• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 252
  • 70
  • 68
  • 24
  • 23
  • 18
  • 14
  • 10
  • 4
  • 3
  • 3
  • 3
  • 3
  • 1
  • 1
  • Tagged with
  • 567
  • 105
  • 96
  • 95
  • 94
  • 94
  • 88
  • 86
  • 82
  • 80
  • 80
  • 79
  • 71
  • 60
  • 56
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
251

Robust Beamforming for Two-Way Relay Systems

Aziz, Ahsan 16 December 2013 (has links)
In wireless communication systems, relays are widely used to extend coverage. Over the past years, relays have evolved from simple repeaters to more sophisticated units that perform signal processing to improve signal to interference plus noise ratio (SINR) or throughput (or both) at the destination receiver. There are various types of relays such as amplify and forward (AF), decode and forward (DF), and compress and forward (CF) (or estimate and forward (EF)) relays. In addition, recently there has been a growing interest in two-way relays (TWR). By utilizing the concept of analog network coding (ANC), TWRs can improve the throughput of a wireless sys- tem by reducing the number of time slots needed to complete a bi-directional message exchange between two destination nodes. It’s well known that the performance of a TWR system greatly depends on its ability to apply signal processing techniques to effectively mitigate the self-interference and noise accumulation, thereby improving the SINR. We study a TWR system that is equipped with multiple antennas at the relay node and a single antenna at the two destination nodes. Different from traditional work on TWR, we focus on the case with imperfect knowledge of channel state information (CSI). For such a TWR, we formulate a robust optimization problem that takes into ac- count norm-bounded estimation errors in CSI and designs an optimal beamforming matrix. Realizing the fact that this problem is extremely hard to solve globally, we derive two different methods to obtain either optimal or efficient suboptimal beam- forming matrix solutions. The first method involves solving the robust optimization problem using the S-procedure and semidefinite programming (SDP) with rank-one relaxation. This method provides an optimal solution when the rank-one relaxation condition for the SDP is satisfied. In cases where the rank-one condition cannot be satisfied, it’s necessary to resort to sub-optimal techniques. The second approach presented here reformulates the robust non-convex quadratically constrained quadratic programming (QCQP) into a robust linear programming (LP) problem by using first-order perturbation of the optimal non-robust beamforming solution (which assumes no channel estimation error). Finally, we view the TWR robust beamforming problem from a practical standpoint and develop a set of iterative algorithms based on Newton’s method or the steepest descent method that are practical for hardware implementation.
252

Quantitative Analysis of Multihop CDMA Cellular Networks

Radwan, AYMAN 02 February 2009 (has links)
Multihop Cellular Networks (MCNs) form combined wireless paradigm that carries the advantages of both traditional cellular networks and wireless multihop relay. Cellular networks depend on a fixed infrastructure to provide wide area coverage for users with high mobility profile. Multihop relay networks depend on wireless devices inside the network to relay signals through multiple hops from source to destination. MCNs were proposed to overcome inherent drawbacks in cellular networks like congestion and dead spots. These gains build on the characteristics of multihop relay that result in increased capacity, decrease energy depletion and virtually extended coverage. But while these gains have been widely accepted and advocated, they have not been verified in rigor. A realistic need therefore exists to quantify these gains in order to realize more capable network management functionalities for this new paradigm. In this thesis, we present an analytical framework for MCNs. We quantify the capacity and energy consumption in MCNs, while considering various call distributions, network loads and transmission power. We apply our framework to Code Division Multiple Access (CDMA) cellular networks, which are very dependent on interference levels in their performance. Our results show that capacity can be increased in CDMA cellular networks using multihop relay by increasing either the number of simultaneous calls or data rates. We also demonstrate that consumed energy is decreased in MCNs, especially in environments with high path loss. We validate that multihop relay is most rewarding when calls tend to originate near cell borders. Beyond verifying basic claims, we explore other potential gains of MCNs. We investigate the viability of congestion relief and load balancing and substantiate the benefits for congested cells neighbored by lightly loaded cells. Load balancing has also been shown to increase data rates and fairness in user allocations. Lastly, we explore enabling multimedia applications in MCNs and study the application of data rate adaptations given multiple classes of service. A key advantage of our work is that, while applied to CDMA in this thesis, the presented analytical framework can be extended to other technologies. The framework also accommodates both mobile and fixed network relay elements, expanding its applicability to next generation cellular networks. / Thesis (Ph.D, Electrical & Computer Engineering) -- Queen's University, 2009-01-30 09:34:39.735
253

