70 research outputs found

    MIMO channel modelling for indoor wireless communications

    Get PDF
    This thesis investigates multiple-input-multiple-output (MIMO) channel modelling for a wideband indoor environment. Initially the theoretical basis of geometric modelling for a typical indoor environment is looked at, and a space-time model is formulated. The transmit and receive antenna correlation is then separated and is expressed in terms of antenna element spacing, the scattering parameter, mean angle of arrival and number of antenna elements employed. These parameters are used to analyze their effect on the capacity for this environment. Then the wideband indoor channel operating at center frequencies of 2.4 GHz and 5.2 GHz is investigated. The concept of MIMO frequency scaling is introduced and applied to the data obtained in the measurement campaign undertaken at the University of Pretoria. Issues of frequency scaling of capacity, spatial correlation and the joint RX/TX double direction channel response for this indoor environment are investigated. The maximum entropy (ME) approach to MIMO channel modelling is investigated and a new basis is developed for the determination of the covariance matrix when only the RX/TX covariance is known. Finally, results comparing this model with the established Kronecker model and its application for the joint RX/TX spatial power spectra, using a beamformer, are evaluated. Conclusions are then drawn and future research opportunities are highlighted.Thesis (PhD)--University of Pretoria, 2008.Electrical, Electronic and Computer Engineeringunrestricte

    Towards a bandwidth efficient cognitive positioning system

    Get PDF
    Presented is an efficient bandwidth determination model for the cognitive positioning system by utilising multiple receive antennas. The performance evaluations of the proposed multiple receive antenna positioning system were carried out using the linear least squares and maximum-likelihood location estimation techniques. Simulated results reveal that in a rural scenario, the 1 × 2 and 1 × 3 singleinput- multiple-output (SIMO) cases display an average bandwidth efficiency with respect to positional accuracy, of 49 and 58%, respectively, over the single-input-single-output (SISO) case. For an urban scenario, the 1 × 2 and 1 × 3 SIMO cases display a higher average bandwidth efficiency of 53 and 62%, respectively, over the SISO case.The Sentech Chair in Broadband Wireless Multimedia Communications at the University of Pretoria and the National Research Foundation.http://www.ietdl.org/ELai201

    Prediction based channel allocation performance for cognitive radio

    Get PDF
    The interdependency, in a cognitive radio (CR) network, of spectrum sensing, occupancy modelling, channel switching and secondary user (SU) performance, is investigated. Achievable SU data throughput and primary user (PU) disruption rate have been examined for both theoretical test data as well as data obtained from real-world spectrum measurements done in Pretoria, South Africa. A channel switching simulator was developed to investigate SU performance, where a hidden Markov model (HMM) was employed to model and predict PU behaviour, from which proactive channel allocations could be made. Results show that CR performance may be improved if PU behaviour is accurately modelled, since accurate prediction allows the SU to make proactive channel switching decisions. It is further shown that a trade-off may exist between achievable SU throughput and average PU disruption rate. When using the prediction model, significant performance improvements, particularly under heavy traffic density conditions, of up to double the SU throughput and half the PU disruption rate were observed. Results obtained from a measurement campaign were comparable with those obtained from theoretical occupancy data, with an average similarity score of 95% for prediction accuracy, 90% for SU throughput and 70% for PU disruption rate.Sentech Chair in Broadband Wireless Multimedia Communication (BWMC), the National Research Foundation (NRF) and the Independent Communications Authority of South Africa (ICASA).http://www.elsevier.com/locate/aeuehb2013ai201

