21 research outputs found

    LIPIcs, Volume 261, ICALP 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 261, ICALP 2023, Complete Volum

    Near far resistant detection for CDMA personal communication systems.

    Get PDF
    The growth of Personal Communications, the keyword of the 90s, has already the signs of a technological revolution. The foundations of this revolution are currently set through the standardization of the Universal Mobile Telecommunication System (UMTS), a communication system with synergistic terrestrial and satellite segments. The main characteristic of the UMTS radio interface, is the provision of ISDN services. Services with higher than voice data rates require more spectrum, thus techniques that utilize spectrum as efficiently as possible are currently at the forefront of the research community interests. Two of the most spectrally efficient multiple access technologies, namely. Code Division Multiple Access (CDMA) and Time Division Multiple Access (TDMA) concentrate the efforts of the European telecommunity.This thesis addresses problems and. proposes solutions for CDMA systems that must comply with the UMTS requirements. Prompted by Viterbi's call for further extending the potential of CDMA through signal processing at the receiving end, we propose new Minimum Mean Square Error receiver architectures. MMSE detection schemes offer significant advantages compared to the conventional correlation based receivers as they are NEar FAr Resistant (NEFAR) over a wide range of interfering power levels. The NEFAR characteristic of these detectors reduces considerably the requirements of the power control loops currently found in commercial CDMA systems. MMSE detectors are also found, to have significant performance gains over other well established interference cancellation techniques like the decorrelating detector, especially in heavily loaded system conditions. The implementation architecture of MMSE receivers can be either Multiple-Input Multiple Output (MIMO) or Single-Input Single-Output. The later offers not only complexity that is comparable to the conventional detector, but also has the inherent advantage of employing adaptive algorithms which can be used to provide both the dispreading and the interference cancellation function, without the knowledge of the codes of interfering users. Furthermore, in multipath fading channels, adaptive MMSE detectors can exploit the multipath diversity acting as RAKE combiners. The later ability is distinctive to MMSE based receivers, and it is achieved in an autonomous fashion, without the knowledge of the multipath intensity profile. The communicator achieves its performance objectives by the synergy of the signal processor and the channel decoder. According to the propositions of this thesis, the form of the signal processor needs to be changed, in order to exploit the horizons of spread spectrum signaling. However, maximum likelihood channel decoding algorithms need not change. It is the way that these algorithms are utilized that needs to be revis ed. In this respect, we identify three major utilization scenarios and an attempt is made to quantify which of the three best matches the requirements of a UMTS oriented CDMA radio interface. Based on our findings, channel coding can be used as a mapping technique from the information bit to a more ''intelligent" chip, matching the ''intelligence" of the signal processor

    Maximum entropy based analysis of a DS/SSMA diversity system

    Get PDF
    D.Ing.This thesis sets out to propose and analyze a cellular Direct Sequence Spread Spectrum Multiple Access (DSjSSMA) system for the Indoor Wireless Communication (IWC) Nakagami fading channel. The up- and downlink of the system implement Differential Phase Shift Keying (DPSK) and Coherent Phase Shift Keying (CPSK) as modulation schemes respectively, and are analyzed using Maximum Entropy (MaxEnt) principles due to its reliability and accuracy. As a means to enhance system capacity and performance, different forms of diversity are investigated; for the up- and downlink, respectively, RAKE reception and Maximum Ratio Combining (MRC) diversity together with Forward Error Control (FEC) coding are assumed. Further, the validity of the Gaussian Assumption (GA) is quantified and investigated under fading and non-fading conditions by calculating the missing information, using Minimum Relative Entropy (MRE) principles between the Inter- User Interference (IUI) distribution and a Gaussian distribution of equal variance

    Synchronization with permutation codes and Reed-Solomon codes

    Get PDF
    D.Ing. (Electrical And Electronic Engineering)We address the issue of synchronization, using sync-words (or markers), for encoded data. We focus on data that is encoded using permutation codes or Reed-Solomon codes. For each type of code (permutation code and Reed-Solomon code) we give a synchronization procedure or algorithm such that synchronization is improved compared to when the procedure is not employed. The gure of merit for judging the performance is probability of synchronization (acquisition). The word acquisition is used to indicate that a sync-word is acquired or found in the right place in a frame. A new synchronization procedure for permutation codes is presented. This procedure is about nding sync-words that can be used speci cally with permutation codes, such that acceptable synchronization performance is possible even under channels with frequency selective fading/jamming, such as the power line communication channel. Our new procedure is tested with permutation codes known as distance-preserving mappings (DPMs). DPMs were chosen because they have de ned encoding and decoding procedures. Another new procedure for avoiding symbols in Reed-Solomon codes is presented. We call the procedure symbol avoidance. The symbol avoidance procedure is then used to improve the synchronization performance of Reed-Solomon codes, where known binary sync-words are used for synchronization. We give performance comparison results, in terms of probability of synchronization, where we compare Reed-Solomon with and without symbol avoidance applied

    Simulated Assessment of Interference Effects in Direct Sequence SpreadSpectrum (DSSS) QPSK Receiver

    Get PDF
    This research developed and validated a generic simulation for a direct sequence spread spectrum (DSSS), using differential phase shift keying (DPSK) and phase shift keying (PSK) modulations, providing the flexibility for assessing intentional interference effect using DSSS quadrature phase shift keying receiver (QPSK) with matched filtering as a reference. The evaluation compares a comprehensive pool of jamming waveforms at pass-band that include continuous wave (CW) interference, broad-band jamming, partial-band interference and pulsed interference. The methodology for jamming assessment included comparing the bit error rate (BER) versus required jamming to signal ratio (JSR) for different interferers using the Monte Carlo approach. This thesis also analyzes the effect of varying the jammer bandwidth for broad-band jammers including broad-band noise (BBN), frequency hopping interference (FHI), comb- spectrum interference (CSI), multi-tone jamming (MTJ), random frequency modulated interference (RFMI) and linear frequency modulated interference (LFMI). Also, the effect of changing the duty cycle for pulsed CW waveforms is compared with the worst case pulsed jamming equation. After the evaluation of different interferers, the research concludes that pulsed binary phase shift keying (BPSK) jamming is the most effective technique, whereas the CW tone jamming and CW BPSK interference result are least effective. It is also concluded that by finding an optimum bandwidth, FHI and BBN improves the required JSR by approximately 2.1 dB, RFMI and LFMI interference by 0.9 and 1.5 dB respectively. Alternately, MTJ and CSI improves their effectiveness in 4.1 dB and 3.6 dB respectively, matching the performance of the pulsed BPSK jammer

    Anales del XIII Congreso Argentino de Ciencias de la Computación (CACIC)

    Get PDF
    Contenido: Arquitecturas de computadoras Sistemas embebidos Arquitecturas orientadas a servicios (SOA) Redes de comunicaciones Redes heterogéneas Redes de Avanzada Redes inalámbricas Redes móviles Redes activas Administración y monitoreo de redes y servicios Calidad de Servicio (QoS, SLAs) Seguridad informática y autenticación, privacidad Infraestructura para firma digital y certificados digitales Análisis y detección de vulnerabilidades Sistemas operativos Sistemas P2P Middleware Infraestructura para grid Servicios de integración (Web Services o .Net)Red de Universidades con Carreras en Informática (RedUNCI
    corecore