Saturday, December 28, 2019

Spectrum sensing in cognitive radios using energy detection technique - Free Essay Example

Sample details Pages: 29 Words: 8570 Downloads: 7 Date added: 2017/06/26 Category Statistics Essay Did you like this example? Chapter 1.Introduction In recent years there has been an enormous growth in wireless communication devices and wireless users. The ever increasing demand for higher speed and reliability made researchers think about intelligent radios like Cognitive Radios (CR). But major amount of spectrum is available for licensed users. There are various communication bodies like the International Telecommunication Union (ITU), European Conference of Postal and Telecommunications Administrations (CEPT) also European Telecommunications Standards Institute (ETSI) who works on standards of communication that defines the use of spectrum for licensed and unlicensed users. 1.1 Background Spectrum is a valuable resource in communication. Over the past few years as the use of various wireless technology is increasing rapidly so we either need more spectrum or make efficient use of current spectrum to satisfy their needs. One way of making efficient use of spectrum is employing spectrum sharing technique. There are many spectrum sharing techniques available like energy detection, cyclostationary feature detector, and matched filter. Of the above technique matched filter and cyclostationary gives more accurate result but they are bit complex and computationally harder as compared to energy detection technique. Energy detection is the simplest of above three and computationally less complex. Don’t waste time! Our writers will create an original "Spectrum sensing in cognitive radios using energy detection technique" essay for you Create order 1.2 Motivation Survey has shown that at any given time only portion of spectrum is utilized. According to a report published by FCC (Federal Communications Commission America) in 2003 has set a set of rule for efficient use of spectrum for licensed and unlicensed users. Also OFCOM (Office of Communications United Kingdom) has noticed the underutilization of spectrum. At any given time only portion of spectrum is utilized. Even if the system says there are no frequencies available, there is still some frequency available. These available frequencies are known as spectrum holes or white spaces. Some of the bands are completely occupied by users while some bands go unutilized. And that is inefficient use of spectrum. We must have noticed that in cases of emergencies like the train bomb blast in July 2006 in Mumbai, India cellular network actually failed to support huge amount of customer at the same time, this was also the case during 9/11 in USA. If we were having cognitive radios at that time peop les would have been able to talk to their families and inform about their safety. As we are moving from 3G (Third generation) to 4G (Fourth Generation) we need to make certain changes in our wireless technologies. Below shown is the measurement of 0 GHz to 6 GHz at Berkley Wireless Research Center (BWRC). Figure 1 Measurement of 0-6 GHz Spectrum Utilization at BWRC [20] 1.3 Aim and Objective This thesis emphasises on understanding Cognitive radios, the importance of spectrum sensing for todays world, the issues regarding the same. A simplified Matlab code is used to support our thesis. As the thesis follows you will find more about cognitive radios and spectrum sensing with a technique to generate white space at a specific frequency. The main objective of the thesis is to do survey on spectrum sensing and spectrum sensing techniques. Then do plan a model for the same. A model can be supported by a Matlab code. And after all this we need to analyse the model we suggested and further improvements that can be done in that. 1.4 Thesis Organisation Our thesis is organised as follows: Chapter.2 Literature Review This chapter begins with a brief history about cognitive radios .Which is followed by a detail explanation of Cognitive radios and spectrum sensing and some of the spectrum sensing techniques used. At the end of this chapter a business model for spectrum sensing and multi resolution of CR is given. Chapter.3 System Description This chapter basically deals with sampling and its importance to us. Also you will find technique to get your spectrum at specific center frequency under generation of White Spaces. Chapter.4 Simulation/Design Analysis As the name suggests, this chapter deals with simulation model and detail explanation of the code used for spectrum sensing using energy detection. In this chapter we have shown the output of the simulation used. Chapter.6 Future Work This chapter suggests some of the future work to be done with this thesis which could be useful for further research in this field. Chapter.7 Conclusion This gives the concluding part of the thesis. Chapter 2 Literature Review In this chapter we are going to discuss about the cognitive radios, like what are they and why are they so important to us. The chapter begins with a short history of cognitive radios, which is followed by a general discussion on OFDM, some of the challenges faced by cognitive radios in real environment, and also some of the applications of cognitive radios. We have tried to explain spectrum sensing in brief and the techniques used for spectrum sensing in todays world. Finally a business model for spectrum sensing is showed which is preceded by multi-resolution of Cognitive radios. 2.1 History of cognitive radios Dr. Joseph Mitola III was the first to introduce or propose the theory of Cognitive radios in 1999. According to Dr. Joseph Mitola Cognitive radios will be the radios that are smart and intelligent enough to find the available bandwidth in a spectrum. It will also have knowledge of right information that has to be passed to the user. And user does not have to take some extra effort for that. It is supposed to do this automatically. He has also mentioned in his PhD dissertation that CR is natural extensions of software defined radios. In 2002 the FCC published a report prepared by Spectrum Policy Task Force [SPTF] which says that majority of spectrum is underutilized. And there is actually is not shortage of spectrum but rather we need to make efficient use of the current spectrum. Also in same year 2002 Professor Cave from UK presented a report which speaks of the possibility of selling bandwidth to the user depending on their requirement. But it would not be fair to give unlicensed user allow to use licensed spectrum. So in December 2002 FCC issued a Notice of Enquiry (NOI) to see TV channel bands can be made available to unlicensed users. Then in 2003 FCC forms a set of rules and proposed interference temperature model for keep track of interference. Later in the same year Notice of Proposed Rulemaking (NPRM) tried to see into issues related to cognitive radio technology where it also pointed out Cognitive radios is a advanced technology which could help efficient use of spectrum by licensed users in own network and by sharing spectrum and with unlicensed users by negotiating when required. This encouraged many researchers in the field of cognitive radios. Major progress in cognitive radios took place in the year 2004, where FCC published NRPM which showed possibility of allowing secondary users to use licensed spectrum. FCC opened three bands for unlicensed users which are 6525 to 6700 MHz, 12.75 to 13.15 GHz and 13.2125-13.25 GHz. This allowed cognitive dev ices to transmit six times more. Also IEEE standards are working parallel to the FCCs. Spectrum pooling system by Professor Timo A Weiss from Karlsruhe University Germany), OFDM based Cognitive radios by professor Ian F Akyildiz et al from GIT (USA) are some of the promising works in Cognitive radios. there are many researches are done, many still going on in Europe, Asia, and America, exploring various aspects of cognitive radios. In Jan 2010 first call over a CR network was made in university of Oulu using CRAMNET (Cognitive Radio Assisted Mobile Ad Hoc Network). 2.2 Cognitive radio With the development of wireless communication devices and technologies in WLAN and WAN spectrum is becoming scarcer. Low frequency bands which are near few GHz are very scarce and highly congested. In current wireless system we are using fixed spectrum allocation scheme. In fixed spectrum allocation scheme a part of spectrum is owned by an operator. Unlicensed users are not allowed to use that spectrum. This leads to the problem of spectrum scarcity. Survey has shown that more than 50% of the spectrum is underutilized. This is where Cognitive Radio (CR) is comes into picture. CR is introduced to solve the problem of spectrum sharing. Cognitive Radios actually scans the spectrum and during scanning it looks for spectrum holes. The main objective of the cognitive radios is to look for opportunities or white spaces in spectrum band as quickly and as much as possible. And when we say opportunity, opportunity could be in time or frequency domain. Also when we locate this spectrum holes opportunistically we also need to vacant the occupied spectrum as soon as primary user comes back. Here primary user means the users whose spectrum we are using (licensed user) and secondary means the unlicensed users. Cognitive radio is a pattern for wireless communication technology in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. These altered parameters are associated with the active monitoring of several factors in the external and internal radio environment e.g. radio frequency spectrum, user behaviour. Cognitive radio can be said as next generation of software defined radio (SDR). They are flexible in terms of their transmission characteristics in terms of frequency, bandwidth, ISP