46 research outputs found

    Wavelet-based multi-carrier code division multiple access systems

    Get PDF
    EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Ultra Wideband

    Get PDF
    Ultra wideband (UWB) has advanced and merged as a technology, and many more people are aware of the potential for this exciting technology. The current UWB field is changing rapidly with new techniques and ideas where several issues are involved in developing the systems. Among UWB system design, the UWB RF transceiver and UWB antenna are the key components. Recently, a considerable amount of researches has been devoted to the development of the UWB RF transceiver and antenna for its enabling high data transmission rates and low power consumption. Our book attempts to present current and emerging trends in-research and development of UWB systems as well as future expectations

    High Performance Signal Processing-Based Collision Resolution for Random Access Schemes

    Get PDF
    Els darrers anys han experimentat un augment de la demanda de serveis interactius per satèl·lit per al gran consum, cobrint serveis fixes i mòbils, tal i com accés de banda ampla, comunicacions màquina-màquina (M2M), supervisió, control i adquisició de dades (SCADA), transaccions i aplicacions de seguretat crítiques. Aquestes xarxes de comunicacions es caracteritzen per tenir una gran població d’usuaris compartint l’amplada de banda amb unes condicions de tràfic molt dinàmiques. Concretament, en el canal de retorn (de l’usuari a la xarxa) de xarxes d’accés de banda ampla, els usuaris residencials generen grans ràfegues de tràfic amb períodes d’inactivitat freqüents. Una situació similar succeeix en xarxes de comunicacions mòbils per satèl·lit, on una gran població de terminals generen transmissions infreqüents de senyalització, serveis basats en la localització or altres aplicacions de missatgeria. Aquests serveis requereixen el desenvolupament de protocols d’accés múltiple eficients que puguin operar en les condicions descrites anteriorment. Els protocols d´accés aleatori són bons candidats per servir tràfic poc predictiu, amb transmissions infreqüents així com sensibles amb el retard. A més, els protocols d´accés aleatori suporten un gran nombre de terminals compartint el canal de comunicacions i requereixen poca complexitat en el terminals. El protocols d´accés aleatori han estat àmpliament estudiats i desplegats en xarxes terrestres, però les seves prestacions són pobres en el entorn satèl·lital, que està caracteritzat per retards de propagació molt grans. Avui en dia, el seu ús en les xarxes de comunicacions per satèl·lit està principalment limitat a la senyalització d’inici de sessió, transmissió de paquets de control i en alguns casos a la transmissió de petits volums de dades amb unes eficiència d’utilització del canal molt baixa. Aquesta tesi proposa tres noves tècniques d’accés aleatori, bens adaptades per proveir els serveis esmentats anteriorment en un entorn satèl·lital, amb altes prestacions i una complexitat en el terminal d’usuari reduïda. Les noves tècniques d’accés aleatori són Contention Resolution Diversity Slotted Aloha (CRDSA), Asynchronous Contention Resolution Diversity Aloha (ACRDA) i Enhanced Spread Spectrum Aloha (E-SSA), adaptades per un tipus d’accés ranurat, asíncron i d’espectre eixamplat respectivament. Les tres tècniques utilitzen una codificació de canal (FEC) robusta, capaç d’operar en front de interferències elevades, que són típiques en l’accés aleatori, i d’un mecanisme de cancel·lació successiva d’interferència que s’implementa en el receptor sobre els paquets descodificats satisfactòriament. Els nous protocols obtenen un throughput normalitzat superior a 1 bit/s/Hz amb una tassa de pèrdua de paquets inferior a 10-3, el qual representa un factor de millora de 1000 respecte a protocols d’accés aleatori tradicionals com l’ALOHA ranurat. Les prestacions de les noves tècniques d’accés aleatori has estat analitzades per mitjà de simulacions, així com amb nou models analítics desenvolupats en aquesta tesi capaços de caracteritzar el tràfic, la distribució estadística de la potència dels paquets, les prestacions de la codificació de canal (FEC) i el procés de cancel·lació d’interferència successiva.Los últimos años han experimentado un crecimiento de la demanda de servicios interactivos por satélite para el gran consumo, cubriendo servicios fijos i móviles, como el acceso de banda ancha, comunicaciones máquina a máquina (M2M), supervisión, control y adquisición de datos (SCADA), transacciones i aplicaciones criticas de seguridad. Estas redes de comunicaciones se caracterizan por tener una gran población de usuarios compartiendo el ancho de banda en unas condiciones de tráfico muy dinámicas. Concretamente, en el canal de retorno (del usuario a la red) de redes de acceso de banda ancha, los usuarios residenciales generan grandes ráfagas de tráfico con periodos frecuentes de inactividad. Una situación similar ocurre en las redes de comunicaciones móviles por satélite, donde una gran población de terminales generan transmisiones infrecuentes de señalización, servicios basados en la localización u otras aplicaciones me mensajería. Estos servicios requieren el desarrollo