Spelling suggestions: "subject:"aireless"" "subject:"fireless""
741 |
Robust H.264/AVC video transmission in 3G packet-switched networksFarrahi, Katayoun. 10 April 2008 (has links)
No description available.
|
742 |
New beamforming and DOA estimation techniques in wireless communicationsWang, Nanyan. 10 April 2008 (has links)
The development and performance evaluation of new techniques for direction of arrival (DOA) estimation, single-user beamforming (SUB), and multiuser beamforming (MUB) to be used in wireless communications are investigated. Two of the most commonly used beamformer configurations in direct-sequence code-division multiple access (DS-CDMA) systems, the chip-based (CB) and the symbol-based (SB) configurations for the base station (BS) receiver, are studied and their performance is evaluated. It is shown that using the CB configuration, different interfering components are rejected based on the spatial distribution of their power. In the SB configuration, spatial diversity is exploited after despreading and different interfering components are rejected based on their interfering strength which depends on both their power and code correlation with the signal of interest. For the SB configuration, more effort is applied to rejecting the interfering components with higher interfering strength and thus a more selective and efficient system is achieved. Detailed performance analysis and simulations show that in the presence of multipleaccess interference, the SB configuration can lead to a significant improvement in the signal-to-interference-plus-noise ratio relative to that achieved with the CB configuration for both asynchronous and synchronous DS-CDMA systems. A new technique for DOA estimation is proposed. The new technique, called subarray beamforming-based DOA (SBDOA) estimation, uses two virtual subarrays to form a signal whose phase relative to the reference signal is a function of the DOA. The DOA is then estimated based on the computation of the phase shift between the reference signal and the phaseshifted target signal. Since the phase-shifted target signal is obtained after interference rejection through beamforrning, the effect of co-channel interference on the estimation is significantly reduced. The proposed technique is computationally simple and the number of signal sources detectable is iii not bounded by the number of antenna elements used. Performance analysis and extensive simulations show that the proposed technique offers significantly improved estimation resolution, capacity, accuracy, and tracking capability relative to existing techniques. A new SUB algorithm is proposed for the downlink in wireless communication systems. The beam pattern at the BS is determined using a new optimality criterion which takes into consideration the fact that signals from the BS to different mobile stations (MSs) have different power and thus have different resistance to co-channel interference. In this way, the power of co-channel interference in the direction of an MS whose downlink signal has low resistance to co-channel interference can be significantly reduced. Simulation results show that the new algorithm leads to better performance than conventional algorithms in terms of system outage probability. A new MUB algorithm is proposed for joint beamforming and power control for the downlink in wireless communication systems. The optimization problem of optimal MUB is reformulated by modifying the constraints so that the weight vectors at the BS for different MSs are optimized in a feasible region which is a subset of the one of the original MUB problem. The downlink beamforming weight vectors of different MSs are then jointly optimized in a subspace instead of searching in the entire parameter space. Simulation results show that the modified optimization problem leads to solutions that satisfy the signal-to-noise-plus-interference ratio specification at each MS and, at the same time, the total power transmitted from the BS is very close to the optimal one. The solution of the modified optimization problem requires significantly less computation than that of the optimal MUB problem.
|
743 |
Performance analysis of wireless LAN signals transmitted over a ricean fading channel in a pulsed-noise preference environmentSpyrou, Evangelos 09 1900 (has links)
Approved for public release; distribution is unlimited / This thesis examines the performance of the waveforms specified by the IEEE 802.11a wireless local area network standard when the signal is transmitted over a Ricean fading channel with AWGN and pulsed-noise interference. The pulsed interference is assumed to have constant average power and is either fading or nonfading. The probability of bit error is conditional on the received signal-to-noise power ratio, which is modeled as a random variable. The probability density function of this random variable is obtained either analytically or numerically for each modulation type, and the probability of bit error is evaluated as the expected value of the conditional probability. In one case, use is made of a new technique for the numerical inverse of the Laplace transform in order to evaluate numerically the signal-to-noise ratio probability density function. Due to the complexity of the analysis when both the signal and the interference are subject to Ricean fading, the analysis was simplified by assuming Ricean signal fading with Rayleigh interference fading and vice versa. The results of the analysis show that performance is affected by the degree of signal fading and also depends on the pulsed interference duty cycle. The signal-to-interference power ratio affects the way performance depends on these two factors. / Captain, Hellenic Air Force
|
744 |
Performance analysis of IEEE 802.11A signals under different operational environmentsChan, Hsiung Wei Roy 09 1900 (has links)