which makes smart decisions to configure the SDR at any point in time to achieve a particular goal. By combining these two technologies makes a radio intelligent and flexible and which helps to adapt it to the variations in the environment, user requirements as per the other radio users. Adaptation to changes and requirements should lead to highly reliable communication whenever and wherever required, while making efficient use of spectrum. Good cognitive radio uses analysis done for long period to know about the environment and also his own behaviour. There are various parameters taken into account to decide transmission and reception changes, we can distinguish certain types of cognitive radio. The main two are as follow: Full Cognitive Radio : It is also known as Mitola radio in which every possible parameter which can be observed by a wireless node is taken into consideration to take decision Spectrum Sensing Cognitive Radio: It is the type in which only the radio frequency spectrum is considered. And Depending on the parts of the spectrum available for cognitive radio, we can distinguish as: Licensed Band Cognitive Radio: It is the type in which cognitive radio is capable of using bands assigned to licensed users, apart from unlicensed bands, such as U-NII band or ISM band. Unlicensed Band Cognitive Radio: This can only utilize unlicensed parts of radio frequency spectrum only or the bands which are free to use. 2.3 About OFDM OFDM stands for Orthogonal Frequency Division Multiplexing. It is generally a type of Frequency Division Multiplexing (FDM) rather a special case in FDM. What makes it special is its orthogonal behaviour. Now the word orthogonal basically means mutually independence. When we say A is orthogonal to B, we mean that A has no vector in direction of B and vice versa or in other words A and B is mutually independent. Or the integral of two signals over one period is 0. In OFDM a single signal is first multiplexed and modulated independently to create orthogonal signals. This means the signal is first divided into number of smaller streams and then modulated further before transmission. For example imagine a slicing of cheese and grilling or cheese. Slicing is like FDM where whole data is sent in a bunch and grilling is like OFDM where the data to be sent is first divided into smaller data and then processed to transmit further like OFDM. Figure shown below is one more way to understand the concept of OFDM. On the left hand side is a big container which carry whole bunch of data at one time and take it to the destination. And on right hand side is four smaller containers where each carry smaller portion of data and take it to the destination. These smaller containers can be assumed as sub-carriers. And in case of OFDM they are orthogonal sub-carriers. The main advantage over here is that even if some of the cheese is lost during grilling, still we have not lost all the cheese. In OFDM input data with high data rate is first passed thorough serial to parallel converter. This parallel divided data is then modulated on individually. And parallel to serial conversion is done before transmission. This parallel divided data is our sub-carriers. These sub-carriers must be orthogonal. 2.4 Cognition cycle Above figure shows the rough model of Cognition Cycle. It reads the surrounding environment and makes decision accordingly. When we say decision we mean cognitive radio sense the requirement or urgency that may be in terms of changing a channel or churning from one technology to another depending upon the scenario. There are different stages where it observes the environment, learns it and then plans its action make required decision and then execute its plans. It is much like a radio with a power of thinking which was not been able before. The figure below shows the cognitive radio architecture suggested by Dr. Mitola. 2.4.1 Some important terms 2.4.1.1Wireless Environment/Outside world- It refers to a communication environment that includes any communication devices and the frequency bands they are working in. 2.4.1.2 Spectrum sensing- It is the technique used by cognitive radios to sense the spectrum. This action involves finding availability of white spaces or spectrum holes in the spectrum. 2.4.1.3 Spectrum Management- It involves catching the best spectrum available so as to satisfy user communication requirements. Cognitive radios should decide on the best spectrum band so that it can meet the Quality of service required for all available frequency bands, therefore these functions are necessary for Cognitive radios. These management functions can be classified as: Spectrum analysis Spectrum decision Spectrum Mobility: It is defined as the process when a cognitive radio device exchanges its frequency of operation. Cognitive radio networks target to use the spectrum in a dynamic manner by allowing the radio terminals to operate in the best available frequency band, maintaining seamless communication requirements during the transition to better spectrum. Spectrum Sharing: providing the fair spectrum scheduling method. One of the major challenges in open spectrum usage is the spectrum sharing. It can be regarded to be similar to generic media access control MAC problems in existing systems 2.5Cognitive Radio Challenges Three main problems experienced by CR are as follows: Interference (Mainly because of Hidden Nodes). Security. Control. They are described as follows: 2.5.1 Interference and the Hidden Node Problem Ideally while designing a CR we should consider that it does not have any impact on existing radio users, but in practically some impact is expected. If a particular user have non-cognitive radios, it is essential to study and make a note that how they would be affected by the interference of CR, mainly with respect to sharing resources such as spectrum, time, space etc. CR adaptive nature could be difficult to predict and thus making it hard to control the behaviour of a CR which will concern for user who faces CR interference issue. In communication industry the main concern about CR is the hidden node problem. This scenario arises when a CR is not capable to detect an interference with any of non-cognitive radios within its range, not only because of CRs own spectrum sensing is ineffective but also due to some non-cognitive radios are hidden. For example, if a transmitting contemporary user is not in the range from the CR, its transmission power may not be strong enough at the CRs location, it may be reduce than the noise floor which makes it more difficult to get detected. As the CR might not be able to detect a transmission by a contemporary user and similarly unaware of availability of the receiving by a contemporary user. Consequently, if it is confirmed as safe to use the contemporary users frequency and CR starts transmitting, at the contemporary receiving end it will create interference. The CR may have a limited view of spectrum provided from wide spectrum measurements which may cause interference with the receiving user. The localised spectrum view denotes that a CR should be potential to find transmitting user those are communicating below the noise level, since the strength of the received signal is very weak at the CRs location. Similarly a situation can occur where the signal attenuate by distance, thus user transmission is blocked by obstacles such as buildings, towers, hills or mountains. For example consider a CR in a valley would have a limi ted picture of the surrounding radio environment, as compared to that if it were located on top of a hill. 2.5.2 Security Concerns CR may be vulnerable to malicious effect, resulting into unexpected or problematic behaviour of individual CRs or complete networks. This problem springs up from the potential to re-program CRs in an unauthorized way. Hacking or placing a vulnerable code, virus on a network might enable criminals to steal valuable information from a CR through electronically, fool a network operator into charging others for services or achieve potentially widespread denial-of-service. A considerable amount of regulatory work will require to be done to clarify who would be responsible for the various security areas of CR, software developers, manufacturers, network operators and CR users themselves may all have a role to play. The CR security issue is closely related to that of SDR, which already discussed and hence not repeated here. Instead, a brief summary of the issues is given. Downloading software updates over an air interface poses some specific problems for security. Several digital signatures will be required for each piece of downloaded software in order to meet likely regulatory requirements. Exactly who is necessary to authorize software downloads must be standardized before any large scale deployment of over-the-air updates can be realized. 2.5.3 Burden of Control and Regulatory challenges A CR in reality will have some effect on different spectrum users the compliance of these new radios is likely to focus on a Policy module defined within a CR, which will determine the boundaries of CR behaviour. It is important while studying CR; to consider how users would not be affected by interference from CR devices and the exact operation and nature of a proposed CR policy system must be understood carefully. It is likely to include a detail case study of the specifications and characteristics of all the contemporary users for a specific CR or complete network of CRs may share the resources. The effort in controlling CR devices, it is necessary to ensure their behaviour is properly or not, even in the case of faulty or tampered devices, that measures are quickly implemented to intense problems. This will involve policies and standards which are created in a universal digitally interpretable policy, so that all CRs can understand the same. Monitoring techniques and powerful alg orithms are required to enable detection and identification of bad CRs and in this way it provides traceability to find or determine who is responsible for the issue. In addition to these challenges, spectrum regulators and spectrum managers will require providing access to licensed spectrum in such a way that is traceable, transparent and highly dynamic. If CRs are allowed to cover international territory additional effort will be required, due to the necessity to provide and collaborate cooperation with other countries. Assuming that acceptable control of CR policy behaviour is technically possible and feasible, it may turn out to be such a great burden that it will be simply not economically viable and the benefits of CR are outweighed by this burden. 