111 research outputs found

    Optimal pilot placement for frequency offset estimation and data detection in burst transmission systems

    Get PDF
    In this letter, we address the problem of pilot design for Carrier Frequency Offset (CFO) and data detection in digital burst transmission systems. We consider a quasi-static flat-fading channel. We find that placing half of the pilot symbols at the beginning of the burst and the other half at the end of the burst is optimal for both CFO estimation and data detection. Our findings are based on the Cram´er-Rao bound and on empirical evaluations of the bit error rate for different pilot designs. The equal-preamble-postamble pilot design is shown to provide a significant gain in performance over the conventional preambleonly pilot design

    Blind frequency-offset estimator for OFDM systems transmitting constant-modulus symbols

    Get PDF
    We address the problem of carrier frequency offset (CFO) synchronization in OFDM communications systems in the context of frequency-selective fading channels. We consider the case where the transmitted symbols have constant modulus, i.e., PSK constellations. A novel blind CFO estimation algorithm is developed. The new algorithm is shown to greatly outperform a recently published blind technique that exploits the fact that practical OFDM systems are not fully loaded. Further, the proposed algorithm is consistent even when the system is fully loaded. Finally, the proposed CFO estimator is obtained via a one-dimensional search, the same as with the existing virtual subcarrier-based estimator, but achieves a substantial gain in performance (10-dB SNR or one order of magnitude in CFO MSE)

    Channel estimation and symbol detection for block transmission using data-dependent superimposed training

    Get PDF
    We address the problem of frequency-selective channel estimation and symbol detection using superimposed training. The superimposed training consists of the sum of a known sequence and a data-dependent sequence that is unknown to the receiver. The data-dependent sequence cancels the effects of the unknown data on channel estimation. The performance of the proposed approach is shown to significantly outperform existing methods based on superimposed training (ST)

    Block synchronisation for joint channel and DC-offset estimation using data-dependent superimposed training

    Get PDF
    In this paper, we propose a new (single-step) block synchronisation algorithm for joint channel and DC-offset estimation for data-dependent superimposed training (DDST). While a (two-step) block synchronisation algorithm for DDST has previously been proposed in [5], due to interference from the information-bearing data it performed sub-optimally, resulting in channel estimates with unknown delays. These delay ambiguities (also present in the equaliser) were then estimated in [5] in a non-practical manner. In this paper we avoid the need for estimation of this delay ambiguity by exploiting the special structure of the channel output’s cyclic mean vector. The result is a BER performance superior to the DDST synchronisation algorithm first published in [5]

    Breaking the Area Spectral Efficiency Wall in Cognitive Underlay Networks

    Get PDF
    In this article, we develop a comprehensive analytical framework to characterize the area spectral efficiency of a large scale Poisson cognitive underlay network. The developed framework explicitly accommodates channel, topological and medium access uncertainties. The main objective of this study is to launch a preliminary investigation into the design considerations of underlay cognitive networks. To this end, we highlight two available degrees of freedom, i.e., shaping medium access or transmit power. While from the primary user's perspective tuning either to control the interference is equivalent, the picture is different for the secondary network. We show the existence of an area spectral efficiency wall under both adaptation schemes. We also demonstrate that the adaptation of just one of these degrees of freedom does not lead to the optimal performance. But significant performance gains can be harnessed by jointly tuning both the medium access probability and the transmission power of the secondary networks. We explore several design parameters for both adaptation schemes. Finally, we extend our quest to more complex point-to-point and broadcast networks to demonstrate the superior performance of joint tuning policies

    A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks

    Get PDF
    We address the problem of centralized detection of a binary event in the presence of fraction falsifiable sensor nodes (SNs) (i.e., controlled by an attacker) for a bandwidth constrained under-attack spatially uncorrelated distributed wireless sensor network (WSN). The SNs send their one-bit test statistics over orthogonal channels to the fusion center (FC), which linearly combines them to reach to a final decision. Adopting the modified deflection coefficient as an alternative function to be optimized, we first derive in a closed-form the FC optimal weights combining. But as these optimal weights require a-priori knowledge that cannot be attained in practice, this optimal weighted linear FC rule is not implementable. We also derive in a closed-form the expressions for the attacker “flipping probability” (defined in paper) and the minimum fraction of compromised SNs that makes the FC incapable of detecting. Next, based on the insights gained from these expressions, we propose a novel and non-complex reliability-based strategy to identify the compromised SNs and then adapt the weights combining proportional to their assigned reliability metric. In this way, the FC identifies the compromised SNs and decreases their weights in order to reduce their contributions towards its final decision. Finally, simulation results illustrate that the proposed strategy significantly outperforms (in terms of FC’s detection capability) the existing compromised SNs identification and mitigation schemes

