1,094 research outputs found

    Visible Light Communication (VLC)

    Get PDF
    Visible light communication (VLC) using light-emitting diodes (LEDs) or laser diodes (LDs) has been envisioned as one of the key enabling technologies for 6G and Internet of Things (IoT) systems, owing to its appealing advantages, including abundant and unregulated spectrum resources, no electromagnetic interference (EMI) radiation and high security. However, despite its many advantages, VLC faces several technical challenges, such as the limited bandwidth and severe nonlinearity of opto-electronic devices, link blockage and user mobility. Therefore, significant efforts are needed from the global VLC community to develop VLC technology further. This Special Issue, “Visible Light Communication (VLC)”, provides an opportunity for global researchers to share their new ideas and cutting-edge techniques to address the above-mentioned challenges. The 16 papers published in this Special Issue represent the fascinating progress of VLC in various contexts, including general indoor and underwater scenarios, and the emerging application of machine learning/artificial intelligence (ML/AI) techniques in VLC

    Advanced index modulation techniques for future wireless networks

    Get PDF
    In the research study proposed in this Ph.D Thesis, we consider Index Modulation as a novel tool to enhance energy and spectral efficiencies for upcoming 5G networks, including wireless sensor networks and internet of things. In this vein, spatial modulation was proposed to enhance the capacity of wireless systems to partially achieve the capacity of MIMO systems but at lower cost, making it a technique that has attracted significant attention over the past few years. As such, SM schemes have been regarded as possible candidates for spectrum- and energy-efficient next generation MIMO systems. However, the implementation of the SM is also challenging because of its heavy dependence on channel characteristics, channel correlation, corrupted CSI and the need to have adequate spacing between antennas. Moreover, the SM requires multiple antennas at the transmitter which adds cost to the hardware implementation. In addition, the number of mapped bits in SM is limited by the physical size of the wireless device where only small number of antennas can be used. The switching time wasted by RF antenna switches adds to the complexity of the issue. In this Thesis, we study the drawbacks of SM in the articles indicated, namely Performance Comparison of Spatial Modulation Detectors Under Channel Impairments that is placed in the Appendix at the end of Thesis as it is a conference paper, and The Impact of Antenna Switching Time on Spatial Modulation that is put in Chapter 1. In the first article, we have shown that channel impairments have serious impacts on the BER performance and on the capacity of the SM system and that the SM is too sensitive to both imperfect and correlated channels. In the second article, we have demonstrated that the switching time defined as the time needed by the system to turn off an antenna and turn on another one, which is an inherent property of RF industrial switches used in SM systems, is in the order of nanoseconds and naturally influences the transmission rate of SM systems because of introducing systematic transmission gaps or pauses. Given the speed limitation of practical RF switches in performing transitions, antenna transition-based technologies like SM schemes are capped in terms of data rate performance. In fact, the effective data rate of SM will remain hostage to developments in industrial RF switches. This brings restrictions to the implementation and operation issues when extremely high data rates become a necessity. It is shown by the assemblage of our results that the switching time Tsw which is a requirement for transitions between antennas to happen, dictates restrictions on data rate, capacity and spectral efficiency of SM systems. Furthermore, we propose baseband non-hardware-based indexing modulation schemes based on frequency-index modulation, coherent chaotic modulation and non-coherent differential chaotic modulation schemes as potential alternatives to SM, that would also fit wireless sensor networks and internet of things applications. In this regard, we have proposed three articles. The first article which represents frequency index modulation is called Frequency Index Modulation for Low Complexity Low Energy Communication Networks and is placed in Chapter 2 of this Thesis. In this article, we explore a low complexity multi-user communication system based on frequency index modulation that suits Internet of Things (IoT) applications and we show that such a system would constitute an excellent candidate for wireless sensor applications, where it represents a simpler substitution for frequency-hopping (FH) based architectures, in which the hops carry extra bits. The third article which concerns coherent chaotic modulation is called Design of an Initial-Condition Index Chaos Shift Keying Modulation and is located in Chapter 3. In this article, an initial condition index chaos shift keying modulation is proposed. This design aims to increase the spectral and energy efficiencies to unprecedented levels. The proposed scheme exploits the initial conditions to generate different chaotic sequences to convey extra bits per transmission. In comparison to rival modulation schemes, the results obtained in the proposed work show a promising data rate boost and a competitive performance. The last article employs a non-coherent differential chaotic shift-key system named Permutation Index DCSK Modulation Technique for Secure Multi-User High-Data-Rate Communication Systems that is found in the Appendix. In this original design, where each data frame is divided into two time slots in which the reference chaotic signal is sent in the first time slot and a permuted replica of the reference signal multiplied by the modulating bit is sent in the second time slot, we target enhancing data security, energy and spectral efficiencies. Overall, in light of the high demands for bandwidth and energy efficiencies of futuristic systems, the suggested soft indexing mechanisms are successful candidates with promising results

