Identifier

etd-04192010-000122

Degree

Master of Science in Electrical Engineering (MSEE)

Department

Electrical and Computer Engineering

Document Type

Thesis

Abstract

The transmitter identification of the DTV systems becomes crucial nowadays. Transmitter identification (TxID, or transmitter fingerprinting) technique is used to detect, diagnose and classify the operating status of any radio transmitter of interest. A pseudo random sequence was proposed to be embedded into the DTV signal before transmission. Thus, the transmitter identification can be realized by invoking the cross-correlation functions between the received signal and the possible candidates of the pseudo random sequences. Gold sequences and Kasami sequences are two excellent candidates for the transmitter ID sequences as they provide a large family of nearly-orthogonal codes. In order to investigate the sensitivity of the transmitter identification in different topologies and Kasami sequences with different length, we present the analysis here for four different geometric layouts, namely circular distribution, doubly concentric and circular distribution, square array and hexagonal tessellation. The covered area and the lowest received signal-to-interference ratio are considered as two essential parameters for the multiple-transmitter identification. It turns out to be that the larger the Kasami sequence length, the larger the received signal-to-interference ratio. Our new analysis can be used to determine the required Kasami sequence length for a specific broadcasting coverage.

Date

2009

Document Availability at the Time of Submission

Secure the entire work for patent and/or proprietary purposes for a period of one year. Student has submitted appropriate documentation which states: During this period the copyright owner also agrees not to exercise her/his ownership rights, including public use in works, without prior authorization from LSU. At the end of the one year period, either we or LSU may request an automatic extension for one additional year. At the end of the one year secure period (or its extension, if such is requested), the work will be released for access worldwide.

Committee Chair

Wu, Hsiao-Chun

Share

COinS