284 research outputs found

    Efficiency of two decoders based on hash techniques and syndrome calculation over a Rayleigh channel

    Get PDF
    The explosive growth of connected devices demands high quality and reliability in data transmission and storage. Error correction codes (ECCs) contribute to this in ways that are not very apparent to the end user, yet indispensable and effective at the most basic level of transmission. This paper presents an investigation of the performance and analysis of two decoders that are based on hash techniques and syndrome calculation over a Rayleigh channel. These decoders under study consist of two main features: a reduced complexity compared to other competitors and good error correction performance over an additive white gaussian noise (AWGN) channel. When applied to decode some linear block codes such as Bose, Ray-Chaudhuri, and Hocquenghem (BCH) and quadratic residue (QR) codes over a Rayleigh channel, the experiment and comparison results of these decoders have shown their efficiency in terms of guaranteed performance measured in bit error rate (BER). For example, the coding gain obtained by syndrome decoding and hash techniques (SDHT) when it is applied to decode BCH (31, 11, 11) equals 34.5 dB, i.e., a reduction rate of 75% compared to the case where the exchange is carried out without coding and decoding process

    Multiple UAVs as relays : multi-hop single link versus multiple dual-hop links

    Get PDF
    Unmanned aerial vehicles (UAVs) have found many important applications in communications. They can serve as either aerial base stations or mobile relays to improve the quality of services. In this paper, we study the use of multiple UAVs in relaying. Considering two typical uses of multiple UAVs as relays that form either a single multi-hop link or multiple dual-hop links, we first optimize the placement the UAVs by maximizing the end-to-end signal-to-noise ratio for three useful channel models and two common relaying protocols. Based on the optimum placement, the two relaying setups are then compared in terms of outage and bit error rate. Numerical results show that the dual-hop multi-link option better than the multi-hop single link option when the air-to-ground path loss parameters depend on the UAV positions. Otherwise, the dual-hop option is only better when the source-to-destination distance small. Also, decode-and-forward UAVs provide better performances than amplify-and-forward UAVs. The investigation also reveals the effects of important system parameters on the optimum UAV positions and the relaying performances to provide useful design guidelines

    Unified Performance Analysis of Near and Far User in Downlink NOMA System over η - μ Fading Channel

    Get PDF
    The non-orthogonal multiple access (NOMA) scheme is considered as a frontier technology to cater the requirements of 5G and beyond 5G (B5G) communication systems. To fully exploit the essence of NOMA, it is very important to explore the behavior of NOMA users over the most realistic nonhomogenous fading conditions. In this paper, we derive unified closed-form expressions of the basic performance metrics of the NOMA users. Their performance is evaluated in terms of average bit error rate (ABER), average channel capacity (ACC) and outage probability (OP) over η−μ fading channel. These expressions are in terms of popular functions, such as Meijer G-function and Gauss hypergeometric function, leading to their versatile use in analytical research. Unlike the existing outage probability expressions in terms of Yacoub integral, the derived expressions are easier to implement in software packages like MATLAB. Moreover, we compare the obtained results with a reference system, consisting of genie-aided NOMA system. We interpret that genie-aided performance results provide benchmark bounds for the metrics. Extensive simulations are carried out to validate the derived analytical expressions

    OUTAGE PERFORMANCE OF MULTI-BRANCH SC RECEIVER OVER CORRELATED WEIBULL CHANNEL IN THE PRESENCE OF CORRELATED RAYLEIGH CO-CHANNEL INTERFERENCE

    Get PDF
    The aim of this paper is to consider the performance of wireless communication system with signal-to interference ratio (SIR) based multiple-branches selection combining (SC) receiver. The proposed system operates over correlated Weibull multipath environment, in the presence of co-channel interference (CCI) subjected to correlated Rayleigh multipath fading. SC diversity technique is used to reduce the effects of multipath fading and CCI on the system performance. Infinite-series expression for outage probability (OP) in terms of Meijer G functions is derived. Further, numerical results are graphically presented and discussed to show the influence of fading parameters on outage probability

    Secrecy Performance Analysis of Location-Based Beamforming in Rician Wiretap Channels

    Get PDF
    We propose a new optimal Location-Based Beamforming (LBB) scheme for the wiretap channel, where both the main channel and the eavesdropper's channel are subject to Rician fading. In our LBB scheme the two key inputs are the location of the legitimate receiver and the location of the potential eavesdropper. Notably, our scheme does not require as direct inputs any channel state information of the main channel or the eavesdropper's channel, making it easy to deploy in a host of application settings in which the location inputs are known. Our beamforming solution assumes a multiple-antenna transmitter, a multiple-antenna eavesdropper, and a single-antenna receiver, and its aim is to maximize the physical layer security of the channel. To obtain our solution we first derive the secrecy outage probability of the LBB scheme in a closed-form expression that is valid for arbitrary values of the Rician K-factors of the main channel and the eavesdropper's channel. Using this expression we then determine the location-based beamformer solution that minimizes the secrecy outage probability. To assess the usefulness of our new scheme, and to quantify the value of the location information to the beamformer, we compare our scheme to other schemes, some of which do not utilize any location information. Our new beamformer solution provides optimal physical layer security for a wide range of location-based applications.Comment: 10 pages, 6 figure
    corecore