• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 252
  • 70
  • 68
  • 24
  • 23
  • 18
  • 14
  • 10
  • 4
  • 3
  • 3
  • 3
  • 3
  • 1
  • 1
  • Tagged with
  • 567
  • 105
  • 96
  • 95
  • 94
  • 94
  • 88
  • 86
  • 82
  • 80
  • 80
  • 79
  • 71
  • 60
  • 56
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Parameter Estimation and Tracking in Physical Layer Network Coding

Jain, Manish 2011 May 1900 (has links)
Recently, there has been a growing interest in improving the performance of the wireless relay networks through the use of Physical Layer Network Coding (PLNC) techniques. The physical layer network coding technique allows two terminals to transmit simultaneously to a relay node and decode the modulo-2 sum of the transmitted bits at the relay. This technique considerably improves performance over Digital Network Coding technique. In this thesis, we will present an algorithm for joint decoding of the modulo-2 sum of bits transmitted from two unsynchronized transmitters at the relay. We shall also address the problems that arise when boundaries of the signals do not align with each other and when the channel parameters are slowly varying and are unknown to the receiver at the relay node. Our approach will first jointly estimate the timing o sets and fading gains of both signals using a known pilot sequence sent by both transmitters in the beginning of the packet and then perform Maximum Likelihood detection of data using a state-based Viterbi decoding scheme that takes into account the timing o sets between the interfering signals. We shall present an algorithm for simultaneously tracking the amplitude and phase of slowly varying wireless channel that will work in conjunction our Maximum Likelihood detection algorithm. Finally, we shall provide extension of our receiver to support antenna diversity. Our results show that the proposed detection algorithm works reasonably well, even with the assumption of timing misalignment. We also demonstrate that the performance of the algorithm is not degraded by amplitude and/or phase mismatch between the users. We further show that the performance of the channel tracking algorithm is close to the ideal case i.e. when the channel estimates are perfectly known. Finally, we demonstrate the performance boost provided by the receiver antenna diversity.
202

Limited Feedback Information in Wireless Communications : Transmission Schemes and Performance Bounds

Kim, Thanh Tùng January 2008 (has links)
This thesis studies some fundamental aspects of wireless systems with partial channel state information at the transmitter (CSIT), with a special emphasis on the high signal-to-noise ratio (SNR) regime. The first contribution is a study on multi-layer variable-rate communication systems with quantized feedback, where the expected rate is chosen as the performance measure. Iterative algorithms exploiting results in the literature of parallel broadcast channels are developed to design the system parameters. Necessary and sufficient conditions for single-layer coding to be optimal are derived. In contrast to the ergodic case, it is shown that a few bits of feedback information can improve the expected rate dramatically. The next part of the thesis is devoted to characterizing the tradeoff between diversity and multiplexing gains (D-M tradeoff) over slow fading channels with partial CSIT. In the multiple-input multiple-output (MIMO) case, we introduce the concept of minimum guaranteed multiplexing gain in the forward link and show that it influences the D-M tradeoff significantly. It is demonstrated that power control based on the feedback is instrumental in achieving the D-M tradeoff, and that rate adaptation is important in obtaining a high diversity gain even at high rates. Extending the D-M tradeoff analysis to decode-and-forward relay channels with quantized channel state feedback, we consider several different scenarios. In the relay-to-source feedback case, it is found that using just one bit of feedback to control the source transmit power is sufficient to achieve the multiantenna upper bound in a range of multiplexing gains. In the destination-to-source-and-relay feedback scenario, if the source-relay channel gain is unknown to the feedback quantizer at the destination, the diversity gain only grows linearly in the number of feedback levels, in sharp contrast to an exponential growth for MIMO channels. We also consider the achievable D-M tradeoff of a relay network with the compress-and-forward protocol when the relay is constrained to make use of standard source coding. Under a short-term power constraint at the relay, using source coding without side information results in a significant loss in terms of the D-M tradeoff. For a range of multiplexing gains, this loss can be fully compensated for by using power control at the relay. The final part of the thesis deals with the transmission of an analog Gaussian source over quasi-static fading channels with limited CSIT, taking the SNR exponent of the end-to-end average distortion as performance measure. Building upon results from the D-M tradeoff analysis, we develop novel upper bounds on the distortion exponents achieved with partial CSIT. We show that in order to achieve the optimal scaling, the CSIT feedback resolution must grow logarithmically with the bandwidth ratio for MIMO channels. The achievable distortion exponent of some hybrid schemes with heavily quantized feedback is also derived. As for the half-duplex fading relay channel, combining a simple feedback scheme with separate source and channel coding outperforms the best known no-feedback strategies even with only a few bits of feedback information. / QC 20100817
203