2.6 Important Applications for Cognitive Radio are Downloading of audio and video files on mobile handsets. This application requires moderate data rates and near-ubiquitous coverage. Emergency services communications: It requires interoperability and a moderate data rate with local coverage. Broadband wireless networking: Very high data rate required but CR users have option to accept limited coverage, e.g. hot spots. Multimedia wireless and sensor networking: Broad range of data rates may be required. 2.7 Spectrum Sensing Spectrum sensing is the process performing measurements on the part of spectrum and on the basis of measured data making a decision related spectrum usage. As the requirement and quantity of users is getting increased day by day, it is necessary for ISPs to have large amount of spectrum in order to achieve the QOS (Quality of Service). This leads the interest in unlicensed spectrum access and spectrum sensing is vital concept of this. In a situation where there are licensed user and any unlicensed exists, licensed user (primary user) is to be protected and no unlicensed user can interfere any licensed users operation and such cases Spectrum sensing is also useful to detect the existence or non existence of a primary user. Spectrum sensing is an important concept for exploring spectrum opportunities for the secondary spectrum usage in real-time. It detects the unused spectrum and shares it without any noticeable interference with other users. It is an important requirement of the Cogn itive Radio in order to sense spectrum holes. Detecting primary users is the most efficient way to detect spectrum holes. 2.8 Spectrum Sensing Techniques Available Spectrum sensing plays a vital role in cognitive radios. And the type of spectrum sensing techniques to choose more or less depends upon the spectrum sensing technique. A method such as energy detection proves to be one of the simplest of all, but it doesnt works well at low SNR, varying noise levels, fading. On the other hand technique such as Matched filters shows better performance, but they comes complex receiver design. We are going to discuss some of these techniques as we proceed further. 2.8.1 Matched Filter Technique This is the technique which takes minimum amount of sensing time. In this method of spectrum detection, receiver receives a pilot signal along with the data that is sent by the transmitter. A pilot signal is a single frequency that is used for synchronisation. All the secondarys those are struggling for spectrum should have knowledge of this pilot signal. There should` be tight timing synchronisation between primary and secondary. They are also required to know about the kind of modulation being used, pulse shaping. Also secondarys must have another receiver for every primary. This kind of techniques also fails when there is frequency offset. Examples of this technique are TV signals, CDMA with pilot, also used in OFDM. 2.8.2 Energy Detection technique This is the most simples of all techniques. In this the receiver has no knowledge of the transmitted signal. The receivers need not to have knowledge about the modulation type or any kind of pilot signal. Earlier energy detection was done with the help of a LPF (Low Pass Filter), Digital to Analog converter (D/A), and square law device that used to calculate the energy of the signal. Later it is done by making use of fast Fourier transform (FFT). This is known as periodogram method in energy detection. 2.8.2 Cyclostationary Feature Detection Signals are modulated with sine waves or cyclic prefix as in OFDM. And they are periodic. This periodic property of a signal helps it to be cyclostationary. This technique basically uses this principle of spectral correlation to detect the spectrum. Even if signals have similar PSD (Power Spectral Density) but they have do not have similar spectral correlation. 2.9 Multi-resolution for Cognitive Radio Sensing The concept of multi-resolution for Cognitive Radio can be applied with different methods but, the basic idea is the same. The whole spectrum is first sensed by using a coarse resolution. After this first step fine resolution sensing is done on a part of interested bands. In this way CR avoids itself from sensing the spectrum at one time and thus saving time and power. In this way, the sensing time is reduced and the power also been saved from unrequited computations. Also the multiple antenna architecture helps parallel processing and enables to reduce the sensing time. But, it increases the chip area and consumption of power which is not desirable. Also for coarse resolution sensing the mixer has to produce many frequencies and Also it should switch to one frequency for beginning the fine resolution sensing. If the signal is low pass signal then we can use fine resolution to scan the whole spectrum. Because low pass signal has low center frequencies and its sampling is doable. But for pass band signals it is not feasible to scan the whole spectrum. Because, for example say if we have some signal with center frequency of 850 MHz, it is not practically possible to do sample that signal. As according to Nyquist theorem sampling rate should be at least twice that of center frequency. Therefore it is practically not possible to sample a signal at 1600 Mega Hertz. 2.10 Business Model for Spectrum Sensing So far we have discussed about Cognitive radios and spectrum sensing in details. Since this is telecom, and telecom involves huge capital investment. One of the most costly things in telecom is getting the license itself and then comes the infrastructure and installations etc. Currently most of countries work on static spectrum allocation basis. For spectrum sensing to work we need some kind of regulation or set of rules that all will be ready to work with. A team from Brussels University has suggested a model for the same. The same model is discussed in brief below. This model is divided into four main categories. i. Ownership- Ownership simply means the ownership of license. One who has license is authorized to use particular band of spectrum. And if another licensee wants to share a spectrum then it will depends on parameters discussed below. If the operator is unlicensed then there is now issue of ownership. ii. Exclusivity- Exclusivity means whether or not a particular operator is exclusively assigned a band of spectrum. That will be issue of regulator to decide to exclusively assign a spectrum to a specific user. If it is assigned exclusively then nobody can access that band of frequency, and if not then those bands of frequencies will be available for sharing. iii. Tradability- Tradability means whether or not a terminal is allowed to switch between frequencies from different operators. If tradability is permitted frequency band or bands can be auctioned for sale or given on lease. iv. Neutrality- It is possible that some of frequency bands can be accessed by number of RATs (radio Access Technology) or may be limited to a particular RAT. If frequency bands are not available to number of RATs then that band need to address more issues, such as setting technical conditions to access the band and coordinating the cooperation between multiple technologies. Unlicensed: Unlicensed deals with the band of frequencies which are free to use, like ISM band. Common example for this is Wi-Fi which operates in 2.4GHz. This band of frequency is available to all and there is special condition to access this band. Single RAT Pool: This pool is related to a group of licensees which are not exclusively assigned any band of frequency and using same RAT. Multi RAT Pool: It is similar to Single RAT Pool except that it has multiple RATs. Single RAT Market: In this each operator is assigned with a separate frequency, but that can be accessed by the conditionally secondarys. Multi RAT Market: In this the operator is a licensee and is exclusively assigned with a band of frequency, and also with tradability. Flexible Operator and Static Spectrum: If a particular band of spectrum is exclusively assigned to an operator and without tradability. And if there is only one RAT, then it is known as Static Spectrum else Flexible Operator. 