171 |
Regime Change: Sampling Rate vs. Bit-Depth in Compressive SensingJanuary 2012 (has links)
The compressive sensing (CS) framework aims to ease the burden on analog-to-digital converters (ADCs) by exploiting inherent structure in natural and man-made signals. It has been demonstrated that structured signals can be acquired with just a small number of linear measurements, on the order of the signal complexity. In practice, this enables lower sampling rates that can be more easily achieved by current hardware designs. The primary bottleneck that limits ADC sampling rates is quantization, i.e., higher bit-depths impose lower sampling rates. Thus, the decreased sampling rates of CS ADCs accommodate the otherwise limiting quantizer of conventional ADCs. In this thesis, we consider a different approach to CS ADC by shifting towards lower quantizer bit-depths rather than lower sampling rates. We explore the extreme case where each measurement is quantized to just one bit, representing its sign. We develop a new theoretical framework to analyze this extreme case and develop new algorithms for signal reconstruction from such coarsely quantized measurements. The 1-bit CS framework leads us to scenarios where it may be more appropriate to reduce bit-depth instead of sampling rate. We find that there exist two distinct regimes of operation that correspond to high/low signal-to-noise ratio (SNR). In the measurement compression (MC) regime, a high SNR favors acquiring fewer measurements with more bits per measurement (as in conventional CS); in the quantization compression (QC) regime, a low SNR favors acquiring more measurements with fewer bits per measurement (as in this thesis). A surprise from our analysis and experiments is that in many practical applications it is better to operate in the QC regime, even acquiring as few as 1 bit per measurement. The above philosophy extends further to practical CS ADC system designs. We propose two new CS architectures, one of which takes advantage of the fact that the sampling and quantization operations are performed by two different hardware components. The former can be employed at high rates with minimal costs while the latter cannot. Thus, we develop a system that discretizes in time, performs CS preconditioning techniques, and then quantizes at a low rate.
|
172 |
Digital-To-Analog Converter for FSKSalim J, Athfal January 2007 (has links)
This thesis is one part of a overall task of designing a module for frequency shift keying (FSK) to be used in an Ultra Wide Band (UWB) system. The FSK system has a Direct Digital Synthesizer (DDS) and Digital-to-Analog (DAC). The DACs differential current signals are directly fed to a RF (Radio Frequency) unit that generates the UWB RF signal. The focus of this thesis is on DAC while the DDS is developed in VHDL as another thesis work. This thesis demonstrates a low-power, ultra wide band 10 bit DAC with an update frequency of 24 MSPS(Mega Samples Per Second). The DAC uses a L-fold linear interpolation architecture. It includes a 16-tap voltage controlled delay line and a 10 bit binary-weighted DAC with a time interleaved structure. The linear interpolation technique improves the attenuation of mirror components and also reduces the glitch. This helps to relax the analog filter requirements and sometimes an off chip capacitor is enough as low pass filter. The attenuation of image components is doubled in decibels(dB) compared with that of conventional DAC. In this work various DAC architectures are studied. The current-steering DAC is chosen due to its high speed and high resolution. A binary weighted architecture is chosen to reduce the digital circuits. This helped in reducing the power consumption. The design and simulation is done with help of Cadence. The layout is done in Cadence Virtuoso and the DDS is integrated with the DAC. The chip is to be manufactured in 130 nm CMOS process.
