214 research outputs found

    ISOMORPHIC SIGNAL ENSEMBLES AND THEIR APPLICATION IN ASYNC-ADDRESS SYSTEMS

    Get PDF
    The object of consideration is async-address systems using code division of subscribers. The subject of the analysis is quasi-orthogonal ensembles of signals based on code sequences that have normalized characteristics of cross-correlation functions (CCF) and provide reliable separation of subscribers (objects) when exposed to imitation and signal-like interference. The purpose of the analysis is to create a model and methodology for construction a set of the best code sequences ensembles having the ability to quickly change the instance of the set to counter imitation and signal-like interference. The solution is based on algebraic models of code sequences and their CCF representation. The article proposes a comprehensive technique to construct signal ensembles set having normalized characteristics of the CCF. The quality of the primary ensemble of code sequences is ensured by the procedure for calculating the CCF optimized in the number of look over options. Optimization is based on the basic properties of the Galois field, in particular, on the Galois fields’ isomorphism property. It provides a significant reduction in calculations when choosing the primary ensemble of code sequences with the specified properties of the CCF. The very choice of the best (largest in size) code sequences ensemble relies on the solution of one of the classical combinatorics problems – searching for maximal clique on a graph. The construction of signals ensembles set having normalized characteristics of the CCF is ensured by the use of special combinatorial procedures and algorithms based on the multiplicative properties of Galois fields. An analysis of the effectiveness of known and proven procedures searching for maximal clique is also performed in this article. The work results will be useful in the design of infocommunication systems using complex signals with a large base and variable structure to provide protection from signal structure research and the effects of imitation and signal-like interferenc

    Secure, reliable, and efficient communication over the wiretap channel

    Get PDF
    Secure wireless communication between devices is essential for modern communication systems. Physical-layer security over the wiretap channel may provide an additional level of secrecy beyond the current cryptographic approaches. Given a sender Alice, a legitimate receiver Bob, and a malicious eavesdropper Eve, the wiretap channel occurs when Eve experiences a worse signal-to-noise ratio than Bob. Previous study of the wiretap channel has tended to make assumptions that ignore the reality of wireless communication. This thesis presents a study of short block length codes with the aim of both reliability for Bob and confusion for Eve. The standard approach to wiretap coding is shown to be very inefficient for reliability. Quantifying Eve's confusion in terms of entropy is not solved in many cases, though it is possible for codes with a moderate complexity trellis representation. Using error rate arguments, error correcting codes with steep performance curves turn out to be desirable both for reliability and confusion.Masteroppgave i informatikkINF399MAMN-INFMAMN-PRO

    A Study on the Impact of Locality in the Decoding of Binary Cyclic Codes

    Full text link
    In this paper, we study the impact of locality on the decoding of binary cyclic codes under two approaches, namely ordered statistics decoding (OSD) and trellis decoding. Given a binary cyclic code having locality or availability, we suitably modify the OSD to obtain gains in terms of the Signal-To-Noise ratio, for a given reliability and essentially the same level of decoder complexity. With regard to trellis decoding, we show that careful introduction of locality results in the creation of cyclic subcodes having lower maximum state complexity. We also present a simple upper-bounding technique on the state complexity profile, based on the zeros of the code. Finally, it is shown how the decoding speed can be significantly increased in the presence of locality, in the moderate-to-high SNR regime, by making use of a quick-look decoder that often returns the ML codeword.Comment: Extended version of a paper submitted to ISIT 201

    BPS States in Omega Background and Integrability

    Full text link
    We reconsider string and domain wall central charges in N=2 supersymmetric gauge theories in four dimensions in presence of the Omega background in the Nekrasov-Shatashvili (NS) limit. Existence of these charges entails presence of the corresponding topological defects in the theory - vortices and domain walls. In spirit of the 4d/2d duality we discuss the worldsheet low energy effective theory living on the BPS vortex in N=2 Supersymmetric Quantum Chromodynamics (SQCD). We discuss some aspects of the brane realization of the dualities between various quantum integrable models. A chain of such dualities enables us to check the AGT correspondence in the NS limit.Comment: 48 pages, 10 figures, minor changes, references added, typos correcte

