• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 38
  • 30
  • 12
  • 4
  • 3
  • 2
  • 1
  • 1
  • Tagged with
  • 113
  • 113
  • 113
  • 36
  • 24
  • 22
  • 20
  • 18
  • 18
  • 15
  • 15
  • 15
  • 14
  • 14
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

High speed network access to the last-mile using fixed broadband wireless

Fougias, Nikolaos 03 1900 (has links)
Approved for public release, distribution is unlimited / Despite the increase in the demand for high speed Internet services, the last-mile solutions currently available neither are inexpensive enough to attract the majority of the population, nor are they available in low density populated areas. This thesis examines Fixed Broadband Wireless (FBW) as an alternative technology to the current last-mile solutions. The analysis shows that LMDS and MMDS are the most promising emerging FBW technologies and that they are able, by utilizing microwave radio as their fundamental transport medium and using high modulation schemes, to provide digital two-way voice, data, video and Internet services. The thesis shows that both technologies are constrained by free space loss and line-of-sight impairments with rain absorption being the most significant cause of attenuation in the LMDS case, while vegetation and multipath fading play a significant role mostly in the MMDS case. Additionally, it is shown that there is a positive association between the data rate achieved and the level of influence due to Additive White Gaussian Noise (AWGN). Based on the analysis and using the coverage areas, the total capacity, the achieved data rates, the weather and line-of-sight limitations as well as the cost as the most important criteria, it is concluded that LMDS is a preferable solution for enterprise end-users in densely populated urban areas outside the reach of fiber networks, while MMDS targets residential end-users in rural or suburban areas that are not able to receive service through high-speed wireline connections. / Lieutenant Junior Grade, Hellenic Navy
62

Statistical modelling and reduction of multiple access interference power in wideband DS-CDMA and MC-CDMA communications systems

