33 research outputs found

    Throughput and proportional fairness in cognitive radio networks

    Full text link
    This book section is from the proceedings of the International Conference on Advanced Technologies for Communications: ATC 2009 held between 12-14 October 2009 at location Hai Phong, Vietna

    Fuzzy Logic Control for Multiresolutive Adaptive PN Acquisition Scheme in Time-Varying Multipath Ionospheric Channel

    Get PDF
    Communication with remote places is a challenge often solved using satellites. However, when trying to reach Antarctic stations, this solution suffers from poor visibility range and high operational costs. In such scenarios, skywave ionospheric communication systems represent a good alternative to satellite communications. The Research Group in Electromagnetism and Communications (GRECO) is designing an HF system for long haul digital communication between the Antarctic Spanish Base in Livingston Island (62.6S, 60.4W) and Observatori de l’Ebre in Spain (40.8N,0.5E) (Vilella et al., 2008). The main interest of Observatori de l’Ebre is the transmission of the data collected from the sensors located at the base, including a geomagnetic sensor, a vertical incidence ionosonde, an oblique incidence ionosonde and a GNSS receiver. The geomagnetic sensor, the vertical incidence ionosonde and the GNSS receiver are commercial solutions from third parties. The oblique incidence ionosonde, used to sound the ionospheric channel between Antarctica and Spain, was developed by the GRECO in the framework of this project. During the last Antarctic campaign, exhaustive measurements of the HF channel characteristics were performed, which allowed us to determine parameters such as availability, SNR, delay and Doppler spread, etc. In addition to the scientific interest of this sounding, a further objective of the project is the establishment of a backup link for data transmission from the remote sensors in the Antarctica. In this scenario, ionospheric communications appear to be an interesting complementary alternative to geostationary satellite communications since the latter are expensive and not always available from high-latitudes. Research work in the field of fuzzy logics applied to the estimation of the above mentioned channel was first applied in (Alsina et al., 2005a) for serial search acquisition systems in AWGN channels, afterwards applied to the same channel but in the multiresolutive structure (Alsina et al., 2009a; Morán et al., 2001) in papers (Alsina et al., 2007b; 2009b) achieving good results. In this chapter the application of fuzzy logic control trained for Rayleigh fading channels (Proakis, 1995) with Direct-Sequence Spread-Spectrum (DS-SS) is presented, specifically suited for the ionospheric channel Antarctica-Spain. Stability and reliability of the reception, which are currently being designed, are key factors for the reception. It is important to note that the fuzzy control design presented in this chapter not only resolves the issue of improving the multiresolutive structure performance presented by (Morán et al., 2001), but also introduces a new option for the control design of many LMS adaptive structures used for PN code acquisition found in the literature. (El-Tarhuni & Sheikh, 1996) presented an LMS-based system to acquire a DS-SS system in Rayleigh channels; years after, (Han et al., 2006) improved the performance of the acquisition system designed by (El-Tarhuni & Sheikh, 1996). And also in other type of channels, LMS filters are used as an acquisition system, even in oceanic transmissions (Stojanovic & Freitag, 2003). Although the fuzzy control system presented in this chapter is compared to the stability control used in (Morán et al., 2001) it also can be used to improve all previous designs performance in terms of stability and robustness. Despite this generalization, the design of every control system should be done according to the requirements of the acquisition system and the specific channel characteristics

    Distribution dependent adaptive learning

    Get PDF

    On Development of Some Soft Computing Based Multiuser Detection Techniques for SDMA–OFDM Wireless Communication System