Relay Selection in Two-Hop Wireless Communications

Ju, MinChul 23 August 2010 (has links)
Relay communication has been shown to be effective to extend service coverage and mitigate channel impairments. This thesis focuses on relay selection (RS) of both unidirectional and bidirectional relay networks employing the amplify-and-forward (AF) and decode-and-forward (DF) protocols. This thesis presents four works on RS in two-hop relay networks. In the first work, we study opportunistic relaying (OR) and selection cooperation (SC) in DF-based unidirectional multi-antennas relay networks. We first propose two joint relay-and-antenna selection schemes which combine OR and SC, respectively, with transmit antenna selection. For each joint selection scheme, a single best transmit antenna at the source, a single best relay, and a single best transmit antenna at this selected relay are jointly determined. Then we derive the outage probabilities, and show that the two schemes achieve the same outage performance. In the second work, we study RS with the physical-layer network coding (PNC) in DF-based bidirectional relay networks. By modifying the well-known SC and OR, we first propose two RS schemes for the PNC network: SC-PNC and OR-PNC. Then we derive the outage probability and diversity order of the SC-PNC. Finally, we show that the OR-PNC achieves the same outage performance as the SC-PNC. In the third work, we study RS with the analog network coding (ANC) and time division broadcast (TDBC), in AF-based bidirectional relay networks. We first consider RS schemes for the ANC and TDBC protocols based on a max-min criterion. Then we derive outage probabilities for the ANC and TDBC protocols. In the fourth work, we study joint relay-and-source selection in an AF-based bidirectional relay network. Since RS and opportunistic source selection (OSS) could individually improve performance of relay networks, we propose a joint RS-OSS protocol. In this network, a best source is selected to transmit data to the other source with the help of a selected best relay. Then, we derive the outage probability and average bit-error rate. The considered RS schemes and obtained outage probability expressions will help the design of two-hop wireless communications in determining the system parameters such as relay location and the transmission power at each terminal. / Thesis (Ph.D, Electrical & Computer Engineering) -- Queen's University, 2010-08-23 15:29:50.026
254

A PERFORMANCE COMPARISON OF FRAME STRUCTURES IN WIMAX MULTI-HOP RELAY NETWORKS

Kolomitro, Pandeli 10 September 2010 (has links)
Wireless multi-hop relay systems are the newest amendment to the IEEE 802.16 standard for local and metropolitan area networks, else known as WiMAX. Relay systems come in different flavours, based on their capabilities and have the potential to offer many advantages over the single-hop technology. Upcoming broadband wireless technologies, that utilize multi-hop relays, need good network planning and design in order to achieve their full potential. There are two main types of multi-hop relay stations: transparent, which are not able to transmit control information and non-transparent, which have the capability to transmit such information. This study focuses mainly on non-transparent relay stations due to their complexity and ability to operate in a more than two hop environment. Currently, the latest IEEE amendment provides two different frame structures − single and multi-frame − for utilization in multi-hop relay networks, to allocate bandwidth. The purpose of this thesis is to evaluate the two proposed frame structures, in various network scenarios in terms of delay, throughput, rate, and user capacity. In addition, we will discuss some of the issues that need to be considered to cost effectively plan and design a multi-hop relay network. The evaluation methodology that we utilize is in accordance with the Multi-hop Relay System Evaluation Methodology developed by the IEEE 802.16 Broadband Wireless Access Working Group. To evaluate the above frame structures we developed an evaluation model for use in the network simulator 2 (ns2) from University of California Berkeley, by modifying the light WiMAX (LWX) add-on from Taiwan University. Unlike the original LWX module, which supports only transparent relay configurations, our module supports both multi-frame and single frame structures, as well as non-transparent multi-hop relay environments. To our knowledge there is no previous work, which analyzes the performance of the single frame and multi-frame system in multi-hope relay environments using the guidelines from the latest amendment to the standard (IEEE 802.16j-2009). Moreover, there is no publicly available software that will enable the study of such performance. The resulting source code of our work has been made publicly available and can be obtained from our website. / Thesis (Master, Electrical & Computer Engineering) -- Queen's University, 2010-09-09 23:55:00.995
255

Information Leakage Neutralization for the Multi-Antenna Non-Regenerative Relay-Assisted Multi-Carrier Interference Channel

