• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 86
  • 18
  • 17
  • 11
  • 5
  • 4
  • 2
  • 2
  • Tagged with
  • 171
  • 171
  • 69
  • 45
  • 44
  • 44
  • 36
  • 35
  • 32
  • 32
  • 24
  • 23
  • 22
  • 20
  • 20
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Implementation of Bluetooth Baseband Behavioral Model in C Language

Kuo, Ying-Chi January 2005 (has links)
This master thesis is as a final project in the Division of Computer Engineering at the Department of Electrical of Engineering, Linköping University, Sweden. The purpose of the project is to set up a baseband behavioral model for a Bluetooth system based on standards. In the model, synchronization in demodulation part has been focused on. Simulation results are analyzed later in the report to see how the method in demodulation works. Some suggestions and future works for receiver are provided to improve the performances of the model.
52

Performance of physical layer security with different service integrity parameters

Padala, Akhila Naga Sree Ravali, Kommana, Kavya January 2018 (has links)
Information security has been a very important issue in wireless networks. With the ever-increasing amount of data being exchanged over wireless networks, the confidentiality of information needs to be protected from unauthorized users called eavesdropper. Due to the broadcast nature of the wireless medium, the transmissions between legitimate users maybe overheard and intercepted by the unauthorized parties, which makes wireless transmission vulnerable to potential eavesdropping attacks. The security of wireless communications plays an increasingly important role in the cybercrime defense against unauthorized activities.     We consider the wireless physical layer security which has been explored for the sake of enhancing the protection of wireless communications against eavesdroppers. We consider the problem of secret communication through Rayleigh fading channel in the presence of an eavesdropper in which the transmitter knows the channel state information of both the main and eavesdropper channel. Then, we analyze the average capacity of the main channel and eavesdropper channel from which an expression of secrecy capacity is derived based on the cumulative distribution function and probability density function of the signal to noise ratio. We also analyze an expression for the symbol error rate of the main channel, and the outage probability is obtained for the main transmission. Finally, we perform the numerical results in MATLAB.
53

Designing of LTE-Advanced Downlink Transceiver on a Physical Layer

Shahid, Samiallah, Mohammad, Saqib January 2013 (has links)
The evolved version of LTE is LTE-Advanced which is being developed by 3GPP. LTE-Advanced will meet or go beyond the requirements of the International Telecommunication Union (ITU) for the fourth generation (4G) radio communication standard known as IMT-Advanced. LTEAdvanced is primarily considered as a part of Release 10 of 3GPP specifications. The LTE-Advanced specifications will continue to be developed in subsequent 3GPP releases. The complete physical layer structure has been employed by using the latest 3GPP standards. Furthermore, technologies such as Orthogonal Frequency Division Multiplexing (OFDM) and Multiple Input Multiple Output (MIMO) have also been implemented and integrated with LTEAdvanced. The Multiple Access Scheme in Advanced Mobile radio system has to meet the specific requirements such as: high throughput, robustness, efficient Bit Error Rate (BER), high spectral efficiency, minimum delays, low computational complexity, low Peak to Average Power Ratio (PAPR), low error probability etc. In order to investigate the LTE-Advanced transceiver a thorough study has been carried out using MATLAB Simulink using AWGN and Rayleigh fading channel. This report investigates the performance of OFDMA and various MIMO configurations of LTEAdvanced physical layer, along with diverse modulation techniques such 16QAM and QPSK,the results are then demonstrated on BER and signal to noise ratio graphs. AWGN and Rayleigh fading models are also used to determine the performance of LTE-Advanced in presence of noise and fading.
54

Improving secrecy and spectral efficiency of wireless communications

Alotaibi, Nafel Nahes A. January 2016 (has links)
The current and future demand for wireless technology is increasing rapidlyin the era of Internet-of-things, information-shower, auto-drive vehicles andthe fifth generation of mobile communications. The flourishing in wirelesstechnologies comes from their advantages such as mobility, flexibility, easy toextend, easy to install and easy to do the maintenance. However, the wirelesstechnology is suffering from many problems such as; lack of security andthe shortage of spectrum bands. The security remains a major challenge forthe wireless communications because of the broadcasting nature of wirelesssignals and massive researches have been conducted to deal with it. Beamformingis one of the physical layer security solutions that is proposed toimprove the security by focusing the majority of the transmitted power towardthe legitimate destination. The main concern about the beamformingtechnique is the relatively small amount of power that escapes from the sidelobes where any illegal user equipped with a sufficiently sensitive receivercan detect its information. The literature has been received many differentsolutions to secure the side lobes emissions. These solutions suffer from fourcommon limitations; 1) the need to modulate the signal at the antenna level,2) the data rates are restricted by the switching speed, 3) they can not easily beintegrated with the current infrastructure, and 4) they work only with phasemodulation. In this thesis, a new, simple, economic, easy to get integratedwith current phased array systems and effective solution has been proposedand analytically analysed under different circumstances, including noiseless,noisy and Rician fading channels and the effect of phase shift errors. The secondproblem addressed in this thesis is the poor spectral efficiency of spaceshift keying modulation. This thesis proposes a new physical layer directcode to improve the spectral efficiency of space shift keying modulation byexploiting the indices of both active and inactive transmitting antennas.
55