Light-Weight Authentication Schemes with Applications to RFID Systems

Malek, Behzad 03 May 2011 (has links)
The first line of defence against wireless attacks in Radio Frequency Identi cation (RFID) systems is authentication of tags and readers. RFID tags are very constrained in terms of power, memory and size of circuit. Therefore, RFID tags are not capable of performing sophisticated cryptographic operations. In this dissertation, we have designed light-weight authentication schemes to securely identify the RFID tags to readers and vice versa. The authentication schemes require simple binary operations and can be readily implemented in resource-constrained Radio Frequency Identi cation (RFID) tags. We provide a formal proof of security based on the di culty of solving the Syndrome Decoding (SD) problem. Authentication veri es the unique identity of an RFID tag making it possible to track a tag across multiple readers. We further protect the identity of RFID tags by a light-weight privacy protecting identifi cation scheme based on the di culty of the Learning Parity with Noise (LPN) complexity assumption. To protect RFID tags authentication against the relay attacks, we have designed a resistance scheme in the analog realm that does not have the practicality issues of existing solutions. Our scheme is based on the chaos-suppression theory and it is robust to inconsistencies, such as noise and parameters mismatch. Furthermore, our solutions are based on asymmetric-key algorithms that better facilitate the distribution of cryptographic keys in large systems. We have provided a secure broadcast encryption protocol to effi ciently distribute cryptographic keys throughout the system with minimal communication overheads. The security of the proposed protocol is formally proven in the adaptive adversary model, which simulates the attacker in the real world.
204

Channel estimation in a two-way relay network

Nwaekwe, Chinwe M. 01 August 2011 (has links)
In wireless communications, channel estimation is necessary for coherent symbol detection. This thesis considers a network which consists of two transceivers communicating with the help of a relay applying the amplify-and-forward (AF) relaying scheme. The training based channel estimation technique is applied to the proposed network where the numbers of the training sequence transmitted by the two transceivers, are different. All three terminals are equipped with a single antenna for signal transmission and reception. Communication between the transceivers is carried out in two phases. In the first phase, each transceiver sends a transmission block of data embedded with known training symbols to the relay. In the second phase, the relay retransmits an amplified version of the received signal to both transceivers. Estimates of the channel coefficients are obtained using the Maximum Likelihood (ML) estimator. The performance analysis of the derived estimates are carried out in terms of the mean squared error (MSE) and we determine conditions required to increase the estimation accuracy. / UOIT
205

Optimization in multi-relay wireless networks

Nguyen, Huu Ngoc Duy 08 June 2009
The concept of cooperation in communications has drawn a lot of research attention in recent years due to its potential to improve the efficiency of wireless networks. This new form of communications allows some users to act as relays and assist the transmission of other users' information signals. The aim of this thesis is to apply optimization techniques in the design of multi-relay wireless networks employing cooperative communications. In general, the thesis is organized into two parts: ``Distributed space-time coding' (DSTC) and ``Distributed beamforming', which cover two main approaches in cooperative communications over multi-relay networks. <br><br> In Part I of the thesis, various aspects of distributed implementation of space-time coding in a wireless relay network are treated. First, the thesis proposes a new fully-diverse distributed code which allows noncoherent reception at the destination. Second, the problem of coordinating the power allocation (PA) between source and relays to achieve the optimal performance of DSTC is studied and a novel PA scheme is developed. It is shown that the proposed PA scheme can obtain the maximum diversity order of DSTC and significantly outperform other suboptimal PA schemes. Third, the thesis presents the optimal PA scheme to minimize the mean-square error (MSE) in channel estimation during training phase of DSTC. The effect of imperfect channel estimation to the performance of DSTC is also thoroughly studied. <br><br> In Part II of the thesis, optimal distributed beamforming designs are developed for a wireless multiuser multi-relay network. Two design criteria for the optimal distributed beamforming at the relays are considered: (i) minimizing the total relay power subject to a guaranteed Quality of Service (QoS) measured in terms of signal-to-noise-ratio (SNR) at the destinations, and (ii) jointly maximizing the SNR margin at the destinations subject to power constraints at the relays. Based on convex optimization techniques, it is shown that these problems can be formulated and solved via second-order conic programming (SOCP). In addition, this part also proposes simple and fast iterative algorithms to directly solve these optimization problems.
206