    Analysis of an offset modulation transmission

    Get PDF
    In this article, a method called offset modulation (OM-OFDM) is proposed to control the peak-to-average power ratio (PAPR) of an orthogonal frequency division multiplexing (OFDM) signal. The theoretical bandwidth occupancy of the proposed offset modulated signal is derived. Using these bandwidth occupancy results, a closed-form theoretical bit error rate (BER) expression for an offset modulated transmission is derived and validated. Thereafter, a BER comparison between OM-OFDM and OFDM at a PAPR value of 13 dB shows that both methods offer similar BER characteristics for frequency selective fading channel conditions. The OM-OFDM method in addition is able to accurately control the PAPR of a transmission for a targeted BER. The authors have further proposed a newly applied power performance decision metric, which can be used throughout the PAPR field, in order to compare various methods. By using this power performance decision metric, the authors show that OM-OFDM offers between 4 dB–1.2 dB (60.34%–24.6%) and 4.1 dB–1.2 dB (60.8%–23.6%), net power performance gain (at a BER of 10−4) when compared to a clipped OFDM, OFDM, tone reserved (TR) OFDM and an active constellation extended (ACE) OFDM transmission in a frequency selective fading channel. Finally, by using a complementary cumulative distribution function (CCDF), the OM-OFDM method is shown to offer between 3.2 dB and 2 dB PAPR reduction (at a CCDF of 10−1) when compared to an OFDM, TR, clipped, and ACE OFDM transmission.This work is currently being patented by the University of Pretoria. Both authors are inventors on the patent, with the University of Pretoria holding the patent rights. This paper is based on work, for which the author has been awarded a PhD at the University of Pretoria. The necessary permissions have been obtained to publish such material.http://jwcn.eurasipjournals.com/content/2013/1/19am2013ai201

    From cyber-physical convergence to digital twins : a review on edge computing use case designs

    Get PDF
    AUTHOR CONTRIBUTIONS : The authors contributed equally in this work. All authors have read and agreed to the published version of the manuscript.As a result of the new telecommunication ecosystem landscape, wireless communication has become an interdisciplinary field whose future is shaped by several interacting dimensions. These interacting dimensions, which form the cyber–physical convergence, closely link the technological perspective to its social, economic, and cognitive sciences counterparts. Beyond the current operational framework of the Internet of Things (IoT), network devices will be equipped with capabilities for learning, thinking, and understanding so that they can autonomously make decisions and take appropriate actions. Through this autonomous operation, wireless networking will be ushered into a paradigm that is primarily inspired by the efficient and effective use of (i) AI strategies, (ii) big data analytics, as well as (iii) cognition. This is the Cognitive Internet of People Processes Data and Things (CIoPPD&T), which can be defined in terms of the cyber–physical convergence. In this article, through the discussion of how the cyber–physical convergence and the interacting dynamics of the socio-technical ecosystem are enablers of digital twins (DTs), the network DT (NDT) is discussed in the context of 6G networks. Then, the design and realization of edge computing-based NDTs are discussed, which culminate with the vehicle-to-edge (V2E) use cases.The Sentech Chair in Broadband Wireless and Multimedia Communication (BWMC) at the University of Pretoria.https://www.mdpi.com/journal/applsciam2024Electrical, Electronic and Computer EngineeringSDG-09: Industry, innovation and infrastructur

    Capacity-approaching non-binary balanced codes using auxiliary data

    Get PDF
    It is known that, for large user word lengths, the auxiliary data can be used to recover most of the redundancy losses of Knuth’s simple balancing method compared with the optimal redundancy of balanced codes for the binary case. Here, this important result is extended in a number of ways. First, an upper bound for the amount of auxiliary data is derived that is valid for all codeword lengths. This result is primarily of theoretical interest, as it defines the probability distribution of the number of balancing indices that results in optimal redundancy. This result is equally valid for particular non-binary generalizations of Knuth’s balancing method. Second, an asymptotically exact expression for the amount of auxiliary data for the ternary case of a variable length realization of the modified balanced code construction is derived, that, in all respects, is the analogue of the result obtained for the binary case. The derivation is based on a generalization of the binary random walk to the ternary case and a simple modification of an existing generalization of Knuth’s method for the non-binary balanced codes. Finally, a conjecture is proposed regarding the probability distribution of the number of balancing indices for any alphabet size.The National Research Foundation (NRF) and SENTECH Chair in Broadband Wireless Multimedia Communication.http://ieeexplore.ieee.org/servlet/opac?punumber=18hj2019Electrical, Electronic and Computer Engineerin

    Age of information and success probability analysis in hybrid spectrum access-based massive cognitive radio networks