|
173 |
Design of Soft Error Robust High Speed 64-bit Logarithmic AdderShah, Jaspal Singh January 2008 (has links)
Continuous scaling of the transistor size and reduction of the operating voltage have led to a significant performance improvement of integrated circuits. However, the vulnerability of the scaled circuits to transient data upsets or soft errors, which are caused by alpha particles and cosmic neutrons, has emerged as a major reliability concern. In this thesis, we have investigated the effects of soft errors in combinational circuits and proposed soft error detection techniques for high speed adders. In particular, we have proposed an area-efficient 64-bit soft error robust logarithmic adder (SRA). The adder employs the carry merge Sklansky adder architecture in which carries are generated every 4 bits. Since the particle-induced transient, which is often referred to as a single event transient (SET) typically lasts for 100~200 ps, the adder uses time redundancy by sampling the sum outputs twice. The sampling instances have been set at 110 ps apart. In contrast to the traditional time redundancy, which requires two clock cycles to generate a given output, the SRA generates an output in a single clock cycle. The sampled sum outputs are compared using a 64-bit XOR tree to detect any possible error. An energy efficient 4-input transmission gate based XOR logic is implemented to reduce the delay and the power in this case. The pseudo-static logic (PSL), which has the ability to recover from a particle induced transient, is used in the adder implementation. In comparison with the space redundant approach which requires hardware duplication for error detection, the SRA is 50% more area efficient. The proposed SRA is simulated for different operands with errors inserted at different nodes at the inputs, the carry merge tree, and the sum generation circuit. The simulation vectors are carefully chosen such that the SET is not masked by error masking mechanisms, which are inherently present in combinational circuits. Simulation results show that the proposed SRA is capable of detecting 77% of the errors. The undetected errors primarily result when the SET causes an even number of errors and when errors occur outside the sampling window.
|
174 |
Exploiting diversity in wireless channels with bit-interleaved coded modulation and iterative decoding (BICM-ID)Tran, Huu Nghi 23 April 2008 (has links)
<p>This dissertation studies a state-of-the-art bandwidth-efficient coded modulation technique, known as bit interleaved coded modulation with iterative decoding (BICM-ID), together with various diversity techniques to dramatically improve the performance of digital communication systems over wireless channels.</p>
<p>For BICM-ID over a single-antenna frequency non-selective fading channel, the problem of mapping over multiple symbols, i.e., multi-dimensional (multi-D) mapping, with 8-PSK constellation is investigated. An explicit algorithm to construct a good multi-D mapping of 8-PSK to improve the asymptotic performance of BICM-ID systems is introduced. By comparing the performance of the proposed mapping with an unachievable lower bound, it is conjectured that the proposed mapping is the global optimal mapping. The superiority of the proposed mapping over the best conventional (1-dimensional complex) mapping and the multi-D mapping found previously by computer search is thoroughly demonstrated.</p>
<p>In addition to the mapping issue in single-antenna BICM-ID systems, the use of signal space diversity (SSD), also known as linear constellation precoding (LCP), is considered in BICM-ID over frequency non-selective fading channels. The performance analysis of BICM-ID and complex N-dimensional signal space diversity is carried out to study its performance limitation, the choice of the rotation matrix and the design of a low-complexity receiver. Based on the design criterion obtained from a tight error bound, the optimality of the rotation matrix is established. It is shown that using the class of optimal rotation matrices, the performance of BICM-ID systems over a frequency non-selective Rayleigh fading channel approaches that of the BICM-ID systems over an additive white Gaussian noise (AWGN) channel when the dimension of the signal constellation increases. Furthermore, by exploiting the sigma mapping for any M-ary quadrature amplitude modulation (QAM) constellation, a very simple sub-optimal, yet effective iterative receiver structure suitable for signal constellations with large dimensions is proposed. Simulation results in various cases and conditions indicate that the proposed receiver can achieve the analytical performance bounds with low complexity.</p>
<p>The application of BICM-ID with SSD is then extended to the case of cascaded Rayleigh fading, which is more suitable to model mobile-to-mobile communication channels. By deriving the error bound on the asymptotic performance, it is first illustrated that for a small modulation constellation, a cascaded Rayleigh fading causes a much more severe performance degradation than a