2.11 Survey outcome As per the literature review we concludes to use Energy detection technique for spectrum sensing as it is the fastest spectrum detection technique available and also it is simpler as compared to other techniques. There are many researches done in this field and many are still doing. Because of the survey we get knowledge about various techniques available in market. This led us to do a simulation model with one of the spectrum sensing technique. Now as far as selection of spectrum sensing technique is concerned, we selected Energy detection technique. The same could be seen in next part of the thesis which includes its design and implementation in simulation model. Chapter 3 Simulation Design 3.1 Sampling and Its Importance Sampling is a process of converting the continuous analog signal to a discreet analog signal and the samples signal is the discreet time representation of the original signal. If the message is coming from a digital source, then it is in the form to be processed by digital communication systems. But in real life not every signal is digital, message signal can be analog. In situation like these, we have to first convert the analog signal into discreet time signal, this is sampling. For this process to work well, sampling rate should be selected carefully or in other words it should satisfy Nyquist criterion. And Nyquist Criterion says that the sampling frequency should be at least twice the maximum frequency in signal. Fs 2fmax or T=1/ fmax Where Fs is sampling frequency, fmax is maximum frequency in the signal. T=Sampling period. Sampling is like reading a signal in analog form and taking its value at that instant of time. So more the samples we take better the resolution of the signal and, signal can be recovered more accurately. But if we take less number of samples, then resolution of the signal decreases. If we go on reducing the sampling rate, then times comes when it is difficult to recover the original signal from the sampled signal or in other words original information in the signal is lost. This is also known as aliasing. Aliasing is the effect which takes place if the signal is sampled less than twice the maximum frequency. 3.2 Types of Signal 3.2.1 Time limited signal- It is a signal which exists for only certain duration of time. Out of this duration, signal does not exist. A rectangular pulse of duration T seconds can be considered as time limited signal. x(t)=A for 0tT and x(t)=0 .otherwise 3.2.2 Band Limited signals- It is a signal which has a frequency spectrum which exists only over a certain range of frequency. The value of signal outside this range of frequency is zero. Mod(X(f))=A .-BfB and Mod(X(f)) =0 .otherwise. 3.3 Sampling Of Low pass and Band Pass signal Low pass sampling theorem states that- a) A band limited signal of finite energy, which has no frequency components higher than W Hertz, is completely described by the specifying the values of the signal at instants of time separated by 1/2W seconds and b) A band limited signal of finite energy, which has no frequency components higher than W Hertz, may be recovered from the knowledge of its samples taken at rate of 2W samples per seconds.[J.Chitodes] Band Pass sampling theorem states that- A Bandpass signal x(t) whose maximum bandwidth is 2W can be completely represented into and recovered from its samples if it is sampled at minimum rate of twice the bandwidth. Figure 3.4 shows us the spectrum of low pass signal and its spectrum after sampling. Low pass signal are the signal which works well under Nyquist criterion (Fs 2fmax) without any special alteration. There is another type of sampling known as Band-pass sampling. This is the type of sampling applied to a high frequency signals or the signals which cannot pass through low pass filters. These signals have high frequency, normally in 100s of mega hertz. Here we cannot use Nyquist theorem directly. As practically it is not possible to sample a signal at such a high frequency. So what we do is, we represent the signal in terms of inphase (I) and quadrature (Q) components of a signal before sampling. This I and Q component is made by multiplying I and Q with sin(2*fc*t) and cos(2*fc*t) respectively. We can also say that we are actually moving a window of size of the bandwidth over the center frequency of the signal. In our Matlab code we have used low pass sampling even though the frequencies are quite high, because it is not a practical model but a simulation model. In low pass sampling we sample the whole available while in band pass signal we sample a window of bandwidths. 3.4 Design Specifications Our design specification deals with requirement for measuring the center frequencies in the spectrum and calculating the spectrum hole or white space. Figure 3.6 shows a spectrum with two signals in it. Measurement of the center frequency is shown in Generation of White Space. Since we have used a low pass sampling our model will scan whole spectrum and try to locate spectrum holes within it. And these holes are located with energy detection on basis of a threshold. Our model to work well we need more than one signal in a spectrum. 3.5 Generation of White Spaces 3.5.1 What are they White spaces are basically the bands of frequencies that go unused. They are also known as spectrum hole. From the name spectrum hole, it suggests they are the holes in the spectrum, which could be filled if they are used properly. In todays communication world, most of countries works on static spectrum allocation basis. That means a particular operator will have a dedicated band of frequencies, no matter whether he uses it or not but it will be reserved for that operator as they have paid for getting the license for that from the government. In this case, if we think of bigger picture and scan the whole spectrum for a particular duration of time say one day. We will find that there are lot of frequency bands which are not fully utilized. These some of unused bands are known as White Spaces or Spectrum Holes. 3.5.2 Factors responsible for creation of white spaces White spaces get created because all the bands in the frequency bands in the spectrum are not used efficiently. Because we have different technologies working in various bands of spectrum but we do not have any practical implementation on large scale of any radio to work on whole spectrum at same time. 3.5.3 How they can be avoided It is difficult to avoid all the white spaces. But we surely can reduce it to some extent. And for that we need a special radio which can work on whole spectrum. Radio which is smart enough that could take important decisions without any human interference. This is where cognitive radios come into picture. But besides the radio, it also needs some set of rules or some regulation to make it work. Keeping this in mind the same has been discussed in Business Model foe Cognitive Radios in Chapter 2. 3.5.4 Regarding this Thesis As far as this Thesis is concerned we are taking help of Simulation to show spectrum sensing in Matlab. And the technique which we used for that is Energy Detection technique. Now to show a spectrum we first need multiple signals in our spectrum. Those signals are the OFDM signals. And the frequency gap in between those signals is our white spaces. To show spectrum sensing it is important to create this white space. We have tried not to use the frequencies which are too high or too low. We have tried to make complex calculations looks simpler for easy understanding. 3.5.5 Parameters/Variables Used Number of carriers is denoted by variable k. Tu is useful OFDM symbol period. T is baseband elementary period. G is cyclic prefix. And total symbol duration is Ts which is equal to delta+G, where (delta= g*Tu). As said before we are using 2N-IFFT, so IFFT/FFT length FS is 4096. Rs is the simulation period. Carrier to elementary period ratio is q is 10. Carrier frequency fc = q*(1/T). As we want to add two signals later we have kept our sampling frequency of whole system as Sf. Sf = 700 MHzs. 3.5.6 Calculations for OFDM signal 1 For signal 1: Tu= 100 *106 sec. Therefore, T=Tu/2048 = 48.8281*10-9 sec. fc=q/T = 204.79*106 Hz This is the center frequency for OFDM signal1. And, Rs=4*fc=819.199*106. Carrier spacing = (kmax * (kmin-1))/Tu = (1705*1704/100*10-6) = 29036.16*106 Spacing between two carriers = 29036.16*106 / 1705 = 17.03*106 Hz. Now, we are having total 1705 symbols that are transmitted with a rate of T/2 seconds to IFFT block. That is, one symbol is transmitted every T/2 seconds. As we are using 4-QAM, it means we are using 2 bits per symbol. That is, two bits are transmitted every T/2 seconds. Therefore, one bit every T/4 seconds. So, the bit rate for OFDM symbol 1 = T/4 = 122.07*10-6 seconds. 3.5.7 Calculations for OFDM signal 2 For signal 2: Tu2 = 80 *106 sec. Therefore, T2=Tu2/2048 = 39.06*10-9 sec. fc2=q/T2 = 256.00 * 106 Hz This forms the center frequency of OFDM signal2. And, Rs2=4*fc2=1024.00*106. Carrier spacing = (kmax * (kmin-1))/Tu2 = (1705*1704/80*10-6) = 36295.2 * 106 Spacing between two carriers = 36295.2 * 106 * 106 / 1705 = 21.28*106 Hz. Similarly to case 1 bit rate for OFDM signal 2 is calculated as, One bit is transmitted every T2/4 seconds. So, the bit rate for OFDM symbol 2 = T2/4 = 9.765*10-9 seconds. And from our code, to change the center frequency we just need to alter Tu (useful OFDM symbol period) or the sampling frequency Sf. For Tu as 100 micro seconds and 115 micro seconds we are getting OFDM signals with center frequencies around 200 MHz and 265 MHZ respectively. In this way we have created a white space of around 40 MHzs. In this chapter we found the center frequency measurement technique which is followed by results analysis in the next part of our thesis. Chapter 4 -Simulation and Result Analysis 4.1 Introduction So far we have seen how cognitive radios work. Cognitive radios are not only for research but it is a need of todays communication system. Moreover cognitive radios are more reliable than the traditional radios. We have also discussed the role of cognitive radios in sensing the spectrum, various methods used for spectrum sensing. In our thesis we have explained many spectrum sensing techniques like matched filter, energy detection, cyclostationary features. Cognitive radios are simple extension of software defined radios. But it is flexible characteristics of frequency and bandwidth and Intelligent Signal Processing (ISP) as an add-on. With the help of it