Efficient wireless transmission supporting internet of things

Ghasemiahmadi, Mohammad 19 December 2017 (has links)
The promise of Internet of Things (IoT) and mass connectivity has brought many applications and along with them many new challenges to be solved. Recognizing sensor networks as one of the main applications of IoT, this dissertation focuses on solutions for IoT challenges in both single-hop and multi-hop communications. In single-hop communications, the new IEEE 802.11ah and its Group Synchronized Distribution Coordination Function (GS-DCF) is studied. GS-DCF categorized nodes in multiple groups to solve the channel contention issue of dense networks. An RSS-Based grouping strategy is proposed for the hidden terminal problem that can arise in infrastructure-based single hop communications. For multi-hop communications, Physical Layer Network Coding (PNC) is studied as a robust solution for multi-hop packet exchange in linear networks. Focusing on practical and implementation issues of PNC systems, different challenges have been addressed and a Software Defined Radio (SDR) PNC system based on USRP devices is proposed and implemented. Finally, extensive simulation and experimental results are presented to evaluate the performance of the proposed algorithms in comparison with currently used methods. / Graduate
56

Cross-layer design for multi-hop two-way relay network

Zhang, Haoyuan 28 June 2017 (has links)
Physical layer network coding (PNC) was proposed under the two-way relay hannel (TWRC) scenario, where two sources exchange information aided by a relay. PNC allows the two sources to transmit to the relay simultaneously, where superimposed signals at the relay can be mapped to network-coded symbols and then be broadcast to both sources instead of being treated as interference. Concurrent transmissions using PNC achieve a higher spectrum efficiency compared to time division and network coding solutions. Existing research mainly focused on the symmetric PNC designs, where the same channel coding and modulation configurations are applied by both sources. When the channel conditions of the two source-relay links are asymmetric or unequal amount of data are exchanged, heterogeneous modulation PNC designs are necessary. In additional, the design and optimization of multi-hop PNC, where multiple relays forming a multi-hop path between the two sources, remains an open issue. The above issues motivate the study of this dissertation. This dissertation investigates the design of heterogeneous modulation physical layer network coding (HePNC), the integration of channel error control coding into HePNC, the combination of HePNC with hierarchical modulation, and the design and generalization of multi-hop PNC. The contributions of this dissertation are four-fold. First, under the asymmetric TWRC scenario, where the channel conditions of the two source-relay links are asymmetric, we designed a HePNC protocol, including the optimization of the adaptive mapping functions and the bit-symbol labeling, to minimize the end-to-end BER. In addition, we developed an analytical framework to derive the BER of HePNC. HePNC can substantially enhance the throughput compared to the existing symmetric PNC under the asymmetric TWRC scenario. Second, we investigated channel coded HePNC and integrated the channel error control coding into HePNC in a link-to-link coding, where the relay tries to decode the superimposed codewords in the multi-access stage. A full-state sum-product decoding algorithm is proposed at the relay based on the repeat-accumulate codes to guarantee reliable end-to-end communication. Third, we proposed hierarchical modulation PNC (H-PNC) under asymmetric TWRC, where additional data exchange between the relay and the source with the relatively better channel condition is achieved in addition to that between the two end sources, benefiting from superimposing the additional data flow on the PNC transmission. When the relay also has the data exchange requirement with the source with a better source-relay channel, H-PNC outperforms HePNC and PNC in terms of the system sum throughput. Fourth, we designed and generalized multi-hop PNC, where multiple relays located in a linear topology are scheduled to support the data exchange between two end sources. The impact of error propagation and mutual interference among the nodes are addressed and optimized. The proposed designs outperform the existing ones in terms of end-to-end BER and end-to-end throughout. / Graduate
57