    Get PDF
    Space Division Multiple Access(SDMA) based technique as a subclass of Multiple Input Multiple Output (MIMO) systems achieves high spectral efficiency through bandwidth reuse by multiple users. On the other hand, Orthogonal Frequency Division Multiplexing (OFDM) mitigates the impairments of the propagation channel. The combination of SDMA and OFDM has emerged as a most competitive technology for future wireless communication system. In the SDMA uplink, multiple users communicate simultaneously with a multiple antenna Base Station (BS) sharing the same frequency band by exploring their unique user specific-special spatial signature. Different Multiuser Detection (MUD) schemes have been proposed at the BS receiver to identify users correctly by mitigating the multiuser interference. However, most of the classical MUDs fail to separate the users signals in the over load scenario, where the number of users exceed the number of receiving antennas. On the other hand, due to exhaustive search mechanism, the optimal Maximum Likelihood (ML) detector is limited by high computational complexity, which increases exponentially with increasing number of simultaneous users. Hence, cost function minimization based Minimum Error Rate (MER) detectors are preferred, which basically minimize the probability of error by iteratively updating receiver’s weights using adaptive algorithms such as Steepest Descent (SD), Conjugate Gradient (CG) etc. The first part of research proposes Optimization Techniques (OTs) aided MER detectors to overcome the shortfalls of the CG based MER detectors. Popular metaheuristic search algorithms like Adaptive Genetic Algorithm (AGA), Adaptive Differential Evolution Algorithm (ADEA) and Invasive Weed Optimization (IWO), which rely on an intelligent search of a large but finite solution space using statistical methods, have been applied for finding the optimal weight vectors for MER MUD. Further, it is observed in an overload SDMA–OFDM system that the channel output phasor constellation often becomes linearly non-separable. With increasing the number of users, the receiver weight optimization task turns out to be more difficult due to the exponentially increased number of dimensions of the weight matrix. As a result, MUD becomes a challenging multidimensional optimization problem. Therefore, signal classification requires a nonlinear solution. Considering this, the second part of research work suggests Artificial Neural Network (ANN) based MUDs on thestandard Multilayer Perceptron (MLP) and Radial Basis Function (RBF) frameworks fo

    Digital Communication System with High Security and High Immunity

    Get PDF
    Today, security issues are increased due to huge data transmissions over communication media such as mobile phones, TV cables, online games, Wi-Fi and satellite transmission etc. for uses such as medical, military or entertainment. This creates a challenge for government and commercial companies to keep these data transmissions secure. Traditional secure ciphers, either block ciphers such as Advanced Encryption Standard (AES) or stream ciphers, are not fast or completely secure. However, the unique properties of a chaotic system, such as structure complexity, deterministic dynamics, random output response and extreme sensitivity to the initial condition, make it motivating for researchers in the field of communication system security. These properties establish an increased relationship between chaos and cryptography that create strong and fast cipher compared to conventional algorithms, which are weak and slow ciphers. Additionally, chaotic synchronisation has sparked many studies on the application of chaos in communication security, for example, the chaotic synchronisation between two different systems in which the transmitter (master system) is driving the receiver (slave system) by its output signal. For this reason, it is essential to design a secure communication system for data transmission in noisy environments that robust to different types of attacks (such as a brute force attack). In this thesis, a digital communication system with high immunity and security, based on a Lorenz stream cipher chaotic signal, has been perfectly applied. A new cryptosystem approach based on Lorenz chaotic systems was designed for secure data transmission. The system uses a stream cipher, in which the encryption key varies continuously in a chaotic manner. Furthermore, one or more of the parameters of the Lorenz generator is controlled by an auxiliary chaotic generator for increased security. In this thesis, the two Lorenz chaotic systems are called the Main Lorenz Generator and the Auxiliary Lorenz Generator. The system was designed using the SIMULINK tool. The system performance in the presence of noise was tested, and the simulation results are provided. Then, the clock-recovery technique is presented, with real-time results of the clock recovery. The receiver demonstrated its ability to recover and lock the clock successfully. Furthermore, the technique for synchronisation between two separate FPGA boards (transmitter and receiver) is detailed, in which the master system transmits specific data to trigger a slave system in order to run synchronously. The real-time results are provided, which show the achieved synchronisation. The receiver was able to recover user data without error, and the real-time results are listed. The randomness test (NIST) results of the Lorenz chaotic signals are also given. Finally, the security analysis determined the system to have a high degree of security compared to other communication systems

