Design of BPSK Modulator Using VHDL
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 12
Abstract
Binary Phase Shift Keying represents the simulation results of binary digital modulation schemes. Here for BASK and BPSK modulation techniques use FPGA algorithm. If multiplier block is used for multiplication bit stream with carrier signal, used time will rises. In addition using multiplier block obtained simulation results were analyzed and compared to other simulation results. Source consumptions of FPGA-based BASK modulation technique and BPSK modulation technique were compared. Also, for different modulation algorithm, source consumptions of BASK and BPSK modulation technique were analyzed using VHDL. Designed modulators using VHSIC (Very High Speed Integrated Circuit) Hardware Description Language (VHDL) was realized on high speed FPGA (Field Program Programmable Gate Array). Because for used modulation technique data rate transfer is fairly important in wireless communication systems. The highest speed data rate transfer can be realized using fiber optic cables. In addition, BER (Bit Error Rate) of BASK and BPSK modulator was compared using MATLAB simulation program. Binary data rate is same for BPSK and BASK. BPSK and BASK modulations were designed on FPGA using VHDL hardware description language.
Authors and Affiliations
Mamtha Shetty
Enhancing the Security of the GPT Cryptosystem Against Attacks
The concept of Public key cryptosystems based on error correcting codes was invented by McEliece in 1978. In 1991 Gabidulin, Paramonov and Tretjakov proposed a new mversion of the McEliece cryptosystem (GPT) based on max...
EFFECT OF CHEMICAL REACTION ON MHD FLOW OF A VISCO-ELASTIC (WALTER'S LIQUID MODEL-B) FLUID THROUGH POROUS MEDIUM WITH HEAT SOURCE
In this paper we have studied and discussed the problem of unsteady flow of a visco-elastic (walter’s liquid model B) fluid through porous medium in presence of a heat source and a uniform magnetic field with effect of...
ANALYSIS OF HUMAN FACE RECOGNITION ALGORITHM USING PCA+FDIT IN IMAGE DATABASE FOR CRIME INVESTIGATION
In general, the field of face recognition has lots of research that have put interest in order to detect the face and to identify it and also to track it. Many researchers have concentrated on the face identification and...
A Mobile Technology for Hazard Management System
The Japan is one of the countries in the world vulnerable to natural hazards because of its geographic location. Due to the advances of Internet and mobile technologies, mobile phones with Internet connection and computa...
DMS Implications for Universities
Organizations have long been struggling with the large amount of paper documents to be effectively administered, stored and organized so as to allow their easy and fast retrieval. Furthermore, energy and paper costs, sec...