    Multiuser detection employing recurrent neural networks for DS-CDMA systems.

    Get PDF
    Thesis (M.Sc.Eng.)-University of KwaZulu-Natal, 2006.Over the last decade, access to personal wireless communication networks has evolved to a point of necessity. Attached to the phenomenal growth of the telecommunications industry in recent times is an escalating demand for higher data rates and efficient spectrum utilization. This demand is fuelling the advancement of third generation (3G), as well as future, wireless networks. Current 3G technologies are adding a dimension of mobility to services that have become an integral part of modem everyday life. Wideband code division multiple access (WCDMA) is the standardized multiple access scheme for 3G Universal Mobile Telecommunication System (UMTS). As an air interface solution, CDMA has received considerable interest over the past two decades and a great deal of current research is concerned with improving the application of CDMA in 3G systems. A factoring component of CDMA is multiuser detection (MUD), which is aimed at enhancing system capacity and performance, by optimally demodulating multiple interfering signals that overlap in time and frequency. This is a major research problem in multipoint-to-point communications. Due to the complexity associated with optimal maximum likelihood detection, many different sub-optimal solutions have been proposed. This focus of this dissertation is the application of neural networks for MUD, in a direct sequence CDMA (DS-CDMA) system. Specifically, it explores how the Hopfield recurrent neural network (RNN) can be employed to give yet another suboptimal solution to the optimization problem of MUD. There is great scope for neural networks in fields encompassing communications. This is primarily attributed to their non-linearity, adaptivity and key function as data classifiers. In the context of optimum multiuser detection, neural networks have been successfully employed to solve similar combinatorial optimization problems. The concepts of CDMA and MUD are discussed. The use of a vector-valued transmission model for DS-CDMA is illustrated, and common linear sub-optimal MUD schemes, as well as the maximum likelihood criterion, are reviewed. The performance of these sub-optimal MUD schemes is demonstrated. The Hopfield neural network (HNN) for combinatorial optimization is discussed. Basic concepts and techniques related to the field of statistical mechanics are introduced and it is shown how they may be employed to analyze neural classification. Stochastic techniques are considered in the context of improving the performance of the HNN. A neural-based receiver, which employs a stochastic HNN and a simulated annealing technique, is proposed. Its performance is analyzed in a communication channel that is affected by additive white Gaussian noise (AWGN) by way of simulation. The performance of the proposed scheme is compared to that of the single-user matched filter, linear decorrelating and minimum mean-square error detectors, as well as the classical HNN and the stochastic Hopfield network (SHN) detectors. Concluding, the feasibility of neural networks (in this case the HNN) for MUD in a DS-CDMA system is explored by quantifying the relative performance of the proposed model using simulation results and in view of implementation issues