Carey, Daniel Jeffrey January 2006 (has links)
With code division multiple access (CDMA) systems being the prominent multiple access scheme for the air interface for 3G cellular systems, most standardisation bodies have based their terrestrial cellular systems on DS-CDMA (W-CDMA, UMTS, cdma2000). With 4G systems fast approaching, bringing with them improved services and quality of service standards, there is growing interest in further investigating and developing more efficient multiple access techniques such as multicarrier CDMA (MC-CDMA) systems. MC-CDMA combines multicarrier modulation (MCM), namely OFDM, with CDMA profiting from the benefits of both multiplexing techniques; as such, MC-CDMA is emerging as a possible candidate for the air interface multiple access scheme for 4G cellular systems. Multiple access interference (MAI) is a limiting factor of CDMA systems in terms of system capacity as orthogonally designed spreading sequences lose their orthogonality in the presence of timing misalignments amongst mobile subscribers in a cell; such is the case over the uplink channel. Ensuring orthogonal code properties minimises the MAI over synchronous environments, however, it is when the users are allowed to transmit asynchronously, as is the case over the uplink channel, that MAI inflicts significant performance degradation. In CDMA systems, all subscribers are active on the same frequency band simultaneously and signal separation is facilitated upon reception via the properties of the assigned spreading codes. Under asynchronous conditions the code properties alone do not provide the necessary separation and an additive MAI term remains in the detection process. In addition to the separation abilities of the spreading codes, a further method of deciphering the desired subscriber signal from the interfering subscriber signals is sought. In this thesis we propose a statistical model for both the probability density function (pdf) of the total MAI power and the corresponding bit-error rate (BER) observed during asynchronous CDMA transmission. The modelling offers the full statistic the MAI power and resulting BER, not just the first and second order statistics. In addition to statistically quantifying the MAI power, the thesis also proposes a technique for the successful reduction of MAI caused by asynchronous transmission. This interference reduction technique is derived from an ambiguity domain analysis of the asynchronous CDMA detection problem and its application to both the DS-CDMA and MC-CDMA multiplexing techniques is presented and the results show significant MAI reduction, and thus an improved the BER. A methodology for the approximation of the total MAI power pdf and the resulting BER pdf is proposed for the asynchronous DS-CDMA and MC-CDMA techniques. This methodology is derived for the use of Walsh-Hadamard (WH) and Gold spreading sequences, however, it is applicable to any given set of deterministic spreading sequences. The total MAI power pdfs of both systems are statistically modelled as being Nakagamim distributed and the corresponding BER modelling is derived from the Nakagami-m formulation offering the full statistic of both the incurred MAI power and the achievable BER. The proposed pdf acquisition methodology and statistical models can be used as analysis tools to assess the relative performances of the DS-CDMA and MC-CDMA techniques for a variety of communications environments. Here the asynchronous uplink channel is considered in the absence of fading and the results show a clear distinction between the BER performances of the MC-CDMA and DS-CDMA systems, for which the MC-CDMA system offers a superior performance for the purely asynchronous channel considered. The results suggest a higher resistance to MAI in the MC-CDMA technique in comparison to the DS-CDMA system for the considered transmission scenario. Following ambiguity function analysis of the asynchronous CDMA detection problem, the concept of dual-frequency switching is introduced to the existing DS-CDMA and MC-CDMA techniques giving rise to the proposed dual-frequency DS-CDMA (DF/DSCDMA) and dual-frequency MC-CDMA (DF/MC-CDMA) schemes. Periodically switching the carrier frequency between dual frequency bands at consecutive symbol boundaries facilitates partial CDMA signal separation upon asynchronous reception. Such switching of the carrier frequency induces a separation in frequency between offset interference signals and the reference signal; this is equivalent to shifting the energy concentration of the interference signals away form the ambiguity domain origin (representing the decision variable of the matched filter). Further MAI reduction is demonstrated through careful design of the dual carrier frequencies. The newly proposed DF systems clearly outperform the standard DS-CDMA and MC-CDMA systems when adopting equivalent spreading factors. The DF/DS-CDMA technique in particular achieves the most MAI reduction and in doing so, surpasses all other considered techniques to offer the best BER performance for the purely asynchronous channel considered. In terms of bandwidth usage, the DF/DS-CDMA band width is 1.5 times that of the DF/MC-CDMA system and from the BER results presented, one may argue that DF/MC-CDMA offers the better BER given the bandwidth usage. The multicarrier systems presented, MC-CDMA and DF/MC-CDMA, offer attractive BER performances for the bandwidth used and it is concluded that MC-CDMA is a genuine candidate for the uplink air interface multiple access scheme for future mobile cellular technologies.
63

Physical-layer authentication Using chaotic maps

EVANGELISTA, João Victor de Carvalho 16 August 2016 (has links)
Submitted by Fabio Sobreira Campos da Costa (fabio.sobreira@ufpe.br) on 2017-03-08T12:29:03Z No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) JOAO VICTOR DE CARVALHO EVANGELISTA_DISSERTACAO_VERSAO_FINAL_2016.pdf: 4051425 bytes, checksum: c53a5039b8aa3054c77f2ee82a10849f (MD5) / Made available in DSpace on 2017-03-08T12:29:03Z (GMT). No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) JOAO VICTOR DE CARVALHO EVANGELISTA_DISSERTACAO_VERSAO_FINAL_2016.pdf: 4051425 bytes, checksum: c53a5039b8aa3054c77f2ee82a10849f (MD5) Previous issue date: 2016-08-16 / Message authentication, which ensures that a received message comes from its acclaimed sender, is of fundamental importance for secure communication systems. We consider in this work a physical layer authentication system employing tag signals embedded in the message to provide a robust authentication method. This work diverges from previous work in the area when it comes to the tag generation method. While the previous works use methods based on cryptographic hash functions or on the channel side information our system employs unidimensional chaotic maps to generate these tags. Due to the loss of information about the initial condition of chaotic maps, we show that they are strong candidates for the tag generation process. We prove that chaotic tags provide a positive lower bound on the unconditional security of the system. Additionally, we calculate the probability of success for three possible attacks to the authentication system: impersonation, substitution and replay.Finally, we analyze how the system parameters affect these probabilities and some performance metrics (bit error rate, outage probability, probability of false negative) and explore the tradeoff between security and performance in order to provide guidelines to design the system. / A autenticação de mensagem, o que garante que uma mensagem recebida vem de seu aclamado remetente, é de fundamental importância para sistemas de comunicação seguros. Neste contexto, considera-se neste trabalho um sistema de autenticação em camada física empregando tags embutidos nas mensagens proporcionando um robusto método de autenticação. Este trabalho diverge de trabalhos anteriores na área no que se refere ao método de geração de tags. Enquanto os trabalhos anteriores utilizam métodos baseados em funções criptográficas de hash e na informação do estado do canal, nosso sistema emprega mapas caóticos unidimensionais para gerar os tags. Devido ao fato de que a informação sobre a condição inicial se perde ao longo de uma órbita caótica mostraremos que elas são fortes candidatas para o processo de geração de tags. Provamos que tags caóticos garantem um limitante inferior positivo na segurança incondicional do sistema. Adicionalmente, nós calculamos a probabilidade de sucesso de três tipos de ataque: de personificação, de substituição e de repetição. Para finalizar, analisamos como os parâmetros do sistema afetam essas probabilidades e algumas métricas de performance (taxa de erro por bit, probabilidade de interrupção e probabilidade de falso negativo) e os compromissos entre segurança e performance para prover um guia de projeto do sistema.
64

