49 research outputs found

    Wideband frequency domain detection using Teager-Kaiser energy operator

    Get PDF
    International audienceThis paper addresses wireless microphone sensing in the TV white space and efficient detection of narrowband FM modulation signals. To this end, a wideband frequency domain analysis is proposed. The required Fast Fourier Transform for this operation may be shared between sensing analysis and modulation functions. A particular decision metric is then studied for the analysis of wireless microphone signals based on the Teager-Kaiser energy operator. Simulation results show that 6 dB of detection gain could be achieved when using a frequency domain analysis compared to time domain methods. The Teager-Kaiser detection leads to further improvement of 1.5 dB. This performance could be reached at no extra cost in term of complexity

    A common operator for FFT and FEC decoding

    Get PDF
    International audienceIn the Software Radio context, the parametrization is becoming an important topic especially when it comes to multistandard designs. This paper capitalizes on the Common Operator technique to present new common structures for the FFT and FEC decoding algorithms. A key benefit of exhibiting common operators is the regular architecture it brings when implemented in a Common Operator Bank (COB). This regularity makes the architecture open to future function mapping and adapted to accommodated silicon technology variability through dependable design

    Towards a more efficient spectrum usage: spectrum sensing and cognitive radio techniques

    No full text
    The traditional approach of dealing with spectrum management in wireless communications has been through the definition on a license user granted exclusive exploitation rights for a specific frequency.Peer ReviewedPostprint (published version

    Considering Microelectronic Trends in Advanced Wireless System Design

    Get PDF

    Method for Identifyng and Detecting a Radio Signal For a Cognitive Communication System

    No full text
    A method of identifying an RF signal for a cognitive radio system. The signal is identified with a digital watermarking performed downstream from the digital modulation of the symbols to be transmitted. A method of detecting an RF signal watermarked is also disclosed. The identification method includes demodulating the received RF signal as a baseband, converting it digitally, and correlating the digital signal obtained with a predetermined digital signature. The correlation values are averaged using a recursive filter and the maximum value of the average values output from the filter is compared to a threshold to decide whether the RF signal is present

    Signal detection using watermark insertion

    Get PDF
    Abstract — This paper analyses signal detection using watermark insertion, which is artificially embedded into the digital modulated signal. When a signal does not contain intrinsic information, its detection is hard to achieve using blind detectors. For that kind of signals, we propose to insert a low-power watermark that will be detected by a matched filter based detector. The system design is a trade-off between the watermark insertion strength (i.e. reducing the transmission quality) and the detection sensitivity. This trade-off is discussed in this paper and simulations results show the advantage of the watermark insertion. I

    Reed-Solomon Codes for Low Power Communications

    No full text

    Cyclostationarity Detectors for Cognitive Radio: Architectural Tradeoffs

    No full text
    Cyclostationarity detectors have been studied in the past few years as an efficient means for signal detection under low-SNR conditions. On the other hand, some knowledge about the signal is needed at the detector. This is typically the case in Cognitive Radio spectrum secondary usage, where the primary system is known. This paper focuses on two hardware architectures of cyclostationarity detectors for OFDM signals. The first architecture aims at secondary ISM band use, considering IEEE802.11a/g as the primary system. In this scenario, low latency is required. The second architecture targets TV band secondary usage, where DVB-T signals must be detected at very low SNR. The paper focuses on the architectural tradeoffs that the designer has to face, and how his/her choices will influence either performance or complexity. Hardware complexity evaluation on FPGA is provided for detectors that have been tested in the laboratory under real conditions.</p

    Cognitive Radio Oriented Wireless Networks 11th International Conference, CROWNCOM 2016, Grenoble, France, May 30 June 1, 2016, Proceedings

    No full text
    International audienceThe 11th EAI International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM 2016) was hosted by CEA-LETI and was held in Grenoble, France, the capital of the Alps. 2016 was the 30th anniversary of wireless activities atCEA-LETI, but Grenoble has a more ancient prestigious scientific history, still very fresh in the signal processing area as Joseph Fourier worked there on his fundamental research, and established the Imperial Faculty of Grenoble in 1810, now the Joseph Fourier University. This year, the main themes of the conference centered on the application of cognitive radio to 5G and to the Internet of Things (IoT). According to the current trend, the requirements of 5G and the IoT will increase demands on the wireless spectrum, accelerating the spectrum scarcity problem further. Both academic and regulatory bodies have focused on dynamic spectrum access and or dynamic spectrum usage to optimize scarce spectrum resources. Cognitive radio, with the capability to flexibly adapt its parameters, has been proposed as the enabling technology for unlicensed secondary users to dynamically access the licensed spectrum owned by legacy primary users on a negotiated or an opportunistic basis. It is now perceived in a much broaderparadigm that will contribute toward solving the resource allocation problem that 5G requirements raise.The program of the conference was structured to address these issues from the perspectives of industry, regulation bodies, and academia. In this transition period, where several visions of 5G and spectrum usage coexist, the CROWNCOM Committee decided to have a very strong presence of keynote speeches from key stakeholders. We had the pleasure of welcoming keynotes from industry 5G leaders such as Huawei and Qualcomm, the IoT network operator Sigfox, and the European Commission with perspectives on policy and regulation. We were also honored to welcome prestigious academic views from the Carnegie Mellon University and Zhejiang University. Along with the keynote speeches, we had the opportunity to debate the impact of massive IoT deployments in future spectrum use with a panel gathering high-profile experts in the field, thanks to the help of the conference panel chair. The committee also wanted to emphasize how cognitive radio techniques could be applied in different areas of wireless communication in a pragmatic way, in a context where cognitive radio is often perceived as a theoretical approach. With this in mind, a significant number of demonstrations and exhibits were presented at CROWNCOM.Seven demonstrations and two exhibition booths were present during the conference,showcasing the maturity level of the technology. In this regard, we would like to express our gratitude to the conference demonstration and exhibit chair for his outstanding role in the organization of the demonstration area in conjunction with the conference local chairs. In addition, we decided to integrate a series of workshops that can be seen as special sessions where specific aspects of cognitive radio regarding applications, regulatory frameworks, and research were discussed. Four such work-shops were organized as part of the conference embracing topics such as modern spectrum management, 5G technology enabler, software-defined networks and virtualization, and cloud technologies. This year, delegates could also attend three tutorials organized as part of the conference. We are thankful to the tutorial chair for organizing these tutorials
    corecore