43 research outputs found

    Partial joint processing for frequency selective channels

    Get PDF
    In this paper, we consider a static cluster of base stations where joint processing is allowed in the downlink. The partial joint processing scheme is a user-centric approach where subclusters or active sets of base stations are dynamically defined for each user in the cluster. In frequency selective channels, the definition of the subclusters or active set thresholding of base stations can be frequency adaptive (per resource block) or non-adaptive (averaged over all the resource blocks). Frequency adaptive thresholding improves the average sum-rate of the cluster, but at the cost of an increased user data interbase information exchange with respect to the non-adaptive frequency thresholding case. On the other hand, the channel state information available at the transmitter side to design the beamforming matrix is very limited and rank deficiency problems arise for low values of active set thresholding and users located close to the base station. To solve this problem, an algorithm is proposed that defines a cooperation area over the cluster where the partial joint processing scheme can be performed, frequency adaptive or non-adaptive, for a given active set threshold value

    Joint Scheduling and Power Control in Coordinated Multi-Point Clusters

    Get PDF
    In this paper, we address the problem of designing a joint scheduling and power control algorithm in a downlink coordinated multi-point (CoMP) cluster supporting CoMP joint transmission. The objective is to maximize the cell-edge throughput under per-point power constraints. By an analytical derivation, binary power control is proved to be the optimal solution for any given selected user group. Utilizing this analytical result, a centralized and a semi-distributed version of joint user selection and power control algorithms are proposed. Compared to algorithms without considering joint transmission and algorithms without considering power control, simulation results show that the proposed algorithms achieve a good trade-off between joint transmission and interference coordination, which helps to improve the cell-edge performance

    On the performance of joint processing schemes over the cluster area

    Get PDF
    En este trabajo se caracterizan tres esquemas de transmisión conjunta para el enlace descendente y se compara su rendimiento dentro de un clúster de estaciones base. La motivación de este estudio es analizar el rendimiento de estos esquemas dentro del área del clúster, como un primer paso hacia el diseño de un esquema de transmisión conjunta adaptable que soporte escenarios de uso dinámicos. Cada uno de los esquemas analizados, centralizado, parcial y distribuido, requiere una cantidad diferente de conocimiento del canal disponible en el lado del transmisor, un intercambio distinto de información entre estaciones base y la retroalimentación de los usuarios. Además, estos esquemas muestran diferentes capacidades para servir a los usuarios dependiendo de la ubicación de éstos en el área del clúster. Por lo tanto, en un escenario real, un esquema de transmisión conjunta adaptativo que englobe los tres esquemas podría ser utilizado por el clúster de estaciones base. Los resultados de la simulación muestran que, suponiendo una transmisión coherente, el esquema de transmisión conjunta centralizado supera en un 25% al esquema de transmisión conjunta parcial y con un 50% al esquema distribuido en el borde de la célula cuando se utiliza una métrica que pondera la tasa de transmisión media obtenida por la información requerida por el canal de retorno.In this paper, three joint processing schemes for the downlink are characterized and compared within a cluster of base stations. The motivation of this study is to analyze the performance of these schemes over the cluster area, as a first step towards designing an adaptive joint processing scheme supporting dynamic usage scenarios. Each one of the analyzed schemes, the centralized, partial and distributed joint processing approaches, requires a different amount of available channel knowledge at the transmitter side, inter-base information exchange and feedback from the users. In addition, these schemes show varying capabilities to serve the users depending on their location in the cluster area. Therefore, in a real scenario, an adaptive joint processing scheme encompassing the three schemes could be used by the cluster of base stations. Simulation results show that, assuming coherent transmission, the centralized joint processing scheme outperforms with 25% the partial joint processing scheme and with 50% the distributed joint processing approach in the cell edge when a backhaul-load weighted average sum-rate per cell metric is taken into account

    Joint Scheduling for Multi-Service in Coordinated Multi-Point OFDMA Networks

    Get PDF
    In this paper, the issues upon user scheduling in the downlink packet transmission for multiple services are addressed for coordinated multi-point (CoMP) OFDMA networks. We consider mixed traffic with voice over IP (VOIP) and best effort (BE) services. In order to improve cell-edge performance and guarantee diverse quality of service (QoS), a utility-based joint scheduling algorithm is proposed, which consists of two steps: ant colony optimization (ACO) based joint user selection and greedy subchannel assignment. We compare the proposed algorithm with the greedy user selection (GUC) based scheme. Via simulation results, we show that 95% of BE users are satsified with average cell-edge data rate greater than 200kbps by using either of the two algorithms. Whereas, our proposed algorithm ensures that more than 95% of VoIP users are satisfied with packet drop ratio less than 2%, compared to 78% by the GUC based algorithm