    Digital Communication System with High Security and High Immunity

    Get PDF
    Today, security issues are increased due to huge data transmissions over communication media such as mobile phones, TV cables, online games, Wi-Fi and satellite transmission etc. for uses such as medical, military or entertainment. This creates a challenge for government and commercial companies to keep these data transmissions secure. Traditional secure ciphers, either block ciphers such as Advanced Encryption Standard (AES) or stream ciphers, are not fast or completely secure. However, the unique properties of a chaotic system, such as structure complexity, deterministic dynamics, random output response and extreme sensitivity to the initial condition, make it motivating for researchers in the field of communication system security. These properties establish an increased relationship between chaos and cryptography that create strong and fast cipher compared to conventional algorithms, which are weak and slow ciphers. Additionally, chaotic synchronisation has sparked many studies on the application of chaos in communication security, for example, the chaotic synchronisation between two different systems in which the transmitter (master system) is driving the receiver (slave system) by its output signal. For this reason, it is essential to design a secure communication system for data transmission in noisy environments that robust to different types of attacks (such as a brute force attack). In this thesis, a digital communication system with high immunity and security, based on a Lorenz stream cipher chaotic signal, has been perfectly applied. A new cryptosystem approach based on Lorenz chaotic systems was designed for secure data transmission. The system uses a stream cipher, in which the encryption key varies continuously in a chaotic manner. Furthermore, one or more of the parameters of the Lorenz generator is controlled by an auxiliary chaotic generator for increased security. In this thesis, the two Lorenz chaotic systems are called the Main Lorenz Generator and the Auxiliary Lorenz Generator. The system was designed using the SIMULINK tool. The system performance in the presence of noise was tested, and the simulation results are provided. Then, the clock-recovery technique is presented, with real-time results of the clock recovery. The receiver demonstrated its ability to recover and lock the clock successfully. Furthermore, the technique for synchronisation between two separate FPGA boards (transmitter and receiver) is detailed, in which the master system transmits specific data to trigger a slave system in order to run synchronously. The real-time results are provided, which show the achieved synchronisation. The receiver was able to recover user data without error, and the real-time results are listed. The randomness test (NIST) results of the Lorenz chaotic signals are also given. Finally, the security analysis determined the system to have a high degree of security compared to other communication systems

    Digital Communication System with High Security and High Immunity

    Get PDF
    Today, security issues are increased due to huge data transmissions over communication media such as mobile phones, TV cables, online games, Wi-Fi and satellite transmission etc. for uses such as medical, military or entertainment. This creates a challenge for government and commercial companies to keep these data transmissions secure. Traditional secure ciphers, either block ciphers such as Advanced Encryption Standard (AES) or stream ciphers, are not fast or completely secure. However, the unique properties of a chaotic system, such as structure complexity, deterministic dynamics, random output response and extreme sensitivity to the initial condition, make it motivating for researchers in the field of communication system security. These properties establish an increased relationship between chaos and cryptography that create strong and fast cipher compared to conventional algorithms, which are weak and slow ciphers. Additionally, chaotic synchronisation has sparked many studies on the application of chaos in communication security, for example, the chaotic synchronisation between two different systems in which the transmitter (master system) is driving the receiver (slave system) by its output signal. For this reason, it is essential to design a secure communication system for data transmission in noisy environments that robust to different types of attacks (such as a brute force attack). In this thesis, a digital communication system with high immunity and security, based on a Lorenz stream cipher chaotic signal, has been perfectly applied. A new cryptosystem approach based on Lorenz chaotic systems was designed for secure data transmission. The system uses a stream cipher, in which the encryption key varies continuously in a chaotic manner. Furthermore, one or more of the parameters of the Lorenz generator is controlled by an auxiliary chaotic generator for increased security. In this thesis, the two Lorenz chaotic systems are called the Main Lorenz Generator and the Auxiliary Lorenz Generator. The system was designed using the SIMULINK tool. The system performance in the presence of noise was tested, and the simulation results are provided. Then, the clock-recovery technique is presented, with real-time results of the clock recovery. The receiver demonstrated its ability to recover and lock the clock successfully. Furthermore, the technique for synchronisation between two separate FPGA boards (transmitter and receiver) is detailed, in which the master system transmits specific data to trigger a slave system in order to run synchronously. The real-time results are provided, which show the achieved synchronisation. The receiver was able to recover user data without error, and the real-time results are listed. The randomness test (NIST) results of the Lorenz chaotic signals are also given. Finally, the security analysis determined the system to have a high degree of security compared to other communication systems