Ho, Zuleita, Jorswieck, Eduard, Engelmann, Sabrina 21 October 2013 (has links) (PDF)
In heterogeneous dense networks where spectrum is shared, users' privacy remains one of the major challenges. On a multi-antenna relay-assisted multi-carrier interference channel, each user shares the spectral and spatial resources with all other users. When the receivers are not only interested in their own signals but also in eavesdropping other users' signals, the cross talk on the spectral and spatial channels becomes information leakage. In this paper, we propose a novel secrecy rate enhancing relay strategy that utilizes both spectral and spatial resources, termed as information leakage neutralization. To this end, the relay matrix is chosen such that the effective channel from the transmitter to the colluding eavesdropper is equal to the negative of the effective channel over the relay to the colluding eavesdropper and thus the information leakage to zero. Interestingly, the optimal relay matrix in general is not block-diagonal which encourages users' encoding over the frequency channels. We proposed two information leakage neutralization strategies, namely efficient information leakage neutralization (EFFIN) and local-optimized information leakage neutralization (LOPTIN). EFFIN provides a simple and efficient design of relay processing matrix and precoding matrices at the transmitters in the scenario of limited power and computational resources. LOPTIN, despite its higher complexity, provides a better sum secrecy rate performance by optimizing the relay processing matrix and the precoding matrices jointly. The proposed methods are shown to improve the sum secrecy rates over several state-of-the-art baseline methods.
256

Light-Weight Authentication Schemes with Applications to RFID Systems

Malek, Behzad 03 May 2011 (has links)
The first line of defence against wireless attacks in Radio Frequency Identi cation (RFID) systems is authentication of tags and readers. RFID tags are very constrained in terms of power, memory and size of circuit. Therefore, RFID tags are not capable of performing sophisticated cryptographic operations. In this dissertation, we have designed light-weight authentication schemes to securely identify the RFID tags to readers and vice versa. The authentication schemes require simple binary operations and can be readily implemented in resource-constrained Radio Frequency Identi cation (RFID) tags. We provide a formal proof of security based on the di culty of solving the Syndrome Decoding (SD) problem. Authentication veri es the unique identity of an RFID tag making it possible to track a tag across multiple readers. We further protect the identity of RFID tags by a light-weight privacy protecting identifi cation scheme based on the di culty of the Learning Parity with Noise (LPN) complexity assumption. To protect RFID tags authentication against the relay attacks, we have designed a resistance scheme in the analog realm that does not have the practicality issues of existing solutions. Our scheme is based on the chaos-suppression theory and it is robust to inconsistencies, such as noise and parameters mismatch. Furthermore, our solutions are based on asymmetric-key algorithms that better facilitate the distribution of cryptographic keys in large systems. We have provided a secure broadcast encryption protocol to effi ciently distribute cryptographic keys throughout the system with minimal communication overheads. The security of the proposed protocol is formally proven in the adaptive adversary model, which simulates the attacker in the real world.
257

Cross-Layer Design for Cooperative Wireless Networking

Wang, Ning 30 August 2013 (has links)
In this dissertation, we study cross-layer design for cooperative wireless data communication networks. Based on the characteristics of cooperative wireless communications, and the requirement of Quality of Service (QoS) provisioning for data networks, we consider cross-layer system design for cooperative wireless networking. Three major design issues which cover cooperative link establishment, information security of cooperative communications, and cross-layer cooperative transmission scheduling, are investigated. Specifically, we follow the communication procedure in cooperative wireless systems and investigate several cross-layer design problems. Considering the queueing behavior of data buffers at the candidate relays, we study relay selection from a queue-aware perspective which takes into account the queueing systems at both the source and the potential relays. With the cooperative link established, we then study the secret key establishment problem by cross-layer cooperative discussion. Then cross-layer transmission scheduling is investigated from two perspectives. We first look at cross-layer adaptive modulation and coding (AMC), which takes both the channel condition and traffic intensity into consideration in the scheduling design. A more general queue-aware scheduler state selection mechanism based on buffer queue occupancy is studied, and optimization by nonlinear integer programming is presented. / Graduate / 0544
258