    Generalized discrete Fourier transform with non-linear phase : theory and design

    Get PDF
    Constant modulus transforms like discrete Fourier transform (DFT), Walsh transform, and Gold codes have been successfully used over several decades in various engineering applications, including discrete multi-tone (DMT), orthogonal frequency division multiplexing (OFDM) and code division multiple access (CDMA) communications systems. Among these popular transforms, DFT is a linear phase transform and widely used in multicarrier communications due to its performance and fast algorithms. In this thesis, a theoretical framework for Generalized DFT (GDFT) with nonlinear phase exploiting the phase space is developed. It is shown that GDFT offers sizable correlation improvements over DFT, Walsh, and Gold codes. Brute force search algorithm is employed to obtain orthogonal GDFT code sets with improved correlations. Design examples and simulation results on several channel types presented in the thesis show that the proposed GDFT codes, with better auto and cross-correlation properties than DFT, lead to better bit-error-rate performance in all multi-carrier and multi-user communications scenarios investigated. It is also highlighted how known constant modulus code families such as Walsh, Walsh-like and other codes are special solutions of the GDFT framework. In addition to theoretical framework, practical design methods with computationally efficient implementations of GDFT as enhancements to DFT are presented in the thesis. The main advantage of the proposed method is its ability to design a wide selection of constant modulus orthogonal code sets based on the desired performance metrics mimicking the engineering .specs of interest. Orthogonal Frequency Division Multiplexing (OFDM) is a leading candidate to be adopted for high speed 4G wireless communications standards due to its high spectral efficiency, strong resistance to multipath fading and ease of implementation with Fast Fourier Transform (FFT) algorithms. However, the main disadvantage of an OFDM based communications technique is of its high PAPR at the RF stage of a transmitter. PAPR dominates the power (battery) efficiency of the radio transceiver. Among the PAPR reduction methods proposed in the literature, Selected Mapping (SLM) method has been successfully used in OFDM communications. In this thesis, an SLM method employing GDFT with closed form phase functions rather than fixed DFT for PAPR reduction is introduced. The performance improvements of GDFT based SLM PAPR reduction for various OFDM communications scenarios including the WiMAX standard based system are evaluated by simulations. Moreover, an efficient implementation of GDFT based SLM method reducing computational cost of multiple transform operations is forwarded. Performance simulation results show that power efficiency of non-linear RF amplifier in an OFDM system employing proposed method significantly improved

    802.11 Payload Iterative decoding between multiple transmission attempts

    Get PDF
    Abstract. The institute of electrical and electronics engineers (IEEE) 802.11 standard specifies widely used technology for wireless local area networks (WLAN). Standard specifies high-performance physical and media access control (MAC) layers for a distributed network but lacks an effective hybrid automatic repeat request (HARQ). Currently, the standard specifies forward error correction (FEC), error detection (ED), and automatic repeat request (ARQ), but in case of decoding errors, the previously transmitted information is not used when decoding the retransmitted packet. This is called Type 1 HARQ. Type 1 HARQ uses received energy inefficiently, but the simple implementation makes it an attractive solution. Unfortunately, research applying more sophisticated HARQ schemes on top of IEEE 802.11 is limited. In this Master’s Thesis, a novel HARQ technology based on packet retransmissions that can be decoded in a turbo-like manner, keeping as much as possible compatibility with vanilla 802.11, is proposed. The proposed technology is simulated with both the IEEE 802.11 code and with the robust, efficient and smart communication in unpredictable environments (RESCUE) code. An additional interleaver is added before the convolutional encoder in the proposed technology, interleaving either the whole frame or only the payload to enable effective iterative decoding. For received frames, turbo-like iterations are done between initially transmitted packet copy and retransmissions. Results are compared against the non-iterative combining method maximizing signal-to-noise ratio (SNR), maximum ratio combining (MRC). The main design goal for this technology is to maintain compatibility with the 802.11 standard while allowing efficient HARQ. Other design goals are range extension, higher throughput, and better performance in terms of bit error rate (BER) and frame error rate (FER). This technology can be used for range extension at low SNR range and may provide up to 4 dB gain at medium SNR range compared to MRC. At high SNR, technology can reduce the penalty from retransmission allowing higher average modulation and coding scheme (MCS). However, these gains come with the cost of computational complexity from the iterative decoding. The main limiting factors of the proposed technology are decoding errors in the header and the scrambler area, and resource-hungry-processing. In simulations, perfect synchronization and packet detection is assumed, but in reality, especially at low SNR, packet detection and synchronization would be challenging. 802.11 pakettien iteratiivinen dekoodaus lähetysten välillä. Tiivistelmä. IEEE 802.11-standardi määrittelee yleisesti käytetyn teknologian langattomille lähiverkoille. Standardissa määritellään tehokas fyysinen- ja verkkoliityntäkerros hajautetuille verkoille, mutta siitä puuttuu tehokas yhdistetty automaattinen uudelleenlähetys. Nykyisellään standardi määrittelee virheenkorjaavan koodin, virheellisen paketin tunnistuksen sekä automaattisen uudelleenlähetyksen, mutta aikaisemmin lähetetyn paketin informaatiota ei käytetä hyväksi uudelleenlähetystilanteessa. Tämä menetelmä tunnetaan tyypin yksi yhdistettynä automaattisena uudelleenlähetyksenä. Tyypin yksi yhdistetty automaattinen uudelleenlähetys käyttää vastaanotettua signaalia tehottomasti, mutta yksinkertaisuus tekee siitä houkuttelevan vaihtoehdon. Valitettavasti edistyneempien uudelleenlähetysvaihtoehtojen tutkimusta 802.11-standardiin on rajoitetusti. Tässä diplomityössä esitellään uusi yhdistetty uudelleenlähetysteknologia, joka pohjautuu pakettien uudelleenlähetykseen, sallien turbo-tyylisen dekoodaamisen säilyttäen mahdollisimman hyvän taaksepäin yhteensopivuutta alkuperäisen 802.11-standardin kanssa. Tämä teknologia on simuloitu käyttäen sekä 802.11- että nk. RESCUE-virheenkorjauskoodia. Teknologiassa uusi lomittaja on lisätty konvoluutio-enkoodaajan eteen, sallien tehokkaan iteratiivisen dekoodaamisen, lomittaen joko koko paketin tai ainoastaan hyötykuorman. Vastaanotetuille paketeille tehdään turbo-tyyppinen iteraatio alkuperäisen vastaanotetun kopion ja uudelleenlähetyksien välillä. Tuloksia vertaillaan eiiteratiiviseen yhdistämismenetelmään, maksimisuhdeyhdistelyyn, joka maksimoi yhdistetyn signaali-kohinasuhteen. Tärkeimpänä suunnittelutavoitteena tässä työssä on tehokas uudelleenlähetysmenetelmä, joka ylläpitää taaksepäin yhteensopivuutta IEEE 802.11-standardin kanssa. Muita tavoitteita ovat kantaman lisäys, nopeampi yhteys ja matalampi bitti- ja pakettivirhesuhde. Kehitettyä teknologiaa voidaan käyttää kantaman lisäykseen matalan signaalikohinasuhteen vallitessa ja se on jopa 4 dB parempi kohtuullisella signaalikohinasuhteella kuin maksimisuhdeyhdistely. Korkealla signaali-kohinasuhteella teknologiaa voidaan käyttää pienentämään häviötä epäonnistuneesta paketinlähetyksestä ja täten sallien korkeamman modulaatio-koodiasteen käyttämisen. Valitettavasti nämä parannukset tulevat kasvaneen laskennallisen monimutkaisuuden kustannuksella, johtuen iteratiivisesta dekoodaamisesta. Isoimmat rajoittavat tekijät teknologian käytössä ovat dekoodausvirheet otsikossa ja datamuokkaimen siemenessä. Tämän lisäksi käyttöä rajoittaa resurssisyöppö prosessointi. Simulaatioissa oletetaan täydellinen synkronisointi, mutta todellisuudessa, erityisesti matalalla signaali-kohinasuhteella, paketin tunnistus ja synkronointi voivat olla haasteellisia