Light-Weight Authentication Schemes with Applications to RFID Systems

Malek, Behzad 03 May 2011 (has links)
The first line of defence against wireless attacks in Radio Frequency Identi cation (RFID) systems is authentication of tags and readers. RFID tags are very constrained in terms of power, memory and size of circuit. Therefore, RFID tags are not capable of performing sophisticated cryptographic operations. In this dissertation, we have designed light-weight authentication schemes to securely identify the RFID tags to readers and vice versa. The authentication schemes require simple binary operations and can be readily implemented in resource-constrained Radio Frequency Identi cation (RFID) tags. We provide a formal proof of security based on the di culty of solving the Syndrome Decoding (SD) problem. Authentication veri es the unique identity of an RFID tag making it possible to track a tag across multiple readers. We further protect the identity of RFID tags by a light-weight privacy protecting identifi cation scheme based on the di culty of the Learning Parity with Noise (LPN) complexity assumption. To protect RFID tags authentication against the relay attacks, we have designed a resistance scheme in the analog realm that does not have the practicality issues of existing solutions. Our scheme is based on the chaos-suppression theory and it is robust to inconsistencies, such as noise and parameters mismatch. Furthermore, our solutions are based on asymmetric-key algorithms that better facilitate the distribution of cryptographic keys in large systems. We have provided a secure broadcast encryption protocol to effi ciently distribute cryptographic keys throughout the system with minimal communication overheads. The security of the proposed protocol is formally proven in the adaptive adversary model, which simulates the attacker in the real world.
207

La co-construction d'un dispositif sociotechnique de communication : le cas de l'internet relay chat