Approved for public release, distribution is unlimited / With the rapid employment of wireless networks commercially, the military is seeking viable solutions for providing high-speed wireless network throughout the battle space. The IEEE 802.11a wireless LAN presents an attractive solution pro-viding up to 54 Mbps data-link bandwidth. Moreover, it operates in the less congested 5-GHz U-NII band and possesses more operating channels. This research implemented two prototype systems using low-cost commercially available hardware. The Cisco Ai-ronet 1400 wireless bridge and the Proxim Tsunami MP. 11a wireless system were chosen for their superior specifications and for their reputation of being market leaders in IEEE 802.11 wireless products. The performances of the prototype systems were evaluated in three operational environments (land, water and vegetation). The data collected were then compared to the theo-retical performance. / Civilian, Ministry of Defense, Singapore
|
745 |
Wireless tool kit for hand held devicesBaalaji, Venkateshwaraiyer S. 09 1900 (has links)
Approved for public release; distribution is unlimited / Wireless networks can be broadly classified into two types - infrastructure based networks and ad hoc networks. The former uses fixed base stations (infrastructure) which are responsible for coordinating communication between the mobile hosts (nodes). These base stations are interconnected by wired back bones, where as mobile nodes communicate with the base station through the wireless media. The latter one consists of mobile nodes which communicate with each other through wireless medium without any fixed infrastructure. Hence there is no centralized infrastructure that takes care of the routing of information among the participants in the network. There has been a growing interest in ad hoc network in recent years as mobile devices have become more powerful and are capable of processing data like their desktop counterparts. When such a capability is available these devices should be able to share information among them without reliance on existing network infrastructure. Mobile devices are self configurable into either infrastructure or ad hoc mode. Protocols and software have been developed to enable mobile devices to connect to an infrastructure node, where as the same is not the case in the ad hoc environment. Host mobility causes frequent and unpredictable topological changes in a wireless environment. Finding and maintaining routes in ad hoc networks is a non trivial task. This thesis will develop software components that will enable communication in an ad hoc network. These components could be used to build collaborative services in such and ad hoc (802.11) wireless environment. / Major, Indian Air Force
|
746 |
Propagation modeling of wireless systems in shipboard compartmentsChaabane, Adnen 03 1900 (has links)
Approved for public release, distribution is unlimited / In today's navy, it is becoming more and more important to reach all areas onboard a ship with key technical resources. In order to accomplish this goal, the already existing physical networks need to be complemented with wireless capability. A sophisticated Wireless Local Area Network (WLAN) can provide that vital connectivity to the ship's network resources from almost anywhere on the ship. It would allow sailors to access critical information and immediately communicate with others throughout the ship from any standard wireless device (PDA, laptop and many other hand-held devices). In addition, WLANs greatly mitigate problems due to physical damage to wires or fiber optic cables that are used today. Because the navy's emphasis is on building ships with reduced manning, advanced technology, and lower cost in mind, the idea of a WLAN, which has a deep impact on all those areas, has been of a growing interest to the Navy. The purpose of this thesis is to analyze, model, and simulate a wireless environment on board a variety of naval ship compartments, using the Urbana code. Starting from known inputs (frequency, ship compartment geometry, material properties, propagation computation model, and antenna type), analytical results reflecting the propagation mechanisms, coverage area, and security posture of the WLAN are presented. Variable inputs can then be optimized to achieve a desired signal distribution and to meet security requirements for a specific shipboard environment. / Lieutenant Junior Grade, Tunisian Navy
|
747 |
Simulation of physical and media access control (MAC) for resilient and scalable wireless sensor networksChia, Daniel Kim Boon. 03 1900 (has links)
The resilience of wireless sensor networks is investigated. A key concept is that scale-free network principles can be adapted to artificially create resilient wireless sensor networks. As scale-free networks are known to be resilient to errors but vulnerable to attack, a strategy using "cold-start" diversity is proposed to reduce the vulnerability to attacks. The IEEE 802.15.4 MAC and ZigBee protocols are investigated for their ability to form resilient clusters. Our investigation reveals there exists deficiencies in these protocols and the possibility of selfdirected and attack-directed denial-of-service is significant. Through insights gained, techniques are recommended to augment the protocols, increasing their resilience without major changes to the standard itself. Since both topological and protocol resilience properties are investigated, our results reveal important insights. Simulation of the physical and media access control layers using ns-2 is carried out to validate key concepts and approach.
|
748 |
Some issues on multiuser detection in DS-CDMA systemsMao, Zhiwei 24 April 2017 (has links)
In this dissertation, direct-sequence code-division multiple access (DS-CDMA) systems
with multiuser detectors used at receiver are investigated and two kinds of multiuser detectors are developed for DS-CDMA systems.
In the investigation of DS-CDMA systems using multiuser detectors at receiver, a study
on the performance of the system is presented, where heterogeneous traffic with different transmission rates and quality of service (QoS) requirements is supported. The effects of some realistic factors, such as imperfect power control and the existence of multiple cells, on the system performance are studied. In addition, algorithms are proposed to deal with the forward link power allocation problem based on the measurements of random characteristics of the received signals. This power allocation problem is formulated as a constrained optimization problem. To make the problem easy to solve, an additional appropriate constraint is proposed. Two methods are developed to identify the feasible region of this constrained optimization problem.
