4,523 research outputs found

    Characterizing CDMA downlink feasibility via effective interference

    Get PDF
    This paper models and analyses downlink power assignment feasibility in Code Division Multiple Access (CDMA) mobile networks. By discretizing the area into small segments, the power requirements are characterized via a matrix representation that separates user and system characteristics. We obtain a closed-form analytical expression of the so-called Perron-Frobenius eigenvalue of that matrix, which provides a quick assessment of the feasibility of the power assignment for each distribution of calls over the segments. Although the obtained relation is non-linear, it basically provides an effective interference characterisation of downlink feasibility. Our results allow for a fast evaluation of outage and blocking probabilities, and enable a quick evaluation of feasibility that may be used for Call Acceptance Control. \u

    CONVERGENCE IMPROVEMENT OF ITERATIVE DECODERS

    Get PDF
    Iterative decoding techniques shaked the waters of the error correction and communications field in general. Their amazing compromise between complexity and performance offered much more freedom in code design and made highly complex codes, that were being considered undecodable until recently, part of almost any communication system. Nevertheless, iterative decoding is a sub-optimum decoding method and as such, it has attracted huge research interest. But the iterative decoder still hides many of its secrets, as it has not been possible yet to fully describe its behaviour and its cost function. This work presents the convergence problem of iterative decoding from various angles and explores methods for reducing any sub-optimalities on its operation. The decoding algorithms for both LDPC and turbo codes were investigated and aspects that contribute to convergence problems were identified. A new algorithm was proposed, capable of providing considerable coding gain in any iterative scheme. Moreover, it was shown that for some codes the proposed algorithm is sufficient to eliminate any sub-optimality and perform maximum likelihood decoding. Its performance and efficiency was compared to that of other convergence improvement schemes. Various conditions that can be considered critical to the outcome of the iterative decoder were also investigated and the decoding algorithm of LDPC codes was followed analytically to verify the experimental results

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Final report on the evaluation of RRM/CRRM algorithms

    Get PDF
    Deliverable public del projecte EVERESTThis deliverable provides a definition and a complete evaluation of the RRM/CRRM algorithms selected in D11 and D15, and evolved and refined on an iterative process. The evaluation will be carried out by means of simulations using the simulators provided at D07, and D14.Preprin

    Error-corrected quantum sensing

    Get PDF
    Quantum metrology has many important applications in science and technology, ranging from frequency spectroscopy to gravitational wave detection. Quantum mechanics imposes a fundamental limit on measurement precision, called the Heisenberg limit, which can be achieved for noiseless quantum systems, but is not achievable in general for systems subject to noise. Here we study how measurement precision can be enhanced through quantum error correction, a general method for protecting a quantum system from the damaging effects of noise. We find a necessary and sufficient condition for achieving the Heisenberg limit using quantum probes subject to Markovian noise, assuming that noiseless ancilla systems are available, and that fast, accurate quantum processing can be performed. When the sufficient condition is satisfied, the quantum error-correcting code achieving the best possible precision can be found by solving a semidefinite program. We also show that noiseless ancilla are not needed when the signal Hamiltonian and the error operators commute. Finally we provide two explicit, archetypal examples of quantum sensors: qubits undergoing dephasing and a lossy bosonic mode

    Cloud Transmission: System Performance and Application Scenarios

    Get PDF
    [EN] Cloud Transmission (Cloud Txn) System is a flexible multi-layer system that uses spectrum overlay technology to simultaneously deliver multiple program streams with different characteristics and robustness for different services (mobile TV, HDTV and UHDTV) in one RF channel. The transmitted signal is formed by superimposing a number of independent signals at desired power levels, to form a multilayered signal. The signals of different layers can have different coding, bit rate, and robustness. For the top layer, system parameters are chosen to provide very robust transmission that can be used for high speed mobile broadcasting service to portable devices. The bit rate is traded for more powerful error correction coding and robustness so that the Signal to Noise Ratio (SNR) threshold at the receiver is a negative value in the range of -2 to -3 dB. The top layer is designed to withstand combined noise, co-channel interference and multipath distortion power levels higher than the desired signal power. The lowerlayer signal can be DVB-T2 signal or other newly designed system to deliver HDTV/UHDTV to fixed receivers. The system concept is open to technological advances that might come in the future: all new technologies, BICM/Non Uuniform-QAM, rotated constellations, Time Frequency Slicing or MIMO techniques can be implemented in the Cloud Txn lower (high data) rate layer. The main focus of this paper is to thoroughly describe the performance of this newly presented Cloud Transmission broadcasting system.This work has been financially supported in part by the University of the Basque Country UPV/EHU (UFI 11/30), by the Basque Government (IT-683- 13 and SAIOTEK), by the Spanish Ministry of Science and Innovation under the project NG-RADIATE (TEC2009-14201), and by the Spanish Ministry of Economy and Competitiveness under the project HEDYT-GBB (TEC2012- 33302

    Proceedings of the NSSDC Conference on Mass Storage Systems and Technologies for Space and Earth Science Applications

    Get PDF
    The proceedings of the National Space Science Data Center Conference on Mass Storage Systems and Technologies for Space and Earth Science Applications held July 23 through 25, 1991 at the NASA/Goddard Space Flight Center are presented. The program includes a keynote address, invited technical papers, and selected technical presentations to provide a broad forum for the discussion of a number of important issues in the field of mass storage systems. Topics include magnetic disk and tape technologies, optical disk and tape, software storage and file management systems, and experiences with the use of a large, distributed storage system. The technical presentations describe integrated mass storage systems that are expected to be available commercially. Also included is a series of presentations from Federal Government organizations and research institutions covering their mass storage requirements for the 1990's
    corecore