21 research outputs found
LIPIcs, Volume 261, ICALP 2023, Complete Volume
LIPIcs, Volume 261, ICALP 2023, Complete Volum
Near far resistant detection for CDMA personal communication systems.
The growth of Personal Communications, the keyword of the 90s, has already the signs of a technological revolution. The foundations of this revolution are currently set through the standardization of the Universal Mobile Telecommunication System (UMTS), a communication system with synergistic terrestrial and satellite segments. The main characteristic of the UMTS radio interface, is the provision of ISDN services. Services with higher than voice data rates require more spectrum, thus techniques that utilize spectrum as efficiently as possible are currently at the forefront of the research community interests. Two of the most spectrally efficient multiple access technologies, namely. Code Division Multiple Access (CDMA) and Time Division Multiple Access (TDMA) concentrate the efforts of the European telecommunity.This thesis addresses problems and. proposes solutions for CDMA systems that must comply with the UMTS requirements. Prompted by Viterbi's call for further extending the potential of CDMA through signal processing at the receiving end, we propose new Minimum Mean Square Error receiver architectures. MMSE detection schemes offer significant advantages compared to the conventional correlation based receivers as they are NEar FAr Resistant (NEFAR) over a wide range of interfering power levels. The NEFAR characteristic of these detectors reduces considerably the requirements of the power control loops currently found in commercial CDMA systems. MMSE detectors are also found, to have significant performance gains over other well established interference cancellation techniques like the decorrelating detector, especially in heavily loaded system conditions. The implementation architecture of MMSE receivers can be either Multiple-Input Multiple Output (MIMO) or Single-Input Single-Output. The later offers not only complexity that is comparable to the conventional detector, but also has the inherent advantage of employing adaptive algorithms which can be used to provide both the dispreading and the interference cancellation function, without the knowledge of the codes of interfering users. Furthermore, in multipath fading channels, adaptive MMSE detectors can exploit the multipath diversity acting as RAKE combiners. The later ability is distinctive to MMSE based receivers, and it is achieved in an autonomous fashion, without the knowledge of the multipath intensity profile. The communicator achieves its performance objectives by the synergy of the signal processor and the channel decoder. According to the propositions of this thesis, the form of the signal processor needs to be changed, in order to exploit the horizons of spread spectrum signaling. However, maximum likelihood channel decoding algorithms need not change. It is the way that these algorithms are utilized that needs to be revis ed. In this respect, we identify three major utilization scenarios and an attempt is made to quantify which of the three best matches the requirements of a UMTS oriented CDMA radio interface. Based on our findings, channel coding can be used as a mapping technique from the information bit to a more ''intelligent" chip, matching the ''intelligence" of the signal processor
Maximum entropy based analysis of a DS/SSMA diversity system
D.Ing.This thesis sets out to propose and analyze a cellular Direct Sequence Spread Spectrum Multiple Access (DSjSSMA) system for the Indoor Wireless Communication (IWC) Nakagami fading channel. The up- and downlink of the system implement Differential Phase Shift Keying (DPSK) and Coherent Phase Shift Keying (CPSK) as modulation schemes respectively, and are analyzed using Maximum Entropy (MaxEnt) principles due to its reliability and accuracy. As a means to enhance system capacity and performance, different forms of diversity are investigated; for the up- and downlink, respectively, RAKE reception and Maximum Ratio Combining (MRC) diversity together with Forward Error Control (FEC) coding are assumed. Further, the validity of the Gaussian Assumption (GA) is quantified and investigated under fading and non-fading conditions by calculating the missing information, using Minimum Relative Entropy (MRE) principles between the Inter- User Interference (IUI) distribution and a Gaussian distribution of equal variance
Synchronization with permutation codes and Reed-Solomon codes
D.Ing. (Electrical And Electronic Engineering)We address the issue of synchronization, using sync-words (or markers), for encoded data. We focus on data that is encoded using permutation codes or Reed-Solomon codes. For each type of code (permutation code and Reed-Solomon code) we give a synchronization procedure or algorithm such that synchronization is improved compared to when the procedure is not employed. The gure of merit for judging the performance is probability of synchronization (acquisition). The word acquisition is used to indicate that a sync-word is acquired or found in the right place in a frame. A new synchronization procedure for permutation codes is presented. This procedure is about nding sync-words that can be used speci cally with permutation codes, such that acceptable synchronization performance is possible even under channels with frequency selective fading/jamming, such as the power line communication channel. Our new procedure is tested with permutation codes known as distance-preserving mappings (DPMs). DPMs were chosen because they have de ned encoding and decoding procedures. Another new procedure for avoiding symbols in Reed-Solomon codes is presented. We call the procedure symbol avoidance. The symbol avoidance procedure is then used to improve the synchronization performance of Reed-Solomon codes, where known binary sync-words are used for synchronization. We give performance comparison results, in terms of probability of synchronization, where we compare Reed-Solomon with and without symbol avoidance applied
Simulated Assessment of Interference Effects in Direct Sequence SpreadSpectrum (DSSS) QPSK Receiver
This research developed and validated a generic simulation for a direct sequence spread spectrum (DSSS), using differential phase shift keying (DPSK) and phase shift keying (PSK) modulations, providing the flexibility for assessing intentional interference effect using DSSS quadrature phase shift keying receiver (QPSK) with matched filtering as a reference. The evaluation compares a comprehensive pool of jamming waveforms at pass-band that include continuous wave (CW) interference, broad-band jamming, partial-band interference and pulsed interference. The methodology for jamming assessment included comparing the bit error rate (BER) versus required jamming to signal ratio (JSR) for different interferers using the Monte Carlo approach. This thesis also analyzes the effect of varying the jammer bandwidth for broad-band jammers including broad-band noise (BBN), frequency hopping interference (FHI), comb- spectrum interference (CSI), multi-tone jamming (MTJ), random frequency modulated interference (RFMI) and linear frequency modulated interference (LFMI). Also, the effect of changing the duty cycle for pulsed CW waveforms is compared with the worst case pulsed jamming equation. After the evaluation of different interferers, the research concludes that pulsed binary phase shift keying (BPSK) jamming is the most effective technique, whereas the CW tone jamming and CW BPSK interference result are least effective. It is also concluded that by finding an optimum bandwidth, FHI and BBN improves the required JSR by approximately 2.1 dB, RFMI and LFMI interference by 0.9 and 1.5 dB respectively. Alternately, MTJ and CSI improves their effectiveness in 4.1 dB and 3.6 dB respectively, matching the performance of the pulsed BPSK jammer
Anales del XIII Congreso Argentino de Ciencias de la Computación (CACIC)
Contenido:
Arquitecturas de computadoras
Sistemas embebidos
Arquitecturas orientadas a servicios (SOA)
Redes de comunicaciones
Redes heterogéneas
Redes de Avanzada
Redes inalámbricas
Redes móviles
Redes activas
Administración y monitoreo de redes y servicios
Calidad de Servicio (QoS, SLAs)
Seguridad informática y autenticación, privacidad
Infraestructura para firma digital y certificados digitales
Análisis y detección de vulnerabilidades
Sistemas operativos
Sistemas P2P
Middleware
Infraestructura para grid
Servicios de integración (Web Services o .Net)Red de Universidades con Carreras en Informática (RedUNCI