PHYSICAL LAYER SECURITY USING PSEUDO-RANDOM SEQUENCE KEY GENERATION

Arolla, Srihari, Gurrala, Naga Venkata Sai Teja January 2018 (has links)
Nowadays, network security plays a major role in the field of wireless communications. Wired networks propagate electrical signals or pulses through cables. Whereas wireless signals propagate through the air. If wireless networks are left open and exposed to the outside world, there are high chances of being misused by others. The intruders take advantage of this, to intercept the wireless signals. This is the reason why an extra level of security is required for wireless networks. The physical layer is one of the important layers of the Open System Interconnection (OSI) model which plays an important role in the network’s physical connections like wireless transmission, cabling, connections etc. The physical layer supports the bit-level transmission between various devices by connecting to the physical medium for synchronized communication.In this thesis, a method is studied for exchanging secret key [1] bits using a pseudo-random sequence generator based on Frequency Division Duplex (FDD) systems. The principle of this method is to generate a secret key in a manner that produces low correlation at the intruder. By uniquely relating the secret key bits to the channel in a private version of the universal codebook, a robust key exchange between the transmitter and the receiver is then performed.
65

Performance comparison of two implementations of TCM for QAM

Peh, Lin Kiat 12 1900 (has links)
Approved for public release; distribution is unlimited. / Trellis-Coded Modulation (TCM) is employed with quadrature amplitude modulation (QAM) to provide error correction coding with no expense in bandwidth. There are two common implementations of TCM, namely pragmatic TCM and Ungerboeck TCM. Both schemes employ Viterbi algorithms for decoding but have different code construction. This thesis investigates and compares the performance of pragmatic TCM and Ungerboeck TCM by implementing the Viterbi decoding algorithm for both schemes with 16-QAM and 64-QAM. Both pragmatic and Ungerboeck TCM with six memory elements are considered. Simulations were carried out for both pragmatic and Ungerboeck TCM to evaluate their respective performance. The simulations were done using Matlab software, and an additive white Gaussian noise channel was assumed. The objective was to ascertain that pragmatic TCM, with its reduced-complexity decoding, is more suitable to adaptive modulation than Ungerboeck TCM. / Civilian
66

Simulace přenosu DVB-T v prostředí MATLAB / Simulation of DVB-T transmission chain in the MATLAB environment

Obruča, Martin January 2009 (has links)
This thesis deals with Matlab application developed for simulation of the DVB-T channel coder and decoder. The first part of this thesis includes description of terrestrial digital video broadcasting system and comparison with analogue television. Channel coding and OFDM modulation, used in the DVB-T standard, is described in detail. Application developed in the Matlab environment is described in the second part. The application simulates data transfer of the DVB-T system. Results of the simulated transmission, using developed application are presented in the last part. Namely dependence of the BER on the S/N ratio, using various coder settings, was examined. Maximal possible data rate was determined for these various setting. All obtained values are graphically represented.
67