conventional Rayleigh fading. However, BICM-ID employing SSD with a sufficiently large constellation can close the performance gap between the Rayleigh and cascaded Rayleigh fading channels, and their performance can closely approach that over an AWGN channel.</p>
<p>In the next step, the use of SSD in BICM-ID over frequency selective Rayleigh fading channels employing a multi-carrier modulation technique known as orthogonal frequency division multiplexing (OFDM) is studied. Under the assumption of correlated fading over subcarriers, a tight bound on the asymptotic error performance for the general case of applying SSD over all N subcarriers is derived and used to establish the best achievable asymptotic performance by SSD. It is then shown that precoding over subgroups of at least L subcarriers per group, where L is the number of channel taps, is sufficient to obtain this best asymptotic error performance, while significantly reducing the receiver complexity. The optimal joint subcarrier grouping and rotation matrix design is subsequently determined by solving the Vandermonde linear system. Illustrative examples show a good agreement between various analytical and simulation results.</p>
<p>Further, by combining the ideas of multi-D mapping and subcarrier grouping, a novel power and bandwidth-efficient bit-interleaved coded modulation with OFDM and iterative decoding (BI-COFDM-ID) in which multi-D mapping is performed over a group of subcarriers for broadband transmission in a frequency selective fading environment is proposed. A tight bound on the asymptotic error performance is developed, which shows that subcarrier mapping and grouping have independent impacts on the overall error performance, and hence they can be independently optimized. Specifically, it is demonstrated that the optimal subcarrier mapping is similar to the optimal multi-D mapping for BICM-ID in frequency non-selective Rayleigh fading environment, whereas the optimal subcarrier grouping is the same with that of OFDM with SSD. Furthermore, analytical and simulation results show that the proposed system with the combined optimal subcarrier mapping and grouping can achieve the full channel diversity without using SSD and provide significant coding gains as compared to the previously studied BI-COFDM-ID with the same power, bandwidth and receiver complexity.</p>
<p>Finally, the investigation is extended to the application of BICM-ID over a multiple-input multiple-output (MIMO) system equipped with multiple antennas at both the transmitter and the receiver to exploit both time and spatial diversities, where neither the transmitter nor the receiver knows the channel fading coefficients. The concentration is on the class of unitary constellation, due to its advantages in terms of both information-theoretic capacity and error probability. The tight error bound with respect to the asymptotic performance is also derived for any given unitary constellation and mapping rule. Design criteria regarding the choice of unitary constellation and mapping are then established. Furthermore, by using the unitary constellation obtained from orthogonal design with quadrature phase-shift keying (QPSK or 4-PSK) and 8-PSK, two different mapping rules are proposed. The first mapping rule gives the most suitable mapping for systems that do not implement iterative processing, which is similar to a Gray mapping in coherent channels. The second mapping rule yields the best mapping for systems with iterative decoding. Analytical and simulation results show that with the proposed mappings of the unitary constellations obtained from orthogonal designs, the asymptotic error performance of the iterative systems can closely approach a lower bound which is applicable to any unitary constellation and mapping.</p>
|
175 |
High Efficiency Video Coding:Second-Order-Residual Prediction MechanismLee, Yu-Shan 07 September 2011 (has links)
A novel residual prediction algorithm is proposed for high-bit-rate video coding in this work. We analysis the relationship between the residual data and different quantization parameters, according to the comparison results, we observe that the residual data is raised rapidly when the quality increases. Consequently, in order to reduce the bitrate, we propose a new residual prediction algorithm, it mainly reduce the residual data when the quantization parameter is finer. The proposed algorithm not only reduces the bitrate but also improves the video quality for high-bit-rate coding. Experimental results show that the proposed algorithm outperforms H.264/AVC. Compared to H.264/AVC, the proposed method decreases about 9.66% bitrate in average. The experimental results demonstrated that the second-order-residual prediction algorithm is efficiency for high-bit-rate coding.