    Algorithm-Architecture Co-Design for Digital Front-Ends in Mobile Receivers

    Get PDF
    The methodology behind this work has been to use the concept of algorithm-hardware co-design to achieve efficient solutions related to the digital front-end in mobile receivers. It has been shown that, by looking at algorithms and hardware architectures together, more efficient solutions can be found; i.e., efficient with respect to some design measure. In this thesis the main focus have been placed on two such parameters; first reduced complexity algorithms to lower energy consumptions at limited performance degradation, secondly to handle the increasing number of wireless standards that preferably should run on the same hardware platform. To be able to perform this task it is crucial to understand both sides of the table, i.e., both algorithms and concepts for wireless communication as well as the implications arising on the hardware architecture. It is easier to handle the high complexity by separating those disciplines in a way of layered abstraction. However, this representation is imperfect, since many interconnected "details" belonging to different layers are lost in the attempt of handling the complexity. This results in poor implementations and the design of mobile terminals is no exception. Wireless communication standards are often designed based on mathematical algorithms with theoretical boundaries, with few considerations to actual implementation constraints such as, energy consumption, silicon area, etc. This thesis does not try to remove the layer abstraction model, given its undeniable advantages, but rather uses those cross-layer "details" that went missing during the abstraction. This is done in three manners: In the first part, the cross-layer optimization is carried out from the algorithm perspective. Important circuit design parameters, such as quantization are taken into consideration when designing the algorithm for OFDM symbol timing, CFO, and SNR estimation with a single bit, namely, the Sign-Bit. Proof-of-concept circuits were fabricated and showed high potential for low-end receivers. In the second part, the cross-layer optimization is accomplished from the opposite side, i.e., the hardware-architectural side. A SDR architecture is known for its flexibility and scalability over many applications. In this work a filtering application is mapped into software instructions in the SDR architecture in order to make filtering-specific modules redundant, and thus, save silicon area. In the third and last part, the optimization is done from an intermediate point within the algorithm-architecture spectrum. Here, a heterogeneous architecture with a combination of highly efficient and highly flexible modules is used to accomplish initial synchronization in at least two concurrent OFDM standards. A demonstrator was build capable of performing synchronization in any two standards, including LTE, WiFi, and DVB-H

    The application of artificial intelligence techniques to large distributed networks

    Get PDF
    Data accessibility and transfer of information, including the land resources information system pilot, are structured as large computer information networks. These pilot efforts include the reduction of the difficulty to find and use data, reducing processing costs, and minimize incompatibility between data sources. Artificial Intelligence (AI) techniques were suggested to achieve these goals. The applicability of certain AI techniques are explored in the context of distributed problem solving systems and the pilot land data system (PLDS). The topics discussed include: PLDS and its data processing requirements, expert systems and PLDS, distributed problem solving systems, AI problem solving paradigms, query processing, and distributed data bases