makes smart decision at correct time. Now cognitive radios and ISP generally means with the physical layer but not compulsory, ISP can be installed at higher levels too. For CR to get the smartness it needs this ISP. Of all the above spectrum detection techniques discussed we found that energy detection is the simplest one and one of the fastest technique available for spectrum sensing. Hence we have tried to show simulation for spectrum sensing by using energy detection technique. Simulations are done using Matlab. Matlab Code (m.file) is supported with sufficient comments when needed for better understanding. In this chapter we have tried to explain the output of the system at various points. Orthogonal Frequency Division Multiplexing (OFDM) is well suited for cognitive radios because of its robustness. OFDM can provide large data rate even in impaired channel. For decades there has been a lot of research done in the field of OFDM. OFDM is basically a bunch of large number orthogonal waveforms which does not overlap with each other (as they are orthogonal). OFDM consist of subcarriers which are narrow-band and these subcarriers are transmitted in parallel while transmission. OFDM is good with handling multipath interference. Multipath interference gives rise to frequency selective fading and Inter Symbol Interference (ISI). Because OFDM has narrow band we get flatness in channel which helps to overcome frequency selective fading. Modulation of symbols in OFDM is done at very low rate, this makes symbol much longer than our channel impulse response, and this in turn helps to overcome ISI. That is one of the reasons why we have chosen OFDM for our simulation. In our Matlab code we have generated two OFDM signal, both with different centre frequencies. This two signals acts like the signals transmitted by two different transmitters and they met up in air. So we have added these two signals. Now signal can be considered as the signal received at the receiver end of the system, as we have not considered noise in our system. Then we have found the energy of this added signal and calculated its energy. 4.2 Simulation Analysis of OFDM signals 1 and signal 2 We want the OFDM spectrum should be centered on frequency fc. And to get that we are using 2N-IFFT to get the spectrum centered at fc. The elementary period of the OFDM is considered to be T/2. The symbol duration Tu is considered using 2048-IFFT; hence we will be using 4096-IFFT in our code. Figure 4.1 shown below is the block diagram of a typical OFDM system. The elementary period T is defined for baseband signal, whereas we are going to perform the simulation on pass-band signal. For this we need to relate elementary period T to the time period of 1/Rs which should be at least double the carrier frequency. Input data is being created using rand function. The numbers generated by this function is decided by the internal state of generator. This function generates a stream of random numbers which are distributed uniformly. Also note that the state of rand function is set to 0 (rand(state,0)). By setting the state of rand function to state zero resets the generator to a same fixed state. Hence we get same results every time. If we do not set the state to zero then we will get unique set of result every time we run the program. It would be better programming practise to set the state of rand function because Matlab reset the state at every start-up. With the help of rand function Kmax+1 complex numbers are generated and stored into variable a. The variable info forms our actual input data to the system. This variable has 4096 points, in which zeros are padded at the beginning and at the end 853 points. Zero padding is done to avoid symbol overlapping or aliasing. M=Kmax+1; rand(state,0); a=-1+2*round(rand(M,1)). + 1i*(-1+2*round(rand(M,1))).; info =zeros(FS,1); info((FS-((A/2)-1)):FS) = [ a(((A/2)+1):A).]; info(1:(A/2)) = [ a(1:(A/2)).]; carriers=FS.*ifft(info,FS); The Below figure shows the real and imaginary part of the signal carriers which forms our input signal. We can also notice that signal carriers uses time period of T/2. (a) OFDM Signal 1(b) OFDM Signal 2 (a) OFDM Signal 1(b) OFDM Signal 2 The purpose of zero padding is to assure frequency domain symbols are communicated in orthogonal sub channels. The length of the cyclic prefix is to be kept at least as long as impulse response of the channel at the receiver. Due to sharp transitions OFDM signal causes spurious emission which in turn leads to attenuation and thus further lengthening the impulse response of the channel. This is then followed by an IFFT block which performs IFFT on the signal info. At its output we get a signal carriers which is an IFFT of info with 4096 points. Signal carriers is plotted in time domain and frequency domain in figure 4.1, 4.11 and figure 4.2 and 4.12 respectively. We can notice that signal carriers has time period of T/2 and signal carriers is a baseband signal. To plot the signal in frequency domain pwelch function is used. pwelch function gives the power spectral density (PSD) of a signal by employing modified periodogram method. The output of the IFFT block is then fed to the reconstruction filter or low pass filter. Filter filters out the frequency components out of band and only passes frequencies which are in band. The signal carriers is sent the through the filter g(t). (a) OFDM Signal 1(b) OFDM Signal 2 Below shown is signal carriers after pulse shaping in time domain. (a) OFDM Signal 1(b) OFDM Signal 2 (a) OFDM Signal 1(b) OFDM Signal 2 Signal carriers after pulse shaping in frequency domain.For reconstruction filter we are using bandwidth as Rs and time period as 2/T. Therefore we have (2/T=40.95 MHz) 17 MHz = 23 MHz (for OFDM signal 1) and (2/T2=51.20 MHz) 17 MHz = 34.20 MHz (for OFDM signal 2) as our transition bandwidth for the filters. At the output of filter we get periodic frequency response as required by discreet time system as seen in figure 4.6 and 4.16. Now, in our code the signal carriers is used to produce signal chips which is then convolved and pulsed shaped to form a signal dummy and u. In Matlab convolution is similar to multiplication of two signals. The signal u is plotted in time and frequency domain in figure 4.4, 4.14 and figure4.5, 4.15 respectively. The signal u is the passed through a filter. As a filter we used Butterworth filter of order 13 with approximate cut off frequency of 1/T. Figure 6 shows the filter response. (a) OFDM Signal 1(b) OFDM Signal 2 Response of Digital to Analog Filter. In our case we are using Butterworth filter of order 13. And figure 4.9 (a)/(b) and 4.10 (a)/(b) shows the out of filter uoft in time and frequency domain. (a) OFDM Signal 1(b) OFDM Signal 2 (a) OFDM Signal 1(b) OFDM Signal 2 Signal output after filtering in frequency domain. Lastly we do Up-Conversion on the signal. Up-Conversion actually converts the baseband OFDM signal to an IF (Intermediate Frequency) signal, so that the signal is ready for transmission. It also minimizes the impulse response duration of the OFDM signal. Input to the Up converter is stream of baseband symbols. Till now we got I and Q. Now this I and Q are modulated with sin () and cos () and then finally added and then transmitted. Where = 2*fc*t. below figure show time response of our OFDM signal. (a) OFDM Signal 1(b) OFDM Signal 2 (a) OFDM Signal 1(b) OFDM Signal 2 These baseband symbols are sampled at baseband sampling rate. Each symbol takes one of the M complex values. The value of the complex number and M forms the basic parameter for modulation. For example, 16-QAM will have 16 different complex numbers on complex plane or signal constellation; 4-QAM will have four different complex values. Up conversion is also necessary as, for the frequencies which are in Giga Hertz (GHz) traditional signal processing devices do not perform well and transistors become unstable. And one more reason for that is, it is difficult to implement amplifiers and filters that can be tuned to different frequencies, rather it would be much easier to implement a tuneable oscillator. This gives us the simulation analysis of OFDM signal 1.Generation of OFDM signal 2 is similar to OFDM signal 1. The only change we have done is in Tu (OFDM period). In first case Tu is 100 micro seconds, while in second signal Tu is 80 microseconds. This gives us OFDM signal 1 with center frequency as 42 MHz and OFDM 2 signal with center frequency 85 Mega Hertz. By creating OFDM signal 1 and OFDM signal 2 we have managed to generate two frequency band in a spectrum which we will using to testing the spectrum sensing. These to signals are transmitted in air and at the receiver we will be receiving another signal which will be the addition of these two. To keep our code simple we are not adding noise to our system. In future we plan to study the simulation of our system with noise. So in next part of our code we add these two signals. Signal s_tilde from OFDM signal 1 and signal s_tilde2 from OFDM signal 2 is added in time domain. (a) OFDM Signal 1(b) OFDM Signal 2 This added signal has real as well as imaginary components. So we remove imaginary parts by taking only real part of the signal and using it for further analysis. This real part of the added signal is then plotted in time domain and frequency domain. Next task is to sense the spectrum. For sensing the spectrum we are using Energy detection technique. In which we basically we sample the whole spectrum and take energy at each time sample. This energy which is taken at each time sample is then compared to a threshold. (a) OFDM Signal 1(b) OFDM Signal 2 If the signal has energy beyond threshold then decision could be taken as that band of spectrum is occupied or not available, and if detected energy is less