Latzko-Toth, Guillaume 05 1900 (has links) (PDF)
Cette thèse porte sur la dynamique sociotechnique à l'oeuvre dans le développement d'un dispositif de chat via Internet: l'Internet Relay Chat (IRC). Elle montre qu'il est constamment co-construit par un ensemble d'actants humains et non humains organisés en réseaux sociotechniques appelés « réseaux IRC », parmi lesquels on ne peut distinguer de façon nette les usagers et les concepteurs du dispositif. La thèse s'attache à comprendre les modalités et les mobiles de cette co-construction. Située à l'intersection de deux champs d'étude: la sociologie de l'innovation -dans la perspective des Science & Technology Studies (STS)- et les études sur la communication médiatisée par ordinateur (CMO), notre problématique s'inscrit dans le sillage d'apports théoriques récents qui font valoir que le rôle des usagers dans la construction des dispositifs avait été sous-estimé, en particulier dans le cas des artefacts numériques, qui semblent offrir une plus grande «plasticité» à l'usage. Alors que l'idée d'un usager non seulement acteur, mais aussi contributeur des dispositifs techniques est de plus en plus fréquemment mise de l'avant aujourd'hui, nous constatons que la nature de cette contribution est souvent limitée au contenu. Le cas de l'IRC est intéressant en ce qu'il donne à voir la contribution des usagers à la structure même du dispositif. La recherche s'appuie sur un cadre conceptuel issu de trois approches théoriques en STS : la construction sociale des technologies, la théorie de l'acteur-réseau et le modèle « écologique » des mondes sociaux. Ces trois approches sont mises à contribution pour fournir les éléments d'une théorie de la co-construction qui, par rapport aux modèles classiques de l'innovation, redistribue la capacité d'agir entre les acteurs du développement d'un dispositif sociotechnique. Ainsi, les rôles de concepteur et d'usager s'avèrent être eux-mêmes co-construits dans le processus. Les concepts de communauté de pratique et d'arène d'habileté technique sont mobilisés pour expliquer les ressorts sociaux de l'engagement des acteurs dans cette co-construction. Au plan méthodologique, la recherche est une étude de cas portant plus spécifiquement sur la genèse et le développement de deux des principaux réseaux IRC: EFnet et Undernet. L'objet d'étude spécifique est constitué d'une série de controverses survenues entre 1990 et 2001 et ayant abouti à des sauts qualitatifs dans l'évolution de ces réseaux. Les méthodes mobilisées sont principalement l'analyse de discours et l'ethnographie en ligne, combinées aux techniques d'enquête sur les controverses sociotechniques propres aux STS. Concrètement, le protocole d'enquête a consisté en trois points: a) observation en ligne; b) étude de contenu et analyse de discours portant sur un corpus de documentation disponible sur le Web ainsi que sur les archives de quatre listes de discussion et de deux forums Usenet; et c) entretiens en ligne synchrones et asynchrones avec une douzaine d'acteurs clé du développement de l'IRC. Tandis que l'identification de moments critiques dans le développement du dispositif a permis de repérer des controverses et événements structurants, c'est leur analyse qui a fait ressortir la notion de service comme clé pour comprendre les modalités de coconstruction du dispositif. Entendu initialement dans son sens courant (lié à la notion d'usager au sens de client), le service s'est peu à peu «traduit» sous la forme de programmes de plus en plus élaborés jusqu'à constituer des boîtes (presque) noires: les «robots» (bots) officiels ou services IRC. Sur EFnet, ce processus a été longtemps inhibé voire réprimé. Mais les usagers ont développé leurs propres réponses aux lacunes que comportait le protocole technique originel, notamment en créant leurs propres bots pour protéger leurs canaux. Par contraste, les promoteurs d'Undemet ont voulu se démarquer d'EFnet en plaçant le service aux usagers et l'implication de l'usager dans le dispositif au coeur de leur projet. Sur Undemet, le channel service est un concept hybride: c'est un service au sens organisationnel, et un service au sens technique de bot. Le flou définitionnel entourant la notion de service dans le discours des acteurs de l'IRC révèle son statut d'objet-frontière autour duquel s'articulent des «philosophies» du chat parfois divergentes au point de creuser des frontières techniques entre réseaux IRC et, par là même, entre communautés de pratique du chat. ______________________________________________________________________________ MOTS-CLÉS DE L’AUTEUR : innovation technique, communication médiatisée par ordinateur, dispositif de chat, co-construction, objet-frontière
208

Optimal Power Allocation for a Successive Refinable Source with Multiple Descriptions over a Fading Relay Channel Using Broadcast/Multicast Strategies

Shi, Kun January 2009 (has links)
In a wireless fading relay system with multicast/broadcast transmission, one of the most crucial challenges is the optimization of a transmission rate under multiuser channel diversity. Previously reported solutions for mitigating the vicious effect due to multi-user channel diversity have been mainly based on superposition coded multicast, where an optimal power allocation to each layer of modulated signals is determined. Many previous studies investigated a harmonic interplay between the successively re nable (SR) content source and a layered modulation via superposition coding (SPC) over the multicast/broadcast channels. By jointly considering the successive re nement characteristic at the source and the dependency of the layered modulation at the channel, a graceful fexibility can be achieved on a group of users with di erent channel realizations. Here most of the receivers are supposed to obtain the base quality layer information modulated in a lower rate, while the receivers with better channel realizations will obtain more information by re ning the base quality layer information using the enhancement quality layer information. In particular, the optimal power allocation for a SR source over a fading relay channel using broadcast/multicast strategy can be determined such that the minimum distortion of total received information is produced. However, a quality layer of data in a successively refined source may not be decodable if there is any loss of channel codewords, even if the corresponding longterm channel realization is su cient for decoding. To overcome this problem, one of the previous studies introduced a framework of coded video multicast, where multiple description coding (MDC) is applied to an SR content source and is further mapped into a layered modulation via SPC at the channel. Up till now, there has not been a rigorous proof provided on the bene t of manipulating the two coding techniques, (i.e. MDC and SPC), nor has any systematic optimization approach been developed for quantifying the parameter selection. Cooperative relaying in wireless networks has recently received much attention. Because the received signal can be severely degraded due to fading in wireless communications, time, frequency and spatial diversity techniques are introduced to overcome fading. Spatial diversity is typically envisioned as having multiple transmit and/or receive antennas. Cooperation can be used here to provide higher rates and results in a more robust system. Recently proposed cooperation schemes, which take into account the practical constraint that the relay cannot transmit and receive at the same time, include amplify-forward(AF), decode-forward(DF), and compress-forward(CF). In this study, in a fading relay scenario, a proposed framework is investigated to tackle the task of layered power allocation, where an in-depth study is conducted on achieving an optimal power allocation in SPC, such that the information distortion perceived at the users can be minimized. This thesis provides a comprehensive formulation on the information distortion at the receivers and a suite of solution approaches for the developed optimization problem by jointly considering MDC and SPC parameter selection over the fading relay channel.
209

