1,077 research outputs found

    Sparse Signal Processing Concepts for Efficient 5G System Design

    Full text link
    As it becomes increasingly apparent that 4G will not be able to meet the emerging demands of future mobile communication systems, the question what could make up a 5G system, what are the crucial challenges and what are the key drivers is part of intensive, ongoing discussions. Partly due to the advent of compressive sensing, methods that can optimally exploit sparsity in signals have received tremendous attention in recent years. In this paper we will describe a variety of scenarios in which signal sparsity arises naturally in 5G wireless systems. Signal sparsity and the associated rich collection of tools and algorithms will thus be a viable source for innovation in 5G wireless system design. We will discribe applications of this sparse signal processing paradigm in MIMO random access, cloud radio access networks, compressive channel-source network coding, and embedded security. We will also emphasize important open problem that may arise in 5G system design, for which sparsity will potentially play a key role in their solution.Comment: 18 pages, 5 figures, accepted for publication in IEEE Acces

    ISI Cancellation Using Blind Equalizer Based on DBC Model for MIMO-RFID Reader Reception

    Get PDF
    Under the dyadic backscatter channel (DBC) model, a conventional zero forcing (ZF) and minimum mean square error (MMSE) method for MIMO-RFID reader reception are not able to be rapidly cancelled inter-symbol interference (ISI) because of the error of postpreamble transmission. In order to achieve the ISI cancellation, the conventional method of ZF and MMSE are proposed to resolve a convergence rate without postpreamble by using a constant modulus algorithm (CMA). Depending on the cost function, the CMA is used which based on second order statistics to estimate the channel statement of channel transfer function. Furthermore, the multiple-tag detection is also considered under the assumption of the maximum likelihood estimation. The comparison of the conventional method and the proposed method is analyzed by using computer simulation and experimental data. We can see that the proposed method is better than the conventional method with a faster ISI cancelling and a lower bit error rate (BER) improving as up to 12 tags

    Interference Suppression in WCDMA with Adaptive Thresholding based Decision Feedback Equaliser

    Get PDF
    WCDMA is considered as one of the 3G wireless standards by 3GPP. Capacity calculation shows that WCDMA systems have more capacity compared to any other multiple access technique such as time division multiple access (TDMA) or frequency division multiple access (FDMA). So it is widely used. Rake receivers are used for the detection of transmitted data in case of WCDMA communication systems due to its resistance to multipath fading. But rake receiver treat multiuser interference (MUI) as AWGN and have limitation in overcoming the effect of multiple access interference (MAI) when the SNR is high. A de-correlating matched filter has been used in this thesis, which eliminates and improves system performance. But the given receiver works well only in the noise free environment. A DFE, compared to linear equaliser, gives better performance at severe ISI condition. The only problem in this equalisation technique is to select the number of symbols that are to be fed back. This thesis gives an idea on multiple symbol selection, based on sparity where an adaptive thresholding algorithm is used that computes the number of symbols to feedback. Simulated results show a significant performance improvement for Regularised Rake receiver along with thresholding in terms of BER compared to a rake receiver, de-correlating rake receiver and regularised rake receiver. The performance of the receiver in different channels is also analysed

    UNDERWATER COMMUNICATIONS WITH ACOUSTIC STEGANOGRAPHY: RECOVERY ANALYSIS AND MODELING

    Get PDF
    In the modern warfare environment, communication is a cornerstone of combat competence. However, the increasing threat of communications-denied environments highlights the need for communications systems with low probability of intercept and detection. This is doubly true in the subsurface environment, where communications and sonar systems can reveal the tactical location of platforms and capabilities, subverting their covert mission set. A steganographic communication scheme that leverages existing technologies and unexpected data carriers is a feasible means of increasing assurance of communications, even in denied environments. This research works toward a covert communication system by determining and comparing novel symbol recovery schemes to extract data from a signal transmitted under a steganographic technique and interfered with by a simulated underwater acoustic channel. We apply techniques for reliably extracting imperceptible information from unremarkable acoustic events robust to the variability of the hostile operating environment. The system is evaluated based on performance metrics, such as transmission rate and bit error rate, and we show that our scheme is sufficient to conduct covert communications through acoustic transmissions, though we do not solve the problems of synchronization or equalization.Lieutenant, United States NavyApproved for public release. Distribution is unlimited
    corecore