than the threshold then we could say that a particular band in a spectrum is available, which can be seen in above figure. Now setting this threshold is an important task for this technique to function better. Energy detection technique is no doubt one of the fastest spectrum sensing technique available, but we must recall that according to basic definition of cognitive radios, it should not only sense the spectrum fast but also need to be accurate. And for our technique to be more accurate we can employ some more techniques with energy detection which are discussed above. But in our code we have tried to keep it simple, so the threshold is decided by (maximum energy +minimum energy)/2. This looks simple and it is effective too. This chapter showed us the results of our model. With this we end this chapter and take a step forward towards some future work we had in our mind while doing this thesis. Chapter 5 Conclusion The main aim of this thesis was to understand Cognitive radios, spectrum sensing and to provide a basic simulation tool for future work. Spectrum sensing and Cognitive radios are discussed in details and simulation is performed using Matlab. Various spectrum sensing techniques have been discussed, and simulation is done using Energy detection Technique, because it is one of the fastest detection technique and also simplest of all. Mean value of energy is taken as the threshold for spectrum sensing. However we have not considered noise in our system for simplicity, but it cannot be ignored in real time systems. And with this we conclude our thesis, but we still need to keep in mind that more work need to do in Cognitive radios. Chapter 5 Future Work This thesis will form a basic tool for any further research in the field of spectrum sensing or cognitive radios. Currently we are able to detect the spectrum roughly, in future we would like to sense the spectrum with more accurate spectrum sensing techniques. Also we intend that our receiver will sense he spectrum and will give a feedback to the transmitter. This feedback will give information about the white spaces or spectrum holes in the spectrum and then transmitter will adjust its parameters (in our code we can do that by adjusting Tu Useful OFDM Period) and then try to use the spectrum available. Currently we have not taken noise into account. If we consider noise and feedback from receiver, then a complete cognitive radio system will be ready.

Friday, December 20, 2019

Sigmund Freud s Theory Of Development - 2070 Words

Sigmund Freud and Carl Jung are two key people when talking about psychology. Sigmund Freud’s psychoanalytical theory of development contains a few parts, one is the psychoanalytical theory of personality; which talks about our decision making and how they evolve over time. Another part of Freud’s theory is the psychosexual theory of development which talks about 5 stages that humans have to master in order to develop properly. Carl Jung’s psychodynamic theory also contains many parts such as theory of the libido, theory of the unconscious, and archetypes. Freud and Jung have comparisons and contrasts, to each other, in their theories but in order to compare and contrast them we must first talk about each theory by its self. To discuss†¦show more content†¦The ego isn’t as primitive as the id, also unlike the id it functions in the subconscious and conscious, works reason based on the reality principle (which is defined as the ego s control of the pleasure-seeking activity of the id in order to meet the demands of the external world), and regulates urges made by the id only when it is fitting. The Superego is defined as the part of a person s mind that acts as a self-critical conscience, reflecting social standards learned from parents and teachers. The superego is not primitive, works in the conscious, operates on the principles of right and wrong that are accepted by an individual or a social group also known as moral principle, and regulates the id based on social learning and morals. Freud thought that these 3 basic structures where constantly conflicting with each other. The struggle between these three structures throughout childhood were thought to help mature and impact personalit y and behavior in adult hood. The three behaviors work like so, let’s say you go to the store and see some chocolate and decide you want some chocolate but you also remember you are on a diet, so you decide to just get a small bar of chocolate. The id represents your want for chocolate, the super-ego represents you remembering that you are on a diet, and the ego represents the compromised decision to eat a small bar of

Wednesday, December 11, 2019

Subsidiarity of Unjust Enrichment †Free Samples to Students

Question: Discuss about the Subsidiarity of Unjust Enrichment. Answer: Introduction: Unconscionability can mean many things and may arise from a number of circumstances. In the present essay, an attempt has been made to explain and comment on these issues. The law has always been trying to find the ways in which protection Management can be provided to the rising number of consumers. Such provisions are present in the sister-in-law and also in the common law. The need for providing protection to consumers has been rising as a result of the large number of consumers who want to face disadvantage in their transactions due to the unfair practices adopted by businesses. In this way, the present essay also looks at the changes that have occured in the statutory law and also in common law (Carlin, 2002). A major decision given by the court in this regard was that of Commercial Bank of Australia Ltd. v Amadio (1983). This decision had a lot of impact on the doctrine of unconscionability. As a result, in the present essay, an attempt has been made to examine the effect of un conscionability on the contracts. At this point, it is worth mentioning that the decision given in Amadio's case was the first such a decision where the court relied upon the doctrine of unconscionability and as a result, this case can be described as the driving force behind the amendment of unconscionability that took place in the law of contract. Similarly, there has been a rising number of consumer protection laws that were introduced for the purpose of providing justice to the consumers and also to enforce the "unconscionable conduct" laws that may be present in the contracts concluded between the parties. Generally, the trader has the ownership of the business transactions and as a result, it is also the responsibility of the trader to ensure that the transaction created between the parties can be described as fair and reasonable. In this way, unconscionability can be described as a doctrine of contract law that has been initially introduced for the purpose of maintaining fair play and equity. As a result, the term unconscionable conduct can be described as being associated with the behavior as a result of which the court may be required to provide relief to the other party. This doctrine was used by the High Court in Blomley v Ryan (1956). But the application of unconscionability in contract law, received significant strength when this doctrine was used by the court in the decision given in Amadio's case. Consequently, it will be helpful to briefly describe the effects of this case. Mr. and Mrs. Amadio were an elderly migrant couple from Italy. They had provided guaranteed for the loan taken by their son. In this case, the loan was taken by their son's company from Commercial Bank of Australia. The bank manager had close relations with their son. At the same time, the manager of the bank was also well aware of the business realities. He also knew very well that perhaps their son, Vincenzo Amadio had made a misrepresentation to his parents for the purpose of obtaining the guarantee of his parents for the loan that he was going to take from the bank. After the loan was taken, the construction business of their son failed. The bank tried to enforce the guarantee that had been provided by Mr. and Mrs. Amadio and mortgaged their building with the bank. Under these circumstances, the issue that needed to be decided was if Mr. and Mrs. Amadio can be held to be bound by this transaction. Similarly if the contract of guarantee was enforceable against the elderly couple, particularly in view of the circumstances under which the contract was signed by them. It also needs to be mentioned that Mr. and Mrs. Amadio were in there advanced years of age. They also had little comprehension of English. Similarly, no professional and independent advice was provided to Mr. and Mrs. Amadio in relation with the contract. The court also noted the fact that even if the bank manager. Mr. Virgo, knew very well regarding the business situation of the company of Vincenzo but he also referred to keep quite instead of advising the elderly couple that they should seek independent advice regarding the contract. In this way the court noted the fact that at the time of the execution of the mortgage by Mr. and Mrs. Amadio, the bank was aware of the unstable financial position of the company of their son. The bank also knew the perhaps Mr. and Mrs. Amadio did not knew this fact and they were under the impression that the business of their son was going on well. Another important fact noted by the court was that while the elderly couple believed that their liability under the contract was limited to $50,000, the bank did not inform them that in fact, there liability as the guarantors for the loan, was unlimited. Under these circumstances, while delivering the decision, the court held that the bank manager knew very well that the elderly couple was facing a special disability. Still, the bank decided not to take any steps to make sure that Mr. and