136 research outputs found

    Network lifetime extension, power conservation and interference suppression for next generation mobile wireless networks

    Get PDF
    Two major focus research areas related to the design of the next generation multihop wireless networks are network lifetime extension and interference suppression. In this dissertation, these two issues are addressed. In the area of interference suppression, a new family of projection multiuser detectors, based on a generalized, two-stage design is proposed. Projection multiuser detectors provide efficient protection against undesired interference of unknown power, while preserving simple design, with closed-form solution for error probabilities. It is shown that these detectors are linearly optimal, if the interference power is unknown. In the area of network lifetime extension, a new approach to minimum energy routing for multihop wireless networks in Rayleigh fading channels is proposed. It is based on the concept of power combining, whereby two users transmit same signal to the destination user, emulating transmit diversity with two transmit antennas. Analytical framework for the evaluation of the benefits of power combining, in terms of the total transmit power reduction, is defined. Simulation results, which match closely the analytical results, indicate that significant improvements, in terms of transmit power reduction and network lifetime extension, are achievable. The messaging load, generated by the new scheme, is moderate, and can be further optimized

    Non-linear echo cancellation - a Bayesian approach

    Get PDF
    Echo cancellation literature is reviewed, then a Bayesian model is introduced and it is shown how how it can be used to model and fit nonlinear channels. An algorithm for cancellation of echo over a nonlinear channel is developed and tested. It is shown that this nonlinear algorithm converges for both linear and nonlinear channels and is superior to linear echo cancellation for canceling an echo through a nonlinear echo-path channel

    Policies for Transmit Power Control in the Conditions of Jamming in Clustered Wireless System

    Get PDF
    This article presents a consistent solution of Transmit Power Control in centralized (clustered) wireless network with and without jamming. Depending on the policy assumed, solutions are applied to minimize the power used in a system or to satisfy expected Quality of Service. Because of specific nature of the system there is no optimal solution which can be applied in practice. Correctness and effectiveness of four proposed Power Control algorithms was presented in the form of computer simulation results in which the system capacity, mean power used and the number of successful links were described

    Policies for Transmit Power Control in the Conditions of Jamming in Clustered Wireless System

    Get PDF
    This article presents a consistent solution of Transmit Power Control in centralized (clustered) wireless network with and without jamming. Depending on the policy assumed, solutions are applied to minimize the power used in a system or to satisfy expected Quality of Service. Because of specific nature of the system there is no optimal solution which can be applied in practice. Correctness and effectiveness of four proposed Power Control algorithms was presented in the form of computer simulation results in which the system capacity, mean power used and the number of successful links were described

    Iterative multiuser detection for ultra-wideband systems

    Get PDF
    Master'sMASTER OF ENGINEERIN

    Application of genetic algorithm to wireless communications

    Get PDF
    Wireless communication is one of the most active areas of technology development of our time. Like all engineering endeavours, the subject of the wireless communication also brings with it a whole host of complex design issues, concerning network design, signal detection, interference cancellation, and resource allocation, to name a few. Many of these problems have little knowledge of the solution space or have very large search space, which are known as non-deterministic polynomial (NP) -hard or - complete and therefore intractable to solution using analytical approaches. Consequently, varied heuristic methods attempts have been made to solve them ranging from simple deterministic algorithms to complicated random-search methods. Genetic alcyorithm (GA) is an adaptive heuristic search algorithm premised on the evolutionary ideas of evolution and natural selection, which has been successfully applied to a variety of complicated problems arising from physics, engineering, biology, economy or sociology. Due to its outstanding search strength and high designable components, GA has attracted great interests even in the wireless domain. This dissertation is devoted to the application of GA to solve various difficult problems spotlighted from the wireless systems. These problems have been mathematically formulated in the constrained optimisation context, and the main work has been focused on developing the problem-specific GA approaches, which incorporate many modifications to the traditional GA in order to obtain enhanced performance. Comparative results lead to the conclusion that the proposed GA approaches are generally able to obtain the optimal or near-optimal solutions to the considered optimisation problems provided that the appropriate representation, suitable fitness function, and problem-specific operators are utilised. As a whole, the present work is largely original and should be of great interest to the design of practical GA approaches to solve realistic problems in the wireless communications systems.EThOS - Electronic Theses Online ServiceBritish Council (ORS) : Newcastle UniversityGBUnited Kingdo

    Special issue on real‐time behavioral monitoring in IoT applications using big data analytics

    Get PDF
    Real-time social multimedia level threat monitoring is becoming harder, due to higher and rapidly increasing data induction. Data induction through electric smart devices is greater compared to information processing capacity. Nowadays, data becomes humongous even coming from the single source. Therefore, when data emanates from all heterogeneous sources distributed over the globe makes data magnitude harder to process up to a needed scale. Big data and Deep learning have become standard in providing well-known solutions built-up using algorithms and techniques in resolving data matching issues. Now, with the involvement of sensors and automation in generating data obscures everything, predicting results to overcome a current era of ever enhancing demands and getting real-time visualization brings the need of feature like human behavior mode extraction to overcome any future threats. Big data analytics can bring the opportunity of predicting any misfortune even before they happen. Map reduce feature of big data supports massive data oriented process execution using distributed processing. Real-time human feature identification and detection can occur through sensors and internet sources. A behavioral prediction can further classify the information collected for introducing enhanced security extents. Real-time sensor devices are producing 24/7-hour data for further processing recording each event. IoT-based sensors can support in behavioral analysis model of a human. Real-time human behavioral monitoring based on image processing and IoT using big data analytics
    corecore