de protocolos de acceso múltiple eficientes capaces de operar en las condiciones descritas anteriormente. Los protocolos de acceso aleatorio son buenos candidatos para servir el tráfico poco predictivo, con transmisiones infrecuentes así como sensibles al retardo. Además, los protocolos de acceso soportan un gran número de terminales compartiendo el canal de comunicaciones y requieren poca complejidad en los terminales. Los protocolos de acceso aleatorio han estado ampliamente estudiados i desplegados en las redes terrestres, pero sus prestaciones son pobres en el entorno satelital, que se caracteriza por retardos de comunicaciones muy elevados. Hoy en día, su uso en la redes de comunicaciones por satélite está principalmente limitado a la señalización de inicio de sesión, transmisión de pequeños volumenes de datos con eficiencia de utilización del canal muy baja. Esta tesis propone tres nuevas técnicas de acceso aleatorio bien adaptadas para proveer los servicios mencionados anteriormente en un entorno de comunicaciones por satélite, con altas prestaciones y una complejidad en el terminal de usuario reducida. Las nuevas técnicas de acceso aleatorio son Contention Resolution Diversity Slotted Aloha (CRDSA), Asynchronous Contention Resolution Diversity Aloha (ACRDA) y Enhanced Spread Spectrum Aloha (E-SSA), adaptadas para un tipo de acceso ranurado, asíncrono y de espectro ensanchado respectivamente. Las tres técnicas utilizan una codificación de canal (FEC) robusta, capaz de operar en condiciones de interferencia elevadas, que son típicas en el acceso aleatorio, y de un mecanismo de cancelación sucesiva de interferencias que se implementa en el receptor sobre los paquetes que han sido decodificados satisfactoriamente. Los nuevos protocolos obtienen un throughput normalizado superior a 1 bit/s/Hz con una tasa de pérdida de paquetes inferior a 10-3, lo cual representa un factor de mejora de 1000 respecto a los protocolos de acceso aleatorio tradicionales como el ALOHA ranurado. Las prestaciones de las nuevas técnicas de acceso aleatorio han sido analizadas con simulaciones así como con nuevos modelos analíticos desarrollados en esta tesis, capaces de caracterizar el tráfico, la distribución estadística de la potencia de los paquetes, las prestaciones de la codificación de canal (FEC) y el proceso de cancelación sucesiva de interferencias.Over the past years there has been a fast growing demand for low-cost interactive satellite terminals supporting both fixed and mobile services, such as consumer broadband access, machine-to-machine communications (M2M), supervisory control and data acquisition (SCADA), transaction and safety of life applications. These networks, are generally characterized by a large population of terminals sharing the available resources under very dynamic traffic conditions. In particular, in the return link (user to network) of commercial satellite broadband access networks, residential users are likely to generate a large amount of low duty cycle bursty traffic with extended inactivity periods. A similar situation occurs in satellite mobile networks whereby a large number of terminals typically generate infrequent packets for signaling transmission as well for position reporting or other messaging applications. These services call for the development of efficient multiple access protocols able to cope with the above operating conditions. Random Access (RA) techniques are by nature, good candidates for the less predictive, low duty cycle as well as time sensitive return link traffic. Besides, RA techniques are capable of supporting large population of terminals sharing the same capacity and require low terminal complexity. RA schemes have been widely studied and deployed in terrestrial networks, but do not perform well in the satellite environment, which is characterized by very long propagation delays. Today, their use in satellite networks is mainly limited to initial network login, the transmission of control packets, and in some cases, for the transmission of very small volumes of data with very low channel utilization. This thesis proposes three novel RA schemes well suited for the provision of the above-mentioned services over a satellite environment with high performance and low terminal complexity. The new RA schemes are Contention Resolution Diversity Slotted Aloha (CRDSA), Asynchronous Contention Resolution Diversity Aloha (ACRDA) and Enhanced Spread Spectrum Aloha (E-SSA), suited for slotted, unslotted and spread spectrum-based systems respectively. They all use strong Forward Error Correction (FEC) codes, able to cope with heavy co-channel interference typically present in RA, and successive interference cancellation implemented over the successfully decoded packets. The new schemes achieve a normalized throughput above 1 bit/s/Hz for a packet loss ratio below 10-3, which represents a 1000-fold increase compared to Slotted ALOHA. The performance of the proposed RA schemes has been analyzed by means of detailed simulations as well as novel analytical frameworks that characterize traffic and packets power statistical distributions, the performance of the FEC coding as well as the iterative interference cancellation processing at the receiver