Optimal Relay Station Placement in Broadband Wireless Access Networks

Vasishta, Anuj January 2012 (has links)
With the development of IEEE 802.16j multihop relay protocol, the requirement to enhance the network capacity in a wireless network has been met e ectively. In this thesis, we study the capacity enhancement problem for a broadband wireless access network which is achieved by optimal placement of Relay Stations (RSs) along with the presence of a Base Station (BS) and multiple Candidate Positions (CPs). We present a mixed integer programming formulation for the crucial task of RS placement. Weighted objective is also explored to include preferential RS placement. The proposed formulations are solved in a matter of seconds. It is observed that with preferential RS placement, the same demand can be met with 73% fewer RSs with a slight, 6%, decrease in the overall network capacity. Moving forward, the objective is broadened to combine and include joint BS and RS placements for a given network. This model formulation provides better overall capacity than combined capacities of RS placement formulations. Maximin objective is introduced to distribute the excess bandwidth to all subscriber stations (SS) rather than assigning it to only one SS. With this approach, bandwidth allocated to each SS is increases by an average of 35.18%.
259

Throughput and Expected-Rate in Wireless Block Fading Systems

Zamani, Mahdi January 2012 (has links)
This thesis deals with wireless channels in uncorrelated block fading environment with Rayleigh distribution. All nodes are assumed to be oblivious to their forward channel gains; however, they have perfect information about their backward channel gains. We also assume a stringent decoding delay constraint of one fading block that makes the definition of ergodic (Shannon) capacity meaningless. In this thesis, we focus on two different systems. In each case, the throughput and expected-rate are analyzed. First, the point-to-point multiple-antenna channel is investigated in chapter 2. We prove that in multiple-input single-output (MISO) channels, the optimum transmission strategy maximizing the throughput is to use all available antennas and perform equal power allocation with uncorrelated signals. Furthermore, to increase the expected-rate, multilayer coding (the broadcast approach) is applied. Analogously, we establish that sending uncorrelated signals and performing equal power allocation across all available antennas at each layer is optimum. A closed form expression for the maximum continuous-layer expected-rate of MISO channels is also obtained. Moreover, we investigate multiple-input multiple-output (MIMO) channels, and formulate the maximum throughput in the asymptotically low and high SNR regimes and also asymptotically large number of transmit or receive antennas by obtaining the optimum transmit covariance matrix. Furthermore, a distributed antenna system, wherein two single-antenna transmitters want to transmit a common message to a single-antenna receiver, is considered. It is shown that this system has the same outage probability and hence, throughput and expected-rate, as a point-to-point 2x1 MISO channel. In chapter 3, the problem of dual-hop transmission from a single-antenna source to a single-antenna destination via two parallel full-duplex single-antenna relays under the above assumptions is investigated. The focus of this chapter is on simple, efficient, and practical relaying schemes to increase the throughput and expected-rate at the destination. For this purpose, various combinations of relaying protocols and multi-layer coding are proposed. For the decode-forward (DF) relaying, the maximum finite-layer expected-rate as well as two upper-bounds on the continuous-layer expected-rate are obtained. The main feature of the proposed DF scheme is that the layers being decoded at both relays are added coherently at the destination although each relay has no information about the number of layers being successfully decoded by the other relay. It is proved that the optimum coding scheme is transmitting uncorrelated signals via the relays. Next, the maximum expected-rate of ON/OFF based amplify-forward (AF) relaying is analytically formulated. For further performance improvement, a hybrid decode-amplify-forward (DAF) relaying strategy, adopting multi-layer coding at the source and relays, is proposed and its maximum throughput and finite-layer expected-rate are presented. Moreover, the maximum throughput and expected-rate in the compress-forward (CF) relaying adopting multi-layer coding, using optimal quantizers and Wyner-Ziv compression at the relays, are fully derived. All theoretical results are illustrated by numerical simulations. As it turns out from the results, when the ratio of the relay power to the source power is high, the CF relaying outperforms DAF (and hence outperforms both DF and AF relaying); otherwise, DAF scheme is superior.
260