    High-Speed Elliptic Curve and Pairing-Based Cryptography

    Get PDF
    Elliptic Curve Cryptography (ECC), independently proposed by Miller [Mil86] and Koblitz [Kob87] in mid 80’s, is finding momentum to consolidate its status as the public-key system of choice in a wide range of applications and to further expand this position to settings traditionally occupied by RSA and DL-based systems. The non-existence of known subexponential attacks on this cryptosystem directly translates to shorter keylengths for a given security level and, consequently, has led to implementations with better bandwidth usage, reduced power and memory requirements, and higher speeds. Moreover, the dramatic entry of pairing-based cryptosystems defined on elliptic curves at the beginning of the new millennium has opened the possibility of a plethora of innovative applications, solving in some cases longstanding problems in cryptography. Nevertheless, public-key cryptography (PKC) is still relatively expensive in comparison with its symmetric-key counterpart and it remains an open challenge to reduce further the computing cost of the most time-consuming PKC primitives to guarantee their adoption for secure communication in commercial and Internet-based applications. The latter is especially true for pairing computations. Thus, it is of paramount importance to research methods which permit the efficient realization of Elliptic Curve and Pairing-based Cryptography on the several new platforms and applications. This thesis deals with efficient methods and explicit formulas for computing elliptic curve scalar multiplication and pairings over fields of large prime characteristic with the objective of enabling the realization of software implementations at very high speeds. To achieve this main goal in the case of elliptic curves, we accomplish the following tasks: identify the elliptic curve settings with the fastest arithmetic; accelerate the precomputation stage in the scalar multiplication; study number representations and scalar multiplication algorithms for speeding up the evaluation stage; identify most efficient field arithmetic algorithms and optimize them; analyze the architecture of the targeted platforms for maximizing the performance of ECC operations; identify most efficient coordinate systems and optimize explicit formulas; and realize implementations on x86-64 processors with an optimal algorithmic selection among all studied cases. In the case of pairings, the following tasks are accomplished: accelerate tower and curve arithmetic; identify most efficient tower and field arithmetic algorithms and optimize them; identify the curve setting with the fastest arithmetic and optimize it; identify state-of-the-art techniques for the Miller loop and final exponentiation; and realize an implementation on x86-64 processors with optimal algorithmic selection. The most outstanding contributions that have been achieved with the methodologies above in this thesis can be summarized as follows: • Two novel precomputation schemes are introduced and shown to achieve the lowest costs in the literature for different curve forms and scalar multiplication primitives. The detailed cost formulas of the schemes are derived for most relevant scenarios. • A new methodology based on the operation cost per bit to devise highly optimized and compact multibase algorithms is proposed. Derived multibase chains using bases {2,3} and {2,3,5} are shown to achieve the lowest theoretical costs for scalar multiplication on certain curve forms and for scenarios with and without precomputations. In addition, the zero and nonzero density formulas of the original (width-w) multibase NAF method are derived by using Markov chains. The application of “fractional” windows to the multibase method is described together with the derivation of the corresponding density formulas. • Incomplete reduction and branchless arithmetic techniques are optimally combined for devising high-performance field arithmetic. Efficient algorithms for “small” modular operations using suitably chosen pseudo-Mersenne primes are carefully analyzed and optimized for incomplete reduction. • Data dependencies between contiguous field operations are discovered to be a source of performance degradation on x86-64 processors. Three techniques for reducing the number of potential pipeline stalls due to these dependencies are proposed: field arithmetic scheduling, merging of point operations and merging of field operations. • Explicit formulas for two relevant cases, namely Weierstrass and Twisted Edwards curves over and , are carefully optimized employing incomplete reduction, minimal number of operations and reduced number of data dependencies between contiguous field operations. • Best algorithms for the field, point and scalar arithmetic, studied or proposed in this thesis, are brought together to realize four high-speed implementations on x86-64 processors at the 128-bit security level. Presented results set new speed records for elliptic curve scalar multiplication and introduce up to 34% of cost reduction in comparison with the best previous results in the literature. • A generalized lazy reduction technique that enables the elimination of up to 32% of modular reductions in the pairing computation is proposed. Further, a methodology that keeps intermediate results under Montgomery reduction boundaries maximizing operations without carry checks is introduced. Optimized formulas for the popular tower are explicitly stated and a detailed operation count that permits to determine the theoretical cost improvement attainable with the proposed method is carried out for the case of an optimal ate pairing on a Barreto-Naehrig (BN) curve at the 128-bit security level. • Best algorithms for the different stages of the pairing computation, including the proposed techniques and optimizations, are brought together to realize a high-speed implementation at the 128-bit security level. Presented results on x86-64 processors set new speed records for pairings, introducing up to 34% of cost reduction in comparison with the best published result. From a general viewpoint, the proposed methods and optimized formulas have a practical impact in the performance of cryptographic protocols based on elliptic curves and pairings in a wide range of applications. In particular, the introduced implementations represent a direct and significant improvement that may be exploited in performance-dominated applications such as high-demand Web servers in which millions of secure transactions need to be generated

    A Vector Channel Based Approach to MIMO Radar Waveform Design for Extended Targets

    Get PDF
    Radar systems have been used for many years for estimating, detecting, classifying, and imaging objects of interest (targets). Stealthier targets and more cluttered environments have created a need for more sophisticated radar systems to gain more precise information about the radar environment. Because modern radar systems are largely defined in software, adaptive radar systems have emerged that tailor system parameters such as the transmitted waveform and receiver filter to the target and environment in order to address this need. The basic structure of a radar system exhibits many similarities to the structure of a communication system. Recognizing the parallel composition of radar systems and information transmission systems, initial works have begun to explore the application of information theory to radar system design, but a great deal of work still remains to make a full and clear connection between the problems addressed by radar systems and communication systems. Forming a comprehensive definition of this connection between radar systems and information transmission systems and associated problem descriptions could facilitate the cross-discipline transfer of ideas and accelerate the development and improvement of new system design solutions in both fields. In particular, adaptive radar system design is a relatively new field which stands to benefit from the maturity of information theory developed for information transmission if a parallel can be drawn to clearly relate similar radar and communication problems. No known previous work has yet drawn a clear parallel between the general multiple-input multiple-output (MIMO) radar system model considering both the detection and estimation of multiple extended targets and a similar multiuser vector channel information transmission system model. The goal of this dissertation is to develop a novel vector channel framework to describe a MIMO radar system and to study information theoretic adaptive radar waveform design for detection and estimation of multiple radar targets within this framework. Specifically, this dissertation first provides a new compact vector channel model for representing a MIMO radar system which illustrates the parallel composition of radar systems and information transmission systems. Second, using the proposed framework this dissertation contributes a compressed sensing based information theoretic approach to waveform design for the detection of multiple extended targets in noiseless and noisy scenarios. Third, this dissertation defines the multiple extended target estimation problem within the framework and proposes a greedy signal to interference-plus-noise ratio (SINR) maximizing procedure based on a similar approach developed for a collaborative multibase wireless communication system to optimally design wave forms in this scenario
    corecore