An Efficient Burst Errors Combating for Image Transmission over Mobile WPANs
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
An Efficient Burst Errors Combating for Image Transmission over Mobile WPANs

Authors: Mohsen A. M. El-Bendary, Mostafa A. R. El-Tokhy

Abstract:

This paper presents an efficient burst error spreading tool. Also, it studies a vital issue in wireless communications, which is the transmission of images over wireless networks. IEEE ZigBee 802.15.4 is a short-range communication standard that could be used for small distance multimedia transmissions. In fact, the ZigBee network is a Wireless Personal Area Network (WPAN), which needs a strong interleaving mechanism for protection against error bursts. Also, it is low power technology and utilized in the Wireless Sensor Networks (WSN) implementation. This paper presents the chaotic interleaving scheme as a data randomization tool for this purpose. This scheme depends on the chaotic Baker map. The mobility effects on the image transmission are studied with different velocity through utilizing the Jakes’ model. A comparison study between the proposed chaotic interleaving scheme and the traditional block and convolutional interleaving schemes for image transmission over a correlated fading channel is presented. The simulation results show the superiority of the proposed chaotic interleaving scheme over the traditional schemes.

Keywords: WPANs, Burst Errors, Mobility, Interleaving Techniques, Fading channels.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1088770

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1989

References:


[1] ZigBee Alliance, available at http://www.zigbee.org/,2009.
[2] The Wi-Fi Alliance, available at http://www.wi-fi.org/,2009.
[3] B. Kai, and P. Yong, “Performance Study on ZigBee-Based Wireless Personal Area Networks for Real-Time Health monitoring”, ETRI Journal, Volume 28, No. 4, Aug. 2006.
[4] Jin-Shyan Lee, Yu-Wei Su, and Chung-Chou Shen,“ A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi”, The 33rd Annual Conference of the IEEE Industrial Electronics Society (IECON), Nov. 5-8, 2007, Taipei, Taiwan.
[5] W. Guo and M. Zhou,“An emerging technology for improved building automation control”, IEEE International Conference on Systems, man and Cybernetics, 2009. SMC 2009., pp.337-342, Oct. 2009.
[6] B. Sidhu, H. Singh, and A. Chhabra,“Emerging Wireless Standards - WiFi, ZigBeeand WiMAX s”, World Academy of Science, Engineering and Technology 25 2007.
[7] S. Vafi, and T. Wysocki,“Performance of convolutional interleavers with different spacing parameters in turbo codes,” Proc. 6th Australian Workshop on Communications Theory, 2005, pp. 8-12.
[8] G. Pekhteryev, Z. Sahinoglu, P. Orlik, and G. Bhatti, “Image Transmission over IEEE 802.15.4 and ZigBee Networks,” IEEE ISCAS May 2005, Kobe Japan.
[9] L. Ozarow, S. Shamai, and A.D. Wyner,“Information theoretic considerations for cellar mobile radio,” IEEE Trans. Veh. Tech., vol. 43, pp, 359-378, 1994.
[10] Emad N. Farag, Mohamed I Elmasry, Mixed Signal VLSI Wireless Design Circuits and System, 1st Edition, Kluwer Academic Publishers, 1999.
[11] H. S. Kim and H. K. Lee, “Modified Beacon-Enabled IEEE-802.15.4 MAC for lower latency”, Mitsubishi Electric Research laboratories, 2009, 201 Broadway, Cmbridge, Massachusetts 02139.
[12] T. S. Rappaport, “Wireless Communications”, Prentice Hall 1996.
[13] S. H. Lee and E. K. Joo, , “The Effect of Block Interleaving in an LDPC-Turbo Concatenated Code”, ETRI Journal, Volume 28, Number 5, October 2006
[14] S. Vafi, T. A. Wysocki, “Application of convolutional interleavers in turbo codes with unequal error protection”, JTIT, Journal of Telecommunication and Information technology, Jan. 2006.
[15] G. Pekhteryev, Z. Sahinoglu, P. Orlik, and G. Bhatti, “Error Protection for Progressive Image Transmission Over Memoryless and Fading Channels”, IEEE Transactions on Communications, Vol. 46, No. 12, Dec. 1998.
[16] A. N. Lemma, J. Aprea, W. Oomen, and L. V. de Kerkhof, “A Temporal Domain Audio Watermarking Technique”, IEEE Transactions on Signal Processing, Vol. 51, No. 4, pp. 1088-1097, 2003.
[17] W. Li, X. Xue, and P. Lu, “Localized Audio Watermarking Technique Robust Against Time-Scale Modification”, IEEE Transactions on Multimedia, Vol. 8, No. 1, pp. 60-69, 2006.
[18] G. Voyatzis and I. Pitas,“Chaotic Watermarks for Embedding in the Spatial Digital Image Domain,” Proc. IEEE Int. Conference Image Processing, Vol. 2, pp. 432-436, Oct. 1998.
[19] R. Liu and T. Tan, “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership”, IEEE Transactions On Multimedia, Vol. 4, No. 1, pp. 121-128, MARCH 2002.
[20] Z. Liu and A. Inoue, “Audio Watermarking Techniques Using Sinusoidal Patterns Based on Pseudorandom Sequences”, IEEE Transactions On Circuits And Systems For Video Technology, Vol. 13, No. 8, pp. 801-812, 2003.
[21] M. A. M. Mohamed, A. Abou El-Azm, N. El-Fishwy, M. A. R. El-Tokhy, F. E. Abd El-Samie,“Optimization of Bluetooth Packet Format for Efficient Performance,” Progress in Electromagnetic Research M, Vol. 1, 101-110, 2008.
[22] W. C. Jakes,“ Microwave Mobile Communications,” New York, John Wiley & SonsInc. ISBN 0-471-43720-4, 1-Feb. 1975.
[23] Aldrich,“Correlations Genuine and Spurious in Pearson and Yule,” Statistical Science 10: 364-376. hppt://www.jstor.org/stable/2246135