Negotiating social and moral order in internet relay chat

Lawson, Danielle January 2008 (has links)
Although internet chat is a significant aspect of many internet users’ lives, the manner in which participants in quasi-synchronous chat situations orient to issues of social and moral order remains to be studied in depth. The research presented here is therefore at the forefront of a continually developing area of study. This work contributes new insights into how members construct and make accountable the social and moral orders of an adult-oriented Internet Relay Chat (IRC) channel by addressing three questions: (1) What conversational resources do participants use in addressing matters of social and moral order? (2) How are these conversational resources deployed within IRC interaction? and (3) What interactional work is locally accomplished through use of these resources? A survey of the literature reveals considerable research in the field of computer-mediated communication, exploring both asynchronous and quasi-synchronous discussion forums. The research discussed represents a range of communication interests including group and collaborative interaction, the linguistic construction of social identity, and the linguistic features of online interaction. It is suggested that the present research differs from previous studies in three ways: (1) it focuses on the interaction itself, rather than the ways in which the medium affects the interaction; (2) it offers turn-by-turn analysis of interaction in situ; and (3) it discusses membership categories only insofar as they are shown to be relevant by participants through their talk. Through consideration of the literature, the present study is firmly situated within the broader computer-mediated communication field. Ethnomethodology, conversation analysis and membership categorization analysis were adopted as appropriate methodological approaches to explore the research focus on interaction in situ, and in particular to investigate the ways in which participants negotiate and co-construct social and moral orders in the course of their interaction. IRC logs collected from one chat room were analysed using a two-pass method, based on a modification of the approaches proposed by Pomerantz and Fehr (1997) and ten Have (1999). From this detailed examination of the data corpus three interaction topics are identified by means of which participants clearly orient to issues of social and moral order: challenges to rule violations, ‘trolling’ for cybersex, and experiences regarding the 9/11 attacks. Instances of these interactional topics are subjected to fine-grained analysis, to demonstrate the ways in which participants draw upon various interactional resources in their negotiation and construction of channel social and moral orders. While these analytical topics stand alone in individual focus, together they illustrate different instances in which participants’ talk serves to negotiate social and moral orders or collaboratively construct new orders. Building on the work of Vallis (2001), Chapter 5 illustrates three ways that rule violation is initiated as a channel discussion topic: (1) through a visible violation in open channel, (2) through an official warning or sanction by a channel operator regarding the violation, and (3) through a complaint or announcement of a rule violation by a non-channel operator participant. Once the topic has been initiated, it is shown to become available as a topic for others, including the perceived violator. The fine-grained analysis of challenges to rule violations ultimately demonstrates that channel participants orient to the rules as a resource in developing categorizations of both the rule violation and violator. These categorizations are contextual in that they are locally based and understood within specific contexts and practices. Thus, it is shown that compliance with rules and an orientation to rule violations as inappropriate within the social and moral orders of the channel serves two purposes: (1) to orient the speaker as a group member, and (2) to reinforce the social and moral orders of the group. Chapter 6 explores a particular type of rule violation, solicitations for ‘cybersex’ known in IRC parlance as ‘trolling’. In responding to trolling violations participants are demonstrated to use affiliative and aggressive humour, in particular irony, sarcasm and insults. These conversational resources perform solidarity building within the group, positioning non-Troll respondents as compliant group members. This solidarity work is shown to have three outcomes: (1) consensus building, (2) collaborative construction of group membership, and (3) the continued construction and negotiation of existing social and moral orders. Chapter 7, the final data analysis chapter, offers insight into how participants, in discussing the events of 9/11 on the actual day, collaboratively constructed new social and moral orders, while orienting to issues of appropriate and reasonable emotional responses. This analysis demonstrates how participants go about ‘doing being ordinary’ (Sacks, 1992b) in formulating their ‘first thoughts’ (Jefferson, 2004). Through sharing their initial impressions of the event, participants perform support work within the interaction, in essence working to normalize both the event and their initial misinterpretation of it. Normalising as a support work mechanism is also shown in relation to participants constructing the ‘quiet’ following the event as unusual. Normalising is accomplished by reference to the indexical ‘it’ and location formulations, which participants use both to negotiate who can claim to experience the ‘unnatural quiet’ and to identify the extent of the quiet. Through their talk participants upgrade the quiet from something legitimately experienced by one person in a particular place to something that could be experienced ‘anywhere’, moving the phenomenon from local to global provenance. With its methodological design and detailed analysis and findings, this research contributes to existing knowledge in four ways. First, it shows how rules are used by participants as a resource in negotiating and constructing social and moral orders. Second, it demonstrates that irony, sarcasm and insults are three devices of humour which can be used to perform solidarity work and reinforce existing social and moral orders. Third, it demonstrates how new social and moral orders are collaboratively constructed in relation to extraordinary events, which serve to frame the event and evoke reasonable responses for participants. And last, the detailed analysis and findings further support the use of conversation analysis and membership categorization as valuable methods for approaching quasi-synchronous computer-mediated communication.

Page generated in 0.027 seconds