limits from n= 0 to N-1-k ......1.6 From the autocorrelation pattern, the discriminator factor (D) can be formed as, R (0) D= ……. Where k≠0 ………..1.7 Max(R (k) 5. Side lobe Reduction Using Window function The main disadvantage of pulse compression is the appearance of side lobes in the autocorrelation function which will mask the weak reflections from other targets, this can be overcome by reducing the side lobes, there are various techniques for this purpose, and one such is the windowing techniques. The following window functions have been applied. 79 | P a g e www.iiste.org
  • 3. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 7, 2011 1. Hamming window- W (n) =0.54+0.46cos (2pi*n/N+1) , 0 ≤ n ≤ N 2. Hanning window- w (n)= 0.5+0.5*cos (pi*n/N+1), 0 ≤ n ≤ N 3. Triangular Window- W (n) = 1-n/2(N+1) 0 ≤ N ≤ N+1 5.1 Results for binary codes and its response to a matched filter is show in the Table 1. 6. Results and Conclusion Good binary codes were generated using Tent map. At different lengths, good sequences were obtained and it was found that the discrimination factor increases with the length of the sequence. At lower lengths the performance with the hanning and hamming windows function were found to be superior compared to triangular window. The best sequences were found from the triangular window function at higher lengths. Further improvement in the result can be obtained by reducing the incremental value in the algorithm and search for new good codes. 7. Graphical Results The graphical result shows the exactly the differences in the rectangular window, hanning window, hamming window and triangular window as in the Figure 3,Figure 4,Figure 5,Figure 6 and the tent map out put in the Figure 7 References “Ling cong, Sun Songgeng. A chaotic spreading sequence generator,” Chinese journal ACTA ELECTRNICASINICA.vol.20, no.2, pp. 235-239, 1998 Ghobad, H.B. Chaotic signals for digital communication.Ph.D Thesis for Purdue University, 1992 ”Radar signal processing” LEWIS, B.L, BAUEL, INC, 1996, PP325-329. ”Base band model for distance and bearing estimation”, A.bauel, proc.IEEE, ISCAS-3, MONTERY, California, pp. 275-278, 1998. Chaotic Phase Code for radar pulse compression Xinwu, Weixian Liu, Lei Zhao and Jeffrey S.Fu, IEEE Radar Conf.2001, pp 279-283. AJ Fenwick C Williams S A Harman “Chaotic signals in radar and sonar” Proc. Of the international conferences on Waveform Diversity and Design 2006 January 2006 Kuhai USA. Base band model for distance and bearing estimation”, A.bauel, proc.IEEE, ISCAS-3, MONTERY, California, pp. 275-278, 1998. Ternary Pulse Compression Sequence”, INST, MOHORIR, P.S.RAJA RAJESWARI and VENKATA RAO.K, PP.146-149, 1998. A Chaotic Sequence Spread-Spectrum” IEEE Transactions on Communications. vol. 25(2/3/9), pp. 1126- 1129, 1996.MAKOTO ITOH, Ternary Pulse Compression Sequence by logistic map” ”, IEEE, MOHORIR, PP.2512-2515, 1998 Direct Sequence –Radar Communication System” vol.19, pp 529- 531, 2008 International Journal on Chaotic Signals “, vol.12, no.23, pp.236-239, 1999 D. Middleton, An Introduction to Statistical Communication Theory. New York: McGraw-Hill, 1988. 80 | P a g e www.iiste.org
  • 4. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 7, 2011 ”Chaotic pulse code for radar pulse compression “IEEE Radar Conference, 2001, LEIZHAO and JEFFREY, PP 279-283. G. Heidari-Bateni and C. D. McGillem, “A chaotic direct-sequence spread-spectrum Communication system,” IEEE Trans Commun., vol.42, pp. 1524– 1527,Feb./Mar./Apr. 1994 Figure 1. Graph of Tent map function Figure 2. Bifurcation diagram for the tent map Figure 3. Discrimination curve for the hamming window 81 | P a g e www.iiste.org
  • 5. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 7, 2011 Figure 4. Discrimination curve for the Triangular window Figure 5. Discrimination curve for the rectangular window Figure 6. Discrimination curve for the hanning window 82 | P a g e www.iiste.org
  • 6. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 7, 2011 Figure 6. Output for Tent mapping Table 1 DISCRIMINATION FACTOR Length Drec Dhan Dham Dtri value value value value 20 7.665 9.761 10.822 8.309 50 8.142 9.034 12.385 8.996 100 12.353 13.236 15.221 9.473 500 15.822 15.145 16.375 13.694 1000 16.381 16.679 18.765 16.726 1500 17.643 18.667 19.504 18.848 2000 19.414 19.237 20.305 20.476 2500 21.321 22.560 21.824 21.960 3000 22.496 23.359 22.272 23.702 3500 22.602 23.691 23.383 24.432 83 | P a g e www.iiste.org