    Get PDF
    In this paper, we investigate users’ performance under the hybrid spectrum access model in the massive cognitive radio network (CRN), where multiple primary users (PUs) and secondary users (SUs) transmit on the same channel simultaneously. SUs first detect the state of the channel via channel sensing and select an appropriate channel access scheme (either underlay or overlay) for their transmissions based on the outcome of the channel sensing. When at least one PU is active, SUs transmit under the underlay channel access scheme by employing the power control technique to ensure that the interference generated in the primary network is below the pre-defined interference threshold. In the absence of PU, SUs transmit with full transmit power under the overlay channel access scheme, thereby maximizing their throughput. Using the tool of stochastic geometry, we obtained tractable analyses for important metrics such as success probability, throughput, and the average age of information (AoI) in both primary and secondary networks, while capturing the interference between the two networks. The obtained analyses offer an efficient way to understand the metrics of AoI, throughput and success probability in the hybrid spectrum access-based CRN. We further compared users’ performance under the hybrid spectrum access scheme with performances under overlay and underlay spectrum access schemes. The outcome of the numerical simulations shows that the hybrid spectrum access scheme can significantly improve the performance of users in the network, while also capturing more key features of real-life systems.The SENTECH Chair in Broadband Wireless Multimedia Communications (BWMC), Department of Electrical, Electronics, and Computer Engineering, University of Pretoria, South Africa.http://www.mdpi.com/journal/applscipm2021Electrical, Electronic and Computer Engineerin

    Quasi-enumerative coding of balanced run-length limited codes

    Get PDF
    Various methods have been proposed for the construction of balanced run-length limited codes. Amongst these methods is the enumerative coding approach by Kurmaev. The advantage of this approach is that the code has maximum cardinality and thus approaches capacity with increasing codeword length. However, enumerative coding has the disadvantage of becoming prohibitively complex for large codeword lengths. We propose an alternative enumerative coding method that reduces the encoding and decoding complexity. We call it quasi-enumerative coding as it does not follow a strict lexicographic order, but retains a one-to-one mapping between rank and the corresponding balanced run-length limited codeword.https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639hj2024Electrical, Electronic and Computer EngineeringSDG-09: Industry, innovation and infrastructur

    AI meets CRNs : a prospective review on the application of deep architectures in spectrum management

    Get PDF
    The spectrum low utilization and high demand conundrum created a bottleneck towards ful lling the requirements of next-generation networks. The cognitive radio (CR) technology was advocated as a de facto technology to alleviate the scarcity and under-utilization of spectrum resources by exploiting temporarily vacant spectrum holes of the licensed spectrum bands. As a result, the CR technology became the rst step towards the intelligentization of mobile and wireless networks, and in order to strengthen its intelligent operation, the cognitive engine needs to be enhanced through the exploitation of arti cial intelligence (AI) strategies. Since comprehensive literature reviews covering the integration and application of deep architectures in cognitive radio networks (CRNs) are still lacking, this article aims at lling the gap by presenting a detailed review that addresses the integration of deep architectures into the intricacies of spectrum management. This is a prospective review whose primary objective is to provide an in-depth exploration of the recent trends in AI strategies employed in mobile and wireless communication networks. The existing reviews in this area have not considered the relevance of incorporating the mathematical fundamentals of each AI strategy and how to tailor them to speci c mobile and wireless networking problems. Therefore, this reviewaddresses that problem by detailing howdeep architectures can be integrated into spectrum management problems. Beyond reviewing different ways in which deep architectures can be integrated into spectrum management, model selection strategies and how different deep architectures can be tailored into the CR space to achieve better performance in complex environments are then reported in the context of future research directions.The Sentech Chair in Broadband Wireless Multimedia Communications (BWMC) at the University of Pretoria.http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639am2022Electrical, Electronic and Computer Engineerin

    Transmission scheduling for wireless mesh networks with temporal reuse

    Get PDF
    Link-assigned transmission schedules with timeslot reuse by multiple links in both the space and time domains are investigated in this study for stationary multihop wireless mesh networks with both rate and power adaptivity. Specifically, cross-layer optimised schedules with proportionally fair end-to-end flow rates and network coding capability are constructed for networks operating under the physical interference model with single-path minimum hop routing. Extending transmission rights in a link-assigned schedule allows for network coding and temporal reuse, which increases timeslot usage efficiency when a scheduled link experiences packet depletion. The schedules that suffer from packet depletion are characterised, and a generic temporal reuse-aware achievable rate region is derived. Extensive computational experiments show improved schedule capacity, quality of service, power efficiency and benefit from network coding accrued with schedules optimised in the proposed temporal reuseaware convex rate region.http://jwcn.eurasipjournals.com/content/2011/1/8
    • …
    corecore