Scheduling in omnidirectional relay wireless networks

Wang, Shuning January 2013 (has links)
The capacity of multiuser wireless network, unclear for many years, has always been a hot research topic. Many different operation schemes and coding techniques have been proposed to enlarge the achievable rate region. And omnidirectional relay scheme is one of them. This thesis mainly works on the achievable region of the all-source all-cast network with omnidirectional relay scheme. In order to better understand this problem, we first describe the half-duplex model on the one-dimensional and two-dimensional regular networks. And we present an optimal operation scheme for them to have the maximum achievable rate. For the one-dimensional general network, we proposed an achievable region that indicates valued improvement compared to the previous results. In the full-duplex model of the one-dimensional general network, the maximum achievable rate is presented with a simpler proof in comparison with the previous results. In this thesis, we also show some discussions on more general networks.
210

Joint Source Channel Coding in Broadcast and Relay Channels: A Non-Asymptotic End-to-End Distortion Approach

Ho, James January 2013 (has links)
The paradigm of separate source-channel coding is inspired by Shannon's separation result, which implies the asymptotic optimality of designing source and channel coding independently from each other. The result exploits the fact that channel error probabilities can be made arbitrarily small, as long as the block length of the channel code can be made arbitrarily large. However, this is not possible in practice, where the block length is either fixed or restricted to a range of finite values. As a result, the optimality of source and channel coding separation becomes unknown, leading researchers to consider joint source-channel coding (JSCC) to further improve the performance of practical systems that must operate in the finite block length regime. With this motivation, this thesis investigates the application of JSCC principles for multimedia communications over point-to-point, broadcast, and relay channels. All analyses are conducted from the perspective of end-to-end distortion (EED) for results that are applicable to channel codes with finite block lengths in pursuing insights into practical design. The thesis first revisits the fundamental open problem of the separation of source and channel coding in the finite block length regime. Derived formulations and numerical analyses for a source-channel coding system reveal many scenarios where the EED reduction is positive when pairing the channel-optimized source quantizer (COSQ) with an optimal channel code, hence establishing the invalidity of the separation theorem in the finite block length regime. With this, further improvements to JSCC systems are considered by augmenting error detection codes with the COSQ. Closed-form EED expressions for such system are derived, from which necessary optimality conditions are identified and used in proposed algorithms for system design. Results for both the point-to-point and broadcast channels demonstrate significant reductions to the EED without sacrificing bandwidth when considering a tradeoff between quantization and error detection coding rates. Lastly, the JSCC system is considered under relay channels, for which a computable measure of the EED is derived for any relay channel conditions with nonzero channel error probabilities. To emphasize the importance of analyzing JSCC systems under finite block lengths, the large sub-optimality in performance is demonstrated when solving the power allocation configuration problem according to capacity-based formulations that disregard channel errors, as opposed to those based on the EED. Although this thesis only considers one JSCC setup of many, it is concluded that consideration of JSCC systems from a non-asymptotic perspective not only is more meaningful, but also reveals more relevant insight into practical system design. This thesis accomplishes such by maintaining the EED as a measure of system performance in each of the considered point-to-point, broadcast, and relay cases.

Page generated in 0.0529 seconds