    Proceedings of the Third International Mobile Satellite Conference (IMSC 1993)

    Get PDF
    Satellite-based mobile communications systems provide voice and data communications to users over a vast geographic area. The users may communicate via mobile or hand-held terminals, which may also provide access to terrestrial cellular communications services. While the first and second International Mobile Satellite Conferences (IMSC) mostly concentrated on technical advances, this Third IMSC also focuses on the increasing worldwide commercial activities in Mobile Satellite Services. Because of the large service areas provided by such systems, it is important to consider political and regulatory issues in addition to technical and user requirements issues. Topics covered include: the direct broadcast of audio programming from satellites; spacecraft technology; regulatory and policy considerations; advanced system concepts and analysis; propagation; and user requirements and applications

    Engineering Education and Research Using MATLAB

    Get PDF
    MATLAB is a software package used primarily in the field of engineering for signal processing, numerical data analysis, modeling, programming, simulation, and computer graphic visualization. In the last few years, it has become widely accepted as an efficient tool, and, therefore, its use has significantly increased in scientific communities and academic institutions. This book consists of 20 chapters presenting research works using MATLAB tools. Chapters include techniques for programming and developing Graphical User Interfaces (GUIs), dynamic systems, electric machines, signal and image processing, power electronics, mixed signal circuits, genetic programming, digital watermarking, control systems, time-series regression modeling, and artificial neural networks

    Physical layer identification: methodology, security, and origin of variation

    Get PDF
    It is common practice to limit solutions for most problems in computer and network security to the purview of the digital domain. Certainly, digital solutions offer much in the way of addressing the security concerns associated with computer and network monitoring and access control. In many areas, however, the available techniques are limited because of their digital nature: authentication schemes are vulnerable to the theft of digital tokens; intrusion detection systems can be thwarted by spoofing or impersonating devices; forensic analysis is incapable of demonstrably tying a particular device to a specific network connection after the fact; and assurance monitoring systems can only provide notification of failures rather than impending failures. In order to address these concerns researchers have proposed, in work falling under the general heading of physical layer identification (PLI), that the signaling behavior of digital devices manifested at the physical layer be used for identification and monitoring purposes. This work presents a secure methodology, capable of reliably identifying and tracking wired Ethernet cards of the same make and model to a high degree of accuracy, which may be used to corroborate higher layer mechanisms used in authentication and intrusion detection. A framework is also devised, and applied to this methodology, to judge the security of a PLI scheme by determining how resistant it is to forgery attacks using arbitrary waveform generators. While a PLI scheme must be resistant to attack, it must also be able to identify the preponderance of devices within a given population to be of any practical value. Therefore, a technique, based upon the signalling behaviour specified for Ethernet devices in the IEEE 802.3 standard, is set forth for estimating the theoretical number of devices the methodology is capable of distinguishing between. Finally, if it can be understood how the individual components of a device give rise to differences in device behaviour, it should be possible to not only model devices for the purposes of creating new identification and tracking methodologies, but perhaps also allow the community to determine exactly which components should be modified to create device signals resistant to forgery. With this in mind, a methodology is proposed that describes how a device component should be measured to create a model that captures its signalling behaviour, as well as how it can be determined whether or not, and to what extent, the component shapes the device\u27s identity

    Recent Advances in Signal Processing

    Get PDF
    The signal processing task is a very critical issue in the majority of new technological inventions and challenges in a variety of applications in both science and engineering fields. Classical signal processing techniques have largely worked with mathematical models that are linear, local, stationary, and Gaussian. They have always favored closed-form tractability over real-world accuracy. These constraints were imposed by the lack of powerful computing tools. During the last few decades, signal processing theories, developments, and applications have matured rapidly and now include tools from many areas of mathematics, computer science, physics, and engineering. This book is targeted primarily toward both students and researchers who want to be exposed to a wide variety of signal processing techniques and algorithms. It includes 27 chapters that can be categorized into five different areas depending on the application at hand. These five categories are ordered to address image processing, speech processing, communication systems, time-series analysis, and educational packages respectively. The book has the advantage of providing a collection of applications that are completely independent and self-contained; thus, the interested reader can choose any chapter and skip to another without losing continuity

    Colour depth-from-defocus incorporating experimental point spread function measurements

    Get PDF
    Depth-From-Defocus (DFD) is a monocular computer vision technique for creating depth maps from two images taken on the same optical axis with different intrinsic camera parameters. A pre-processing stage for optimally converting colour images to monochrome using a linear combination of the colour planes has been shown to improve the accuracy of the depth map. It was found that the first component formed using Principal Component Analysis (PCA) and a technique to maximise the signal-to-noise ratio (SNR) performed better than using an equal weighting of the colour planes with an additive noise model. When the noise is non-isotropic the Mean Square Error (MSE) of the depth map by maximising the SNR was improved by 7.8 times compared to an equal weighting and 1.9 compared to PCA. The fractal dimension (FD) of a monochrome image gives a measure of its roughness and an algorithm was devised to maximise its FD through colour mixing. The formulation using a fractional Brownian motion (mm) model reduced the SNR and thus produced depth maps that were less accurate than using PCA or an equal weighting. An active DFD algorithm to reduce the image overlap problem has been developed, called Localisation through Colour Mixing (LCM), that uses a projected colour pattern. Simulation results showed that LCM produces a MSE 9.4 times lower than equal weighting and 2.2 times lower than PCA. The Point Spread Function (PSF) of a camera system models how a point source of light is imaged. For depth maps to be accurately created using DFD a high-precision PSF must be known. Improvements to a sub-sampled, knife-edge based technique are presented that account for non-uniform illumination of the light box and this reduced the MSE by 25%. The Generalised Gaussian is presented as a model of the PSF and shown to be up to 16 times better than the conventional models of the Gaussian and pillbox

    Radio Communications

    Get PDF
    In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modified our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the field of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks
    corecore