The first proposed multiuser detector is an adaptive minimum mean-squared-error
(MMSE) detector. Particularly, it is desirable for the cases where communication channels
have severe near-far problem, and thus the convergence rates of adaptive MMSE detectors
for users with different power are quite different. To improve the convergence rates
of adaptive MMSE detectors for weak power users, the interference effects of the strong
power user signals are subtracted from the received signal successively. The method to estimate
the parameters required in the proposed detector is also developed. It is shown that
the proposed detector achieves fast convergence rates in various near-far scenarios. Other
studies conducted include the transient mean-squared-error (MSE) analysis to explain the
different convergence rates of adaptive MMSE detectors for users with different power, and
the bit-error-rate (BER) performance analysis for the proposed detector.
The second proposed multiuser detector is a set of semi-blind linear parallel interference
cancellation (PIC) detectors for the reverse link of multiple-cell systems, where only
information about intra-cell users is available. To decrease the interference from inter-cell
users whose information is unavailable to the receiver, the inter-cell user signal subspace is
identified first by making use of the available information about intra-cell users. The eigenvectors
and eigenvalues of this signal subspace are then used in the traditional linear PIC
structure, in place of the unknown inter-cell users’ signature codes and signal amplitudes.
Based on this idea, three detection schemes are proposed. In addition, an efficient adaptation
implementation method is developed, and the performance of the proposed detectors
is studied. The proposed detectors are shown to be suitable for practical implementations
and have satisfactory performance. / Graduate
|
749 |
Measurement and Characterization of 28 nm FDSOI CMOS Test Circuits for an LTE Wireless Transceiver Front-EndHossain, Mohammad Billal January 2016 (has links)
This master thesis was part of a project at the Acreo Swedish ICT AB to investigate the 28 nm FDSOI CMOS process technology for the LTE front-end application. The project has resulted in a chip that contains different test circuits such as power amplifier (PA), mixer, low noise amplifier (LNA), RF power switch, and a receiver front-end. This thesis presents the evaluation of the RF power switch. At first, a stand-alone six-stacked single pole single throw (SPST) RF power switch was designed according to Rascher, and then it was modified to single pole double throw (SPDT) RF power switch according to the requirements of the project. This report presents an overview of the FDSOI CMOS process, basic theory of the RF switch, and the evaluation techniques. The post-simulation results showed that with the proper substrate biasing and matching (50 Ω), the RF switch will provide 2.5 dB insertion loss (IL) up to 27 dBm input power and over 30 dB isolation with 30 dBm input power at 2 GHz. / Detta examensarbete har varit en del av ett projekt på Acreo Swedish ICT AB för att undersöka 28 nm FDSOI CMOS teknik för LTE front-end tillämpningar. Projektet har resulterat i ett chip som innehåller olika testkretsar: effektförstärkare, mixer, RF-effektomkoppare, LNA, och en mottagarfront-end. Denna avhandling presenterar en utvärdering av RF-omkopplaren. En SPST RF-omkopplare med sex staplade transistor konstruerades enligt Rascher. Sedan modifierades konstruktionen till en SPDT-omkoppare i enlighet med kraven för projektet. Denna rapport presenterar en översikt över FDSOI CMOS-tekniken, grundläggande teori för en RF switch samt utvärderingsmetoder. Simuleringsresultaten visade att med rätt substratbiasering och matchning (50 Ω), så ger RF-omkopplaren 2,5 dB förlust (IL) på upp till 27 dBm ineffekt och över 30 dB isolering med 30 dBm ineffekt vid 2 GHz.
|
750 |
Footprint Modeling and Connectivity Analysis for Wireless Sensor NetworksChen, Changfei 11 September 2008 (has links)
A wireless sensor network is a network consisting of spatially distributed, sometimeautonomous sensors, communicating wirelessly to cooperatively achieve some task. For example, a wireless sensor network may be used for habitat monitoring to ascertain the environment’s temperature, pressure, humidity, etc. In order for a wireless sensor network to provide such data, one needs to ensure there is connectivity between nodes. That is, nodes can communicate to exchange information. To analyze connectivity between sensors, the radio communication range of each sensor, also called the communication footprint, needs to be known. To date, the models used to analyze a sensor’s radio communication footprint have been overly simplistic (i.e., isotropic) and thus yield results not found in practice. Footprints are highly dependent on the deployment environments, which are typically heterogeneous and non-isotropic in structure. In this work, a ‘weak-monotonicity’ (W-M) model is leveraged to represent a footprint’s non-isotropic behavior. The work also considers the heterogeneity of the environment through the use of the log-normal shadowing model. In particular, the usable percentage of the W-M footprint (the area where the power exceeds the receiver threshold) in such environments is considered through analysis and simulation. We then develop an enhanced footprint model which overlays multiple W-M patterns and use this method to represent experimental propagation data. The work also considers the use of graph theory methods to analyze the connectivity of randomly deployed networks in nonhomogeneous, non-isotropic environments.
|
Page generated in 0.0475 seconds