    Compressive Sensing Based Grant-Free Communication

    Get PDF
    Grant-free communication, where each user can transmit data without following the strict access grant process, is a promising technique to reduce latency and support massive users. In this thesis, compressive sensing (CS), which exploits signal sparsity to recover data from a small sample, is investigated for user activity detection (UAD), channel estimation, and signal detection in grant-free communication, in order to extract information from the signals received by base station (BS). First, CS aided UAD is investigated by utilizing the property of quasi-time-invariant channel tap delays as the prior information for the burst users in internet of things (IoT). Two UAD algorithms are proposed, which are referred to as gradient based and time-invariant channel tap delays assisted CS (g-TIDCS) and mean value based and TIDCS (m-TIDCS), respectively. In particular, g-TIDCS and m-TIDCS do not require any prior knowledge of the number of active users like the existing approaches and therefore are more practical. Second, periodic communication as one of the salient features of IoT is considered. Two schemes, namely periodic block orthogonal matching pursuit (PBOMP) and periodic block sparse Bayesian learning (PBSBL), are proposed to exploit the non-continuous temporal correlation of the received signal for joint UAD, channel estimation, and signal detection. The theoretical analysis and simulation results show that the PBOMP and PBSBL outperform the existing schemes in terms of the success rate of UAD, bit error rate (BER), and accuracy in period estimation and channel estimation. Third, UAD and channel estimation for grant-free communication in the presence of massive users that are actively connected to the BS is studied. An iteratively UAD and signal detection approach for the burst users is proposed, where the interference of the connected users on the burst users is reduced by applying a preconditioning matrix to the received signals at the BS. The proposed approach is capable of providing significant performance gains over the existing algorithms in terms of the success of UAD and BER. Last but not least, since the physical layer security becomes a critical issue for grant-free communication, the channel reciprocity in time-division duplex systems is utilized to design environment-aware (EA) pilots derived from transmission channels to prevent eavesdroppers from acquiring users’ channel information. The proposed EA-pilots based approach possesses a high level of security by scrambling the eavesdropper’s normalized mean square error performance of channel estimation

    Digital Communication System with High Security and High Immunity

    Get PDF
    Today, security issues are increased due to huge data transmissions over communication media such as mobile phones, TV cables, online games, Wi-Fi and satellite transmission etc. for uses such as medical, military or entertainment. This creates a challenge for government and commercial companies to keep these data transmissions secure. Traditional secure ciphers, either block ciphers such as Advanced Encryption Standard (AES) or stream ciphers, are not fast or completely secure. However, the unique properties of a chaotic system, such as structure complexity, deterministic dynamics, random output response and extreme sensitivity to the initial condition, make it motivating for researchers in the field of communication system security. These properties establish an increased relationship between chaos and cryptography that create strong and fast cipher compared to conventional algorithms, which are weak and slow ciphers. Additionally, chaotic synchronisation has sparked many studies on the application of chaos in communication security, for example, the chaotic synchronisation between two different systems in which the transmitter (master system) is driving the receiver (slave system) by its output signal. For this reason, it is essential to design a secure communication system for data transmission in noisy environments that robust to different types of attacks (such as a brute force attack). In this thesis, a digital communication system with high immunity and security, based on a Lorenz stream cipher chaotic signal, has been perfectly applied. A new cryptosystem approach based on Lorenz chaotic systems was designed for secure data transmission. The system uses a stream cipher, in which the encryption key varies continuously in a chaotic manner. Furthermore, one or more of the parameters of the Lorenz generator is controlled by an auxiliary chaotic generator for increased security. In this thesis, the two Lorenz chaotic systems are called the Main Lorenz Generator and the Auxiliary Lorenz Generator. The system was designed using the SIMULINK tool. The system performance in the presence of noise was tested, and the simulation results are provided. Then, the clock-recovery technique is presented, with real-time results of the clock recovery. The receiver demonstrated its ability to recover and lock the clock successfully. Furthermore, the technique for synchronisation between two separate FPGA boards (transmitter and receiver) is detailed, in which the master system transmits specific data to trigger a slave system in order to run synchronously. The real-time results are provided, which show the achieved synchronisation. The receiver was able to recover user data without error, and the real-time results are listed. The randomness test (NIST) results of the Lorenz chaotic signals are also given. Finally, the security analysis determined the system to have a high degree of security compared to other communication systems
    corecore