|
176 |
Misbehaving relay detection for cooperative communications using a known or unknown distribution functionsWang, Sheng-Ming 11 January 2012 (has links)
In the cooperative communications, the users relay each other¡¦s signal and thus forming multiple transmission paths to the destination and therefore the system can achieve spatial diversity gain. Decode-and-forward and amplify-and-forward are the most popular relaying strategies in the literature due to their simplicity. However, in practice, cooperative users acting as relays may not always normally operated or trustworthy. When the relay misbehavior is present in
the cooperative networks, the communication performance may degrade dramatically and the users may be even better off without cooperation. Therefore, it is necessary for the destination to determine the misbehaving relays and to take appropriate actions to ensure that cooperative advantages are preserved. In this thesis, we focus on developing a misbehaving relay detection method to detect whether or not the system is in the presence of some misbehaving relays. After performing misbehaving relay detection, the destination removes the signals from the un-
reliable paths and then uses maximal ratio combing to achieve spatial diversity. The simulation results conducted by the thesis show that the proposed method is more robust as compared with those without employing misbehaving relay detection when the system is in the presence of some misbehaving relays.
|
177 |
Misbehaving Relay Detection for Cooperative Communications without the Knowledge of Relay MisbehaviorsLi, Chieh-kun 17 July 2012 (has links)
In the cooperative communications, the users relay each other's signal and thus form multiple transmission paths to the destination and therefore the system can achieve spatial diversity gain.
Most studies in the literature assumed that cooperative users acting as the relays are normally operated and trustworthy. However, this may not always be true in practice. When the relay misbehaviors are present in the cooperative communications, the communication performance may degrade dramatically and the users may be even better off without cooperation. Therefore, it is necessary for the destination to determine the misbehaving relays and to take appropriate actions
to ensure that cooperative advantages are preserved.
This thesis considers both models in which the cooperative communications are with direct path (WDP) and without direct path (WODP).
Utilizing the proposed Kolmogorov-Smirnov test mechanism, the destination identifies the misbehaving relays within the cooperative
communications and then excludes their transmitting messages when performing the diversity combining to infer the symbols of interest sent by the source.
In addition, this thesis provides the bit error rate (BER) analysis of the cooperative communications
employing the proposed misbehaving relay detectors. The simulation results demonstrate that the proposed methods have robust performance when the relay misbehaviors are present in the cooperative communications.
|
178 |
The Performance Analysis of the MIMO Systems Using Interference Alignment with Imperfect Channel State InformationHsu, Po-sheng 17 July 2012 (has links)
Recently, interference alignment (IA) has emerged as a promising technique to effectively mitigate interference in wireless communication systems. It has also evolved as a powerful technique to achieve the optimal degrees of freedom of interference channel. IA can be constructed in many domains such as space, time, frequency and codes. Currently, most researches on developing IA assume that channel state information (CSI) is well-known at the transceiver.
However, in practice, perfect CSI at the transceiver can¡¦t be obtained due to many factors such as channel estimation error, quantization error, and feedback error. Under our investigation, the performance of IA is very sensitive to imperfect CSI. Therefore, this thesis proposes a spatial domain IA scheme for the three-user multiple-input multiple-output (MIMO) downlink
interference channels, and analyzes the effect of channel estimation errors by modeling the estimation error as independent complex Gaussian random variables. The approximated bit error rate (BER) for the system with MIMO Zero-Forcing equalizer using IA is derived.
|
179 |
High Performance Integrated Circuit Blocks for High-IF Wideband ReceiversSilva Rivas, Jose F. 2009 May 1900 (has links)
Due to the demand for high‐performance radio frequency (RF) integrated circuit
design in the past years, a system‐on‐chip (SoC) that enables integration of analog and
digital parts on the same die has become the trend of the microelectronics industry. As
a result, a major requirement of the next generation of wireless devices is to support
multiple standards in the same chip‐set. This would enable a single device to support
multiple peripheral applications and services.