    Simplified Chirp Dictionary for Time-Frequency Signature Sparse Reconstruction of Radar Returns

    Get PDF
    In sparse reconstruction of the Doppler frequency, the chirp atom approach has been shown to give a better performance than its sinusoidal counterpart. Nevertheless, the chirp atom has a relatively large dimension and so its computational load is much greater compared to the sinusoidal atom. In this paper, we propose a simplified chirp dictionary that obtains a satisfactory time-frequency signature approximation of the signals, but with a computational load comparable to the sinusoidal atom. We estimate the chirp rate through the DTFT of the bilinear product at a certain lag, and the initial frequency is solved in the time domain

    Information Centric Modeling for Two-tier Cache Enabled Cellular Networks

    Get PDF
    In this article, we introduce a new metric called `information centric coverage probability' to characterize the performance of a two-tier cache enabled cellular network. The proposed metric unifies the dynamics of in-network caching and heterogeneous networking to provide a unified performance measure. Specifically, it quantifies the probability that a mobile user (MU) is covered at a desired rate when a certain content is requested from a global content library. In other words, it quantifies the percentage of time when an MU can be served locally without paying the traffic penalties at backhaul, fronthaul and core networks. Caching dynamics are modeled by considering that the content which is least recently used (LRU) is evicted while the requested content is stored in the cache. The considered two-tier cellular model leverages coordination between the macro base-station (MBS) and the small cell base-stations (SBSs) to maximize the resource efficiency. More specifically, coordination between macro and small cells enables an arbitrary SBS to exploit the caches at other SBSs in the neighborhood. Thus reducing the requirement for huge and expensive memory modules at individual SBSs. The spatial dynamics of cellular network are modeled by borrowing well established tools from stochastic geometry. Propagation uncertainties are explicitly factored in characterization by considering the small scale Rayleigh fading and the large scale power-law path-loss model. It is shown that the information centric coverage probability is a function of (i) the size of caches at the SBSs and the MBS; (ii) the content eviction strategy; (iii) the underlying popularity law for referenced objects; (iv) the size of the global content library; (v) desired downlink transmission rate; (vi) the amount of spectrum allocated to each tier; (vii) pathloss exponent; and (viii) the deployment density of the SBSs and the MBSs. Our analysis reveals that significant performance gains can be harnessed with appropriate dimensioning of both cache sizes and deployment density. Finally, identification of memory limited vs. QoS limited operational regime for two-tier cellular networks is considered

    Mobile Robot Path Planners with Memory for Mobility Diversity Algorithms

    Get PDF
    Mobile robots (MRs) using wireless communications often experience small-scale fading so that the wireless channel gain can be low. If the channel gain is poor (due to fading), the robot can move (a small distance) to another location to improve the channel gain and so compensate for fading. Techniques using this principle are called mobility diversity algorithms (MDAs). MDAs intelligently explore a number of points to find a location with high channel gain while using little mechanical energy during the exploration. Until now, the location of these points has been predetermined. In this paper, we show how we can adapt their positions by using channel predictors. Our results show that MDAs, which adapt the location of those points, can in fact outperform (in terms of the channel gain obtained and mechanical energy used) the MDAs that use predetermined locations for those points. These results will significantly improve the performance of the MDAs and consequently allow MRs to mitigate poor wireless channel conditions in an energy-efficient manner

    Distributed Two-Step Quantized Fusion Rules via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks

    Get PDF
    We consider the problem of distributed soft decision fusion in a bandwidth-constrained spatially uncorrelated wireless sensor network (WSN). The WSN is tasked with the detection of an intruder transmitting an unknown signal over a fading channel. Existing distributed consensus-based fusion rules algorithms only ensure equal combining of local data and in the case of bandwidth-constrained WSNs, we show that their performance is poor and does not converge across the sensor nodes (SNs). Motivated by this fact, we propose a two-step distributed quantized fusion rule algorithm where in the first step the SNs collaborate with their neighbors through error-free, orthogonal channels (the SNs exchange quantized information matched to the channel capacity of each link). In the second step, local 1-bit decisions generated in the first step are shared among neighbors to yield a consensus. A binary hypothesis testing is performed at any arbitrary SN to optimally declare the global decision. Simulations show that our proposed quantized two-step distributed detection algorithm approaches the performance of the unquantized centralized (with a fusion center) detector and its power consumption is shown to be 50% less than the existing (unquantized) conventional algorithm
    • …
    corecore