Modelování PLC komunikačního systému pro zajištění spolehlivosti komunikace / Modelling of PLC system to ensure the reliability of communication

Procházka, Vít January 2010 (has links)
The master´s thesis is focussed on principles and characteristics of Powerline Communications (PLC), practical usage possibilities and advantages and disadvantage of it. There are described mudulations and a channel encoding which are in PLC used. The main part of the thesis deals with a design of a channel as transfer function through the use of two methods, an echo model and the ABCD matrix. After finishing of the design of transfer function the model of communication was created in the Matlab-Simulink program. There were used the narrowband modulations in the model and analyzed the bit error rate of the tranfer data. In the end all results were treated graphically and evaluated.
68

Model distribuční energetické sítě / Power distribution network model

Bradáč, Lubomír January 2012 (has links)
The thesis is focused on PLC technology issues and thus the data transmission over a power-line. This work describes characteristics of the PLC technology, its usage, functional principles and used modulation techniques. The main part of the work describes individual kinds of interferences in the network. The method of necessary steps against these interferences by using the right modulation and relevant coding is also described in the thesis. On the basis of theoretical knowledge, the models of interferences are realized in Matlab/Simulink. The simulative model of power-lines with random parameters is designed and realized for each elected techniques of modulation (BPSK, QPSK, ASK, FSK). The method of PLC channels modeling is chose as a multipath signal spreading for topology with one and two branching and the dependence of their transmission functions are inquired too. The analysis of interference influence on the data transmission is performed via the created models. All acquired results are compared and evaluated in the conclusion of this thesis.
69

Application of NOMA for Mobile High Definition Images

Danda, Aishwarya Reddy, Chama, Naga Manikanta January 2021 (has links)
The telecommunications technology has been developed tremendously as there has been an ever-increasing demand for more speed and reliability. The enormous increase in the number of smart phones and other data consuming devices, combined with the development of enhanced multimedia applications has resulted in a dramatic increase in the volume of mobile data traffic. In order to accommodate the growing needs, it is required to utilise the spectrum efficiently. The design of radio access technology plays an important role in the aspect of system performance. These radio access technologies are typically characterised by the multiple-access techniques used. Non-Orthogonal Multiple Access (NOMA) is a multiple access scheme proposed for 5G and it utilises the power domain which was not sufficiently utilised in the previous systems.        This thesis work is mainly focused on the performance analysis of the NOMA technique in mobile media (images). This analysis is achieved by transmitting a high definition image at various power levels to two users who are located at two different distances from the base station. The images are transmitted through suitable noise channels. An analysis is done on how NOMA copes with the users having poor channel conditions. The performance is analysed by comparing the output images at both the receivers based on the structural similarity index and bit error rate parameters.
70

Impacts des non-linéarités dans les systèmes multi-porteuses de type FBMC-OQAM / OFDM-FBMC performance in presence of non-linear high power amplifier

Bouhadda, Hanen 22 March 2016 (has links)
Dans cette thèse une étude des performances des systèmes OFDM et FBMC/OQAM en présence d'amplificateur de puissance sans mémoire en terme de TEB est présentée. Ensuite, nous avons proposé une technique de linéarisation d'AP par pré-distorsion adaptative neuronale. Aussi, nous avons proposé deux techniques de correction des non-linéarités au niveau du récepteur. / In our work, we have studied the impact of in-band non linear distortions caused by PA on both OFDM and FBMC/OQAM systems. A theoretical approach was proposed to evaluate the BER performance for the two systems. This approach is based on modeling the in-band non-linear distortion with a complex gain and an uncorrelated additive white Gaussian noise, given by the Bussgang theorem. Then, we have proposed different techniques to compensate this NLD either on the transmitter or the receiver sides.

Page generated in 0.0911 seconds