Based on the aforementioned, the traditional superheterodyne front‐end
architecture is not suitable for such applications as it would require a complete receiver
for each standard to be supported. A more attractive alternative is the highintermediate
frequency (IF) radio architecture. In this case the signal is digitalized at an
intermediate frequency such as 200MHz. As a consequence, the baseband operations,
such as down‐conversion and channel filtering, become more power and area efficient
in the digital domain. Such architecture releases the specifications for most of the front‐end building blocks, but the linearity and dynamic range of the ADC become the
bottlenecks in this system. The requirements of large bandwidth, high frequency and
enough resolution make such ADC very difficult to realize. Many ADC architectures
were analyzed and Continuous‐Time Bandpass Sigma‐Delta (CT‐BP‐ΣΔ) architecture was
found to be the most suitable solution in the high‐IF receiver architecture since they
combine oversampling and noise shaping to get fairly high resolution in a limited
bandwidth.
A major issue in continuous‐time networks is the lack of accuracy due to powervoltage‐
temperature (PVT) tolerances that lead to over 20% pole variations compared
to their discrete‐time counterparts. An optimally tuned BP ΣΔ ADC requires correcting
for center frequency deviations, excess loop delay, and DAC coefficients. Due to these
undesirable effects, a calibration algorithm is necessary to compensate for these
variations in order to achieve high SNR requirements as technology shrinks.
In this work, a novel linearization technique for a Wideband Low‐Noise
Amplifier (LNA) targeted for a frequency range of 3‐7GHz is presented. Post‐layout
simulations show NF of 6.3dB, peak S21 of 6.1dB, and peak IIP3 of 21.3dBm,
respectively. The power consumption of the LNA is 5.8mA from 2V.
Secondly, the design of a CMOS 6th order CT BP‐ΣΔ modulator running at 800
MHz for High‐IF conversion of 10MHz bandwidth signals at 200 MHz is presented. A
novel transconductance amplifier has been developed to achieve high linearity and high
dynamic range at high frequencies. A 2‐bit quantizer with offset cancellation is alsopresented. The sixth‐order modulator is implemented using 0.18 um TSMC standard
analog CMOS technology. Post‐layout simulations in cadence demonstrate that the
modulator achieves a SNDR of 78 dB (~13 bit) performance over a 14MHz bandwidth.
The modulator’s static power consumption is 107mW from a supply power of ± 0.9V.
Finally, a calibration technique for the optimization of the Noise Transfer
Function CT BP ΣΔ modulators is presented. The proposed technique employs two test
tones applied at the input of the quantizer to evaluate the noise transfer function of
the ADC, using the capabilities of the Digital Signal Processing (DSP) platform usually
available in mixed‐mode systems. Once the ADC output bit stream is captured,
necessary information to generate the control signals to tune the ADC parameters for
best Signal‐to‐Quantization Noise Ratio (SQNR) performance is extracted via Least‐
Mean Squared (LMS) software‐based algorithm. Since the two tones are located
outside the band of interest, the proposed global calibration approach can be used
online with no significant effect on the in‐band content.
|
180 |
Design And Systemc Implementation Of A Crypto Processor For Aes And Des AlgorithmsEgemen, Tufan 01 December 2007 (has links) (PDF)
This thesis study presents design and SystemC implementation of a Crypto Processor
for Advanced Encryption Standard (AES), Data Encryption Standard (DES) and
Triple DES (TDES) algorithms. All of the algorithms are implemented in single
architecture instead of using separate architectures for each of the algorithm. There is
an Instruction Set Architecture (ISA) implemented for this Crypto Processor and the
encryption and decryption of algorithms can be performed by using the proper
instructions in the ISA.
A permutation module is added to perform bit permutation operations, in addition to
some basic structures of general purpose micro processors. Also the Arithmetic
Logic Unit (ALU) structure is modified to process some crypto algorithm-specific
operations.
The design of the proposed architecture is studied using SystemC. The architecture is
implemented in modules by using the advantages of SystemC in modular structures.
The simulation results from SystemC are analyzed to verify the proposed design. The
instruction sets to implement the crypto algorithms are presented and a detailed
hardware synthesis study has been carried out using the tool called SystemCrafter.
|
Page generated in 0.028 seconds