    Binary linear codes with few weights from two-to-one functions

    Full text link
    In this paper, we apply two-to-one functions over F2n\mathbb{F}_{2^n} in two generic constructions of binary linear codes. We consider two-to-one functions in two forms: (1) generalized quadratic functions; and (2) (x2t+x)e\left(x^{2^t}+x\right)^e with gcd(t,n)=1\gcd(t, n)=1 and gcd(e,2n1)=1\gcd\left(e, 2^n-1\right)=1. Based on the study of the Walsh transforms of those functions or their related-ones, we present many classes of linear codes with few nonzero weights, including one weight, three weights, four weights and five weights. The weight distributions of the proposed codes with one weight and with three weights are determined. In addition, we discuss the minimum distance of the dual of the constructed codes and show that some of them achieve the sphere packing bound. { Moreover, several examples show that some of our codes are optimal and some have the best known parameters.

    Degrees of freedom of wireless interference network

    Get PDF
    Wireless communication systems are different from the wired systems mainly in three aspects: fading, broadcast, and superposition. Wireless communication networks, and multi-user communication networks in general, have not been well understood from the information-theoretic perspective: the capacity limits of many multi-user networks are not known. For example, the capacity region of a two-user single-antenna interference channel is still not known, though recent result can bound the region up to a constant value. Characterizing the capacity limits of multi-user multiple-input multiple-output (MIMO) interference network is usually even more difficult than the single antenna setup. To alleviate the difficulty in studying such networks, the concept of degrees of freedom (DoF) has been adopted, which captures the first order behavior of the capacities or capacity regions. One important technique developed recently for quantifying the DoF of multi-user networks is the so-called interference alignment. The purpose of interference alignment is to design the transmit signals structurally so that the interference signals from multiple interferers are aligned to reduce the signal dimensions occupied by interference. In this thesis, we mainly study two problems related to DoF and interference alignment: 1) DoF region of MIMO full interference channel (FIC) and Z interference channel (ZIC) with reconfigurable antennas, and 2) the DoF region of an interference network with general message demands. For the first problem, we derive the outer bound on the DoF region and show that it is achievable via time-sharing or beamforming except for one special case. As to this particular special case, we develop a systematic way of constructing the DoF-achieving nulling and beamforming matrices. Our results reveal the potential benefit of using the reconfigurable antenna in MIMO FIC and ZIC. In addition, the achievability scheme has an interesting space-frequency interpretation. For the second problem, we derive the DoF region of a single antenna interference network with general message demands, which includes the multiple unicasts and multiple multicasts as special cases. We perform interference alignment using multiple base vectors and align the interference at each receiver to its largest interferer. Furthermore, we show that the DoF region is determined by a subset of receivers, and the DoF region can be achieved by considering a smaller number of interference alignment constraints so as to reduce the number of time expansion. Finally, as a related research topic, we also include a result on the average throughput of a MIMO interference channel with single-user detector at receivers and without channel state information at transmitters. We present a piecewise linear approximation of the channel throughput under weak, moderate and strong interference regimes. Based on that we determine the optimal number of streams that a transmitter should use for different interference levels
    corecore