4,523 research outputs found
Characterizing CDMA downlink feasibility via effective interference
This paper models and analyses downlink power assignment feasibility in Code Division Multiple Access (CDMA) mobile networks. By discretizing the area into small segments, the power requirements are characterized via a matrix representation that separates user and system characteristics. We obtain a closed-form analytical expression of the so-called Perron-Frobenius eigenvalue of that matrix, which provides a quick assessment of the feasibility of the power assignment for each distribution of calls over the segments. Although the obtained relation is non-linear, it basically provides an effective interference characterisation of downlink feasibility. Our results allow for a fast evaluation of outage and blocking probabilities, and enable a quick evaluation of feasibility that may be used for Call Acceptance Control. \u
CONVERGENCE IMPROVEMENT OF ITERATIVE DECODERS
Iterative decoding techniques shaked the waters of the error correction and communications
field in general. Their amazing compromise between complexity and performance
offered much more freedom in code design and made highly complex codes, that were
being considered undecodable until recently, part of almost any communication system.
Nevertheless, iterative decoding is a sub-optimum decoding method and as such, it has
attracted huge research interest. But the iterative decoder still hides many of its secrets,
as it has not been possible yet to fully describe its behaviour and its cost function.
This work presents the convergence problem of iterative decoding from various angles
and explores methods for reducing any sub-optimalities on its operation. The decoding
algorithms for both LDPC and turbo codes were investigated and aspects that contribute
to convergence problems were identified. A new algorithm was proposed, capable of providing
considerable coding gain in any iterative scheme. Moreover, it was shown that
for some codes the proposed algorithm is sufficient to eliminate any sub-optimality and
perform maximum likelihood decoding. Its performance and efficiency was compared to
that of other convergence improvement schemes.
Various conditions that can be considered critical to the outcome of the iterative decoder
were also investigated and the decoding algorithm of LDPC codes was followed
analytically to verify the experimental results
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Final report on the evaluation of RRM/CRRM algorithms
Deliverable public del projecte EVERESTThis deliverable provides a definition and a complete evaluation of the RRM/CRRM algorithms selected in D11 and D15, and evolved and refined on an iterative process. The evaluation will be carried out by means of simulations using the simulators provided at D07, and D14.Preprin
Error-corrected quantum sensing
Quantum metrology has many important applications in science and technology, ranging from frequency spectroscopy to gravitational wave detection. Quantum mechanics imposes a fundamental limit on measurement precision, called the Heisenberg limit, which can be achieved for noiseless quantum systems, but is not achievable in general for systems subject to noise. Here we study how measurement precision can be enhanced through quantum error correction, a general method for protecting a quantum system from the damaging effects of noise. We find a necessary and sufficient condition for achieving the Heisenberg limit using quantum probes subject to Markovian noise, assuming that noiseless ancilla systems are available, and that fast, accurate quantum processing can be performed. When the sufficient condition is satisfied, the quantum error-correcting code achieving the best possible precision can be found by solving a semidefinite program. We also show that noiseless ancilla are not needed when the signal Hamiltonian and the error operators commute. Finally we provide two explicit, archetypal examples of quantum sensors: qubits undergoing dephasing and a lossy bosonic mode
Cloud Transmission: System Performance and Application Scenarios
[EN] Cloud Transmission (Cloud Txn) System is a
flexible multi-layer system that uses spectrum overlay technology
to simultaneously deliver multiple program streams with
different characteristics and robustness for different services
(mobile TV, HDTV and UHDTV) in one RF channel. The
transmitted signal is formed by superimposing a number of
independent signals at desired power levels, to form a multilayered
signal. The signals of different layers can have different
coding, bit rate, and robustness. For the top layer, system
parameters are chosen to provide very robust transmission that
can be used for high speed mobile broadcasting service to
portable devices. The bit rate is traded for more powerful error
correction coding and robustness so that the Signal to Noise
Ratio (SNR) threshold at the receiver is a negative value in the
range of -2 to -3 dB. The top layer is designed to withstand
combined noise, co-channel interference and multipath distortion
power levels higher than the desired signal power. The lowerlayer
signal can be DVB-T2 signal or other newly designed
system to deliver HDTV/UHDTV to fixed receivers. The system
concept is open to technological advances that might come in the
future: all new technologies, BICM/Non Uuniform-QAM, rotated
constellations, Time Frequency Slicing or MIMO techniques can
be implemented in the Cloud Txn lower (high data) rate layer.
The main focus of this paper is to thoroughly describe the
performance of this newly presented Cloud Transmission
broadcasting system.This work has been financially supported in part by the University of the
Basque Country UPV/EHU (UFI 11/30), by the Basque Government (IT-683-
13 and SAIOTEK), by the Spanish Ministry of Science and Innovation under
the project NG-RADIATE (TEC2009-14201), and by the Spanish Ministry of
Economy and Competitiveness under the project HEDYT-GBB (TEC2012-
33302
Proceedings of the NSSDC Conference on Mass Storage Systems and Technologies for Space and Earth Science Applications
The proceedings of the National Space Science Data Center Conference on Mass Storage Systems and Technologies for Space and Earth Science Applications held July 23 through 25, 1991 at the NASA/Goddard Space Flight Center are presented. The program includes a keynote address, invited technical papers, and selected technical presentations to provide a broad forum for the discussion of a number of important issues in the field of mass storage systems. Topics include magnetic disk and tape technologies, optical disk and tape, software storage and file management systems, and experiences with the use of a large, distributed storage system. The technical presentations describe integrated mass storage systems that are expected to be available commercially. Also included is a series of presentations from Federal Government organizations and research institutions covering their mass storage requirements for the 1990's
- …