Mrs. Amadio were fully aware of the transaction. Consequently Management, the court stated that an advantage has been taken by the bank regarding the o pportunity that was available to it and this was unconscientious. According to the court, the doctrine of unconscionability relied on this underlying basis. After the decision given in this case, the concept of unconscionability became a part of contract law. Similarly, changes also took place in the statutory law as a result of this decision. The term unconscionability can be distinguished in two ways. First of all, there is the procedural unconscionability (Beatson and Virgo, 2002). It is related with the disadvantage suffered by the weaker party, while the negotiations are going on. In such a case, the stronger party has taken in one page of the fact that either the consumer does not have sufficient knowledge or understanding concerning the contract or an independent decision cannot be made by the consumer concerning the transaction (Paterson, Robertson and Duke, 2009). The law provides that if in such a case the trader had failed to mention to the consumer that certain avenues are available to the consumer for getting help him clearly understanding the terms of the contract, it is a lapse on part of the trader. Hence it can be conclu ded in such a case that the trader had tried to take advantage of the lack of understanding of the consumer and achieve a benefit for himself (Grantham and Rickett, 2001). The second case is of a substantive unconscionability. It deals with the unfairness of the terms of the contract or the outcome of the contract. It may also reveal that a party to the contract has to suffer undue influence or coercion while entering into the contract. Therefore in such a case, an independent decision cannot be made by the consumer as a result of the undue influence. While the general position is that the courts do not go into the question if a good bargain or bad bargain has been received by a party to the contract. However, this question will be explored by the court while it is deciding the issue if a chance was available to the party to decide if it was in their best interest to enter the contract or not (Kremer, 2001). In view of the fact that generally been unconscionable if he is alleged, a difference is present in the bargaining power of the parties, it is easy for individuals or small companies to allege unconscionability against large corporations. Hence, the introduction of the doctrine of unconscionability plays for the purpose of ensuring that the stronger party is aware of the fact that the other party is suffering from a special disadvantage (Kakavas v Crown Melbourne Ltd., 2013). As a result of the decision of the court in Amadio case, it is required from the stronger party to establish in the court that the contract created between the parties was fair, just and reasonable. Several developments have taken place in this field of law after the decision delivered by the court in Amadio's case. These changes included the amendments made in the earlier Trade Practices Act, 1974. At the same time, changes were also introduced in the Corporations Act, 2001 and ASIC Act, 2001. Similarly, some changes are also made in the various codes of conducts of the industry. For instance, reforms took place in the financial services sector after this decision. The effect of these changes was that now the main responsibilities of the ASIC to handle the issues related with consumer protection in financial field. The decision regarding the application of the unconscionable conduct provisions to the contracts dealing with financial services has to be made keeping in view the particular exclusion clauses and also the definitions that have been mentioned in the ASIC Act Management. The apex body in Victorian is the Financial and Consumer Rights Council for the financial counselors. Financial counselors are provided resources and support by the Council and it also promotes the needs of the consumers who have to deal with financial problems. Similarly, it is also the responsibility of the Council to provide information and advocacy to the consumers were facing problems in the financial sector. The Council works in tandem with the community sectors. At the same time, the services of the Council are provided for free to the consumers. Moreover, these services are independent and confidential. The main reason due to bridge these services are provided to the consumers is to advocate for the vulnerable consumers if they have to deal with financial difficulties. In order to fulfill this objective, the Council supports financial counselors. Similarly, the Council also helps through stakeholder relationships in order to create a systemic change. Similarly, the Council pr ovides support to the financial counseling sector through advocacy, law reform, case work, and through the adoption and maintenance of best practices. In the present context, consumer advocacy means to provide a voice to the affected consumers. When a review of the history of consumer advocates see in Australia is made, this view is further supported. Similarly, after considering the literature in which the term advocacy has been used and also after going through the mission statements of various organizations that are working as the consumer advocates, the same view appears to be present. At the same time, the view is also gaining support that further steps need to be taken if the voices of the consumers are not heard in Victoria (or if these voices are not sufficiently heard) as can be seen in other parts of Australia, and also in other countries. It is very significant that the consumer advocates should act as the voice of the consumers. At the same time, they should also act by considering the long-term interests of the consumers. The consumer organizations are required to be effective even if there are significant restraints present for them like the constraints of resources. As a result, generally, these organizations adopt the strategy of working smarter and harder as against the voices they are opposing. Similarly, these organizations also stretch the available resources beyond the natural constraints. Although it is difficult to claim that consumer advocacy has proved to be highly effective. As a result, it can be said that the present arrangements in Victoria related with consumer advocacy are still less effective than required. References Beatson J and Virgo, G J (2002) Contract, Unjust Enrichment and Unconscionability, 118 Law Quarterly Review 352 Carlin, T.M., (2002) The Rise (And Fall?) of Implied Duties of Good Faith in Contractual Performance in Australia, UNSWLawJl 4 Grantham R and Rickett, C (2001) On the Subsidiarity of Unjust Enrichment, 117 Law Quarterly Review 273 Kremer, B (2001) The Action for Money Had and Received, 17 Journal of Contract Law 93. Paterson, Robertson Duke, (2009) Contract: Cases and Materials, Lawbook Co, 11th ed. Paterson, Robertson Duke, (2009) Principles of Contract Law, Lawbook Co, 3rd ed. Blomley v Ryan (1956) 99 CLR 362 Commercial Bank of Australia v Amadio (1983) 151 CLR 447, 461 Concrete Constructions (NSW) Pty Ltd v Nelson (1990) 169 CLR 594 Kakavas v Crown Melbourne Ltd [2013] HCA 25 Louth v Diprose (1992) 175 CLR 621

Wednesday, December 4, 2019

Information Security Malware Denotes Malicious Software - Samples

Question: Discuss about the Information Security Malware Software. Answer: Introduction The term 'Malware' denotes malicious software. This kind of system software is being designed specifically in order to create discrepancies in the computer system. The owner has no idea of the fact that the system is being accessed (Rouse, 2017). The software is said to be malicious as the owner or the end user has no clue regarding the damage caused to the system. The developer of such software has the access of the system, rather than the owner or the user, this marks it to be malicious. The main purpose behind building such software is to extract the personal information of the users from their system. And also, there are certain factors that contribute in making the computer system accessible for such types of software (Hoffman, 2014). Such factors are defect in the operation system of the computer network, same network responsible for the running of the entire computers etc. The initiation phase of the malware was completely different, as compared to its present day usage. The m alwares, in their initial phase were being used for the purpose of experiments as well as pranks. But, in the contemporary times, the malwares are used in order to earn secret profits (Computerhope, 2017). The developers aim to earn secret profit through the means of: Spreading email spam (zombie computers) Stealing or accessing relevant and confidential information (spyware) Forced advertisements (adware) Money extortion (ransomware) Background The concept of virus was developed with the publication of the research paper "Computer Viruses-Theory and Experiments". The research paper was being written in the year 1984, by the Professor Fred Cohen (Cohen, 1984). The author highlighted the main ideas related to the power and ability of these viruses to impact the system, how such viruses find their pathways to the computer systems, and also the preventive measures that can be adopted to prevent the computer from such viruses. According to the authors, if a system is very much in sharing of abundant and bulk data and does not uses the preventive measures, then, such systems are being adversely impacted by the attack of the viruses. Ralph Burger, in the year 1987 initiated to focus on the concept of idea and the results that he obtained from his research were being written through the book "Computer Viruses: A High