Komunikační systémy založené na principu MB-OFDM / Communication systems based on MB-OFDM

Škapa, Martin January 2009 (has links)
The aim of the Master’s Thesis is to describe ideas of the MB-OFDM principle that represents the possibility of OFDM principle implementation in ultra wideband systems. There are compared physical layers of the IEEE 802.15.3a and the ECMA-368 standard which include the MB-OFDM principle. In practical part of the thesis, there was created a model of ECMA-368 physical layer in MATLAB environment including CDMA access principle. Finally, the MB OFDM system resistance against disturbance and the Peak-to-Average-Power Ratio is analyzed and commented.
58

Model fyzické vrstvy systému LTE / Physical layer model of LTE system

Kounek, Milan January 2013 (has links)
Master’s thesis deals with the signal processing in LTE system, specifically focuses on the physical layer. The first part describes in detail the signal processing at the physical layer of the LTE system. Based on the acquired knowledge of signal processing is created a block diagram that graphically describes the process of the signal processing. Next part deals with the created mathematical model, which is programmed in Matlab. This section describes the limitations of the model, configuration options and view simulation results. The last part shows the results of simulations and analyzed the results.
59

Duplexní simulace systému LTE-Advanced / Duplex simulation of LTE-Advanced system

Třetina, Vítězslav January 2017 (has links)
Master‘s thesis discusses about the issues of LTE-Advanced networks. The paper is divided into 4 parts. At the beginning describes some differences which are other then are mentioned in previous 2G and 3G networks. Next chapter focuses on the physical layer LTE. It describes the structure of transmission frames, channels and functions of transmission signals. It also describes briefly the function of HARQ process, turbo encoder and rate matcher. The penultimate chapter focuses on the design of the LTE-Advanced duplex simulator. The last chapter summarizes the results of the created round-trip simulator in the Matlab environment.
60

Methods and Algorithms to Enhance the Security, Increase the Throughput, and Decrease the Synchronization Delay in 5G Networks

Mazin, Asim 11 March 2019 (has links)
This dissertation presents several novel approaches to enhance security, and increase the throughput, and decrease the delay synchronization in 5G networks. First, a new physical layer paradigm was proposed for secure key exchange between the legitimate communication parties in the presence of a passive eavesdropper was presented. The proposed method ensures secrecy via pre-equalization and guarantees reliable communications using Low-Density Parity Check (LDPC) codes. One of the main findings of this research is to demonstrate through simulations that the diversity order of the eavesdropper will be zero unless the main and eavesdropping channels are almost correlated, while the probability of a key mismatch between the legitimate transmitter and receiver will be low. Simulation results demonstrate that the proposed approach achieves very low secret key mismatch between the legitimate users while ensuring very high error probability at the eavesdropper. Next, a novel medium access control (MAC) protocol Slotted Aloha-NOMA (SAN), directed to Machine to Machine (M2M) communication applications in the 5G Internet of Things (IoT) networks was proposed. SAN is matched to the low-complexity implementation and sporadic traffic requirements of M2M applications. Substantial throughput gains are achieved by enhancing Slotted Aloha with non-orthogonal multiple access (NOMA) and a Successive Interference Cancellation (SIC) receiver that can simultaneously detect multiple transmitted signals using power domain multiplexing. The gateway SAN receiver adaptively learns the number of active devices using a form of multi-hypothesis testing and a novel procedure enables the transmitters to independently select distinct power levels. Simulation results show that the throughput of SAN exceeds that of conventional Slotted Aloha by 80% and that of CSMA/CA by 20% with a probability of transmission of 0.03, with a slightly increased average delay owing to the novel power level selection mechanism. Finally, beam sweeping pattern prediction, based on the dynamic distribution of user traffic, using a form of recurrent neural networks (RNNs) called Gated Recurrent Unit (GRU) is proposed. The spatial distribution of users is inferred from data in call detail records (CDRs) of the cellular network. Results show that the user's spatial distribution and their approximate location (direction) can be accurately predicted based on CDRs data using GRU, which is then used to calculate the sweeping pattern in the angular domain during cell search. Furthermore, the data-driven proposed beam sweeping pattern prediction was compared to random starting point sweeping (RSP) to measure the synchronization delay distribution. Results demonstrate the data- drive beam sweeping pattern prediction enables the UE to initially assess the gNB in approximately 0.41 of a complete scanning cycle that is required by the RSP scheme with probability 0.9 in a sparsely distributed UE scenario.

Page generated in 0.1112 seconds