    Optical Communication

    Get PDF
    Optical communication is very much useful in telecommunication systems, data processing and networking. It consists of a transmitter that encodes a message into an optical signal, a channel that carries the signal to its desired destination, and a receiver that reproduces the message from the received optical signal. It presents up to date results on communication systems, along with the explanations of their relevance, from leading researchers in this field. The chapters cover general concepts of optical communication, components, systems, networks, signal processing and MIMO systems. In recent years, optical components and other enhanced signal processing functions are also considered in depth for optical communications systems. The researcher has also concentrated on optical devices, networking, signal processing, and MIMO systems and other enhanced functions for optical communication. This book is targeted at research, development and design engineers from the teams in manufacturing industry, academia and telecommunication industries

    A nonlinear dynamic system for spread spectrum code acquisition

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 1999.Includes bibliographical references (leaves 88-89).Nonlinear differential equations and iterated maps can perform any computation. Sometimes, the most difficult part of performing a useful computation, however, is writing the program. Furthermore, in practice, we often need to build special purpose computing hardware suited to run a particular program. Nonlinear dynamics provides a novel and useful language for constructing "algorithms" and "computer architectures." We apply the language of nonlinear dynamics to solve a fast coding problem which has previously been implemented by a Digital Signal Processor chip in digital wireless receivers. We eventually hope to produce a novel physical system which exhibits the nonlinear dynamics we require, thereby creating one of the first nonlinear dynamic systems engineered to perform a practical computation. This system, called an Analog Feedback Shift Register (AFSR), should be a faster, more reliable, less expensive, and lower power Spread Spectrum (SS) code acquisition system for wireless receivers. A prohibitive factor in creating ubiquitous short range, digital radio transceivers is the difficulty and expense of creating a mechanism for locking onto the incoming Spread Spectrum code sequence. AFSR is also potentially useful in other applications where low cost, low power channel sharing or addressing is required, for example in wireless auto-identification tags.by Benjamin William Vigoda.S.M

    Security and robustness of a modified parameter modulation communication scheme

    Get PDF
    Please read the abstract in the section front of this documentThesis (PhD)--University of Pretoria, 2009.Electrical, Electronic and Computer EngineeringUnrestricte

    Millimetre wave quasi-optical signal processing and spread spectrum techniques

    Get PDF
    The use of quasi-optical techniques for signal processing at millimetre wave frequencies and their application to spread spectrum systems is presented in this thesis. Millimetre waves offer a number of advantages when compared to microwave and optical signals and as a result they are finding an increasing number of applications in the area of communications. Traditionally, millimetre wave research has been centred on scientific and experimental interests. In recent years, however, practical communications systems have been emerging at these frequencies. New technologies are being developed which aim to exploit the potential advantages of millimetric signals and the work undertaken here relates to one particular avenue - that of quasi-optics. This thesis introduces measurement methods for assessing millimetric components and quasi-optical systems, followed by an appraisal of Gunn oscillators and their associated power supplies as suitable signal sources for communications. A type of Gunn oscillator displaying semi-chaotic behaviour is described which may have potential as an inherently broadband source suitable for spread spectrum applications. The application of quasi-optical signal processing methods to a prototype spread spectrum millimetre wave system is presented. The system has been shown to operate satisfactorily in a number of demonstrations. Theoretical models of the quasi-optical circuit show good agreement with experiment and an analysis of the signal-to-noise behaviour predicts the potential receiver performance. Some ideas for future work, building on that presented here, are suggested
    corecore