Tech Disease" (Burger, 1988). The author through his book aimed at letting the readers know about the origination of the viruses as well as their functioning. This resulted in sharing of the information which is related with the designing and development of the viruses. People started using the ways for developing the viruses that were being mentioned in the book for the purpose of prank and experiments. As the internet came into the picture, since 1990, the security of the reports also increased. The viruses named Melissa as well as Michaelangelo were considered as the fresh as well as the most dangerous viruses (King of Gng, 2014). Along with the development of the viruses, the technology for virus likes bots and botnets were being developed (Norton, 2017). As the concept of internet was becoming popular among the people, it soon started with the sharing of the personal as well as private and business information. This turned out to be a serious issue as the confidential and relevant information of the people was being leaked. (Economic Times, 2017). For the cyber security department, it became difficult to trace such hackers who had an unauthorized access over the personal information of the individuals. This impacted not only the personal computers of the individuals or business organization, but also the confidential information of the government department and officials. With the growing issues of security, the risk to the personal details and information is also increasing. There is a heavy need to implement the safety measures that shall ensure privacy to the users, because in the contemporary era, the people are very much inclined towards the use of technologies and digital methods for the sake of payment and other purposes. As t he number of online transactions is being increasing, so is the sharing of confidential information and also the risk of getting the information leaked. Impact of Malware The mails which are not composed by the user are sent to any recipient, without the user's knowledge. The malware has the ability of hijacking the browser, which leads to the redirection of the users to various inappropriate and harmful sites. It has a direct impact on the efficiency of the operating system of the computer. The speed and accuracy of the system is reduced, as the files and programs, within the system gets infected due to malware attack (Magalhaes, 2012). Types of Malware In the initial phase, it was only virus that was considered as malicious software and had the ability to threat and risks the security issues of the information. But, as the time passed, new malwares has been developed by the hackers in order to get an unauthorized access over someone else's system and information (Study.com, 2017). Such malware types are: Spyware: the purpose of such type of malware is to have an access over the personal information that is being shared. The purpose is to transfer such information from the computer system to another system that is of the third party. It aims to send the malware back to the system, and spies on all the internet based activities of the users. Worms: this type of malware is similar to the malware of virus. This malware is being named 'worm' as it moves from one system to another without the need of any human actions. Worms multiplies within the system, gets attached to the files in the system and hunts for the pathways between two systems that are involved in sharing information and media within each other. Viruses: this malware gets attached with different programs and files. These files and programs are those which are being downloaded or installed on the user's computer system. The viruses multiply themselves when the file or the program that is infected is being transferred from one system to another. A virus is capable of damaging data files, hampering the performance of the system and corrupting the data stored on the system. Adware: the advertisements that pops up on the website while using the internet is the adware type of malware. Such malwares are hidden within the files or programs that are being downloaded and installed in the system. The aim of the adware is that the user clicks on the displayed advertisement once. By doing so, a third party shall make money, just out of the one click done by the user. Trojan: this is considered as the most dangerous and harmful type of malware that attacks on the financial information of the user and also plans to take over the resources of the computer system. In the large network of systems, the malware creates the 'denial of service attack'. This is an attempt that enables a system to make the computer system resources unavailable for those who make an attempt to reach it. Rootkit: this type of malware is considered to be the most difficult and hardest, out of all the malwares to get detected. It is very difficult for the users to know that there system has been impacted by this malware type. This is the reason that the experts have recommended to erase off the drives and also install each and every program again. (Malware Truth, 2017) Tools for Counter-Attacking Malwares With the rising security issues and development of various types of malwares, there are certain tools that have been developed in order to counter attack such malwares, to protect the system from the threat of such malwares. Such tools are: Antivirus software: this software of Antivirus has the ability to perform the scanning process along with deleting and blocking those files and programs that have become corrupted due to the virus attack. This development, in order to provide data security is considered to be a successful one. This software does not entirely eliminate the risk from the viruses, but has the ability to forecast and mitigate the risk from the viruses and hence, is considered as the most reliable method of counter attacking. In order to detect malwares, the software uses two- step processes. Initially, looking for the suspicious activities is the step one and in the other step, the software scans the entire system. The company developing such software has installed various systems in the software in order to detect the viruses. Antivirus software is needed to be updated on a regular basis. (Webroot, 2017) Spam filter: the world of internet has infinite malwares within it. Various sites on the internet consist of spam as well as malicious software, which harm the system of the user. Though people are getting aware about such types, there are still some systems that get harmed by such malwares. A spam filter works in many ways and the most common way is that it scans and filters the spam in the e-mails. This method is effective but is time consuming too (University of Pennsylvania, 2017). Firewall: the firewall software has the ability to counter attack the malwares that are being infecting the system as well as leaking the confidential information of the users. The software keeps a trace of the files and programs and allows the user to transfer such programs and files, wherever they want, at a safe destination. When the data are being on a large scale, such software is being preferred. If there is no malicious file attached with the data, then only the firewall allows the sharing of the data (Rouse, firewall, 2017). Conclusion With the development in the internet services, the risk of getting the information leaked is also increasing. The various types of malwares have an impact on the files and programs of the system. However, there are various software development companies, which have developed various software in order to counter attack the malwares. Apart from this, it is necessary for a user to install and update these anti malware programs on a regular basis so that they do not fall prey to cyber criminals. References Burger, R. (1988). Computer viruses: a high-tech disease. Abacus. Cohen, F. (1984). Computer Viruses - Theory and Experiments. Retrieved from Web.eecs.umich.edu: https://web.eecs.umich.edu/~aprakash/eecs588/handouts/cohen-viruses.html Computerhope. (2017, April 26). Why do people create viruses and malware? Retrieved from Computer Hope: https://www.computerhope.com/issues/ch001404.htm Economic Times. (2017). Definition of 'Cyber Security'. Retrieved from https://economictimes.indiatimes.com/definition/cyber-security Hoffman, C. (2014, March 3). Who is Making All This Malware and Why? Retrieved from How-To Geek: https://www.howtogeek.com/183642/who-is-making-all-this-malware-and-why/ King of Gng. (2014, March 30). Michelangelo and Melissa, the mass hysteria computer viruses. Retrieved from Sir Arthur's Den: https://kingofgng.com/eng/2014/03/30/michelangelo-and-melissa-the-mass-hysteria-computer-viruses/ Magalhaes, R. (2012, August 22). Malwares impact, serious and long lasting. Retrieved from TechGenix: https://techgenix.com/malwares-impact-serious-long-lasting/ Malware Truth. (2017). The Truth About Malware. Retrieved from https://www.malwaretruth.com/the-list-of-malware-types/ Norton. (2017). Bots and BotnetsA Growing Threat. Retrieved from https://us.norton.com/botnet/ Rouse, M. (2017). firewall. Retrieved from TechTarget: https://searchsecurity.techtarget.com/definition/firewall Rouse, M. (2017). Malware (malicious software). Retrieved from TechTarget: https://searchsecurity.techtarget.com/definition/malware Study.com. (2017). What is Malware? - Definition, Examples Types. Retrieved from https://study.com/academy/lesson/what-is-malware-definition-examples-types.html University of Pennsylvania. (2017). How does the spam filter work? Retrieved from https://www.seas.upenn.edu/cets/answers/spamblock-filter.html Webroot. (2017). What is Anti-Virus Software? Retrieved from https://www.webroot.com/in/en/home/resources/tips/pc-security/security-what-is-anti-virus-software