• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 160
  • 44
  • 25
  • 11
  • 10
  • 6
  • 5
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 347
  • 347
  • 80
  • 78
  • 78
  • 61
  • 55
  • 45
  • 43
  • 42
  • 37
  • 33
  • 31
  • 31
  • 30
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Mobility-Oriented Data Retrieval for Computation Offloading in Vehicular Edge Computing

Soto Garcia, Victor 21 February 2019 (has links)
Vehicular edge computing (VEC) brings the cloud paradigm to the edge of the network, allowing nodes such as Roadside Units (RSUs) and On-Board Units (OBUs) in vehicles to perform services with location awareness and low delay requirements. Furthermore, it alleviates the bandwidth congestion caused by the large amount of data requests in the network. One of the major components of VEC, computation offloading, has gained increasing attention with the emergence of mobile and vehicular applications with high-computing and low-latency demands, such as Intelligent Transportation Systems and IoT-based applications. However, existing challenges need to be addressed for vehicles' resources to be used in an efficient manner. The primary challenge consists of the mobility of the vehicles, followed by intermittent or lack of connectivity. Therefore, the MPR (Mobility Prediction Retrieval) data retrieval protocol proposed in this work allows VEC to efficiently retrieve the output processed data of the offloaded application by using both vehicles and road side units as communication nodes. The developed protocol uses geo-location information of the network infrastructure and the users to accomplish an efficient data retrieval in a Vehicular Edge Computing environment. Moreover, the proposed MPR Protocol relies on both Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication to achieve a reliable retrieval of data, giving it a higher retrieval rate than methods that use V2I or V2V only. Finally, the experiments performed show the proposed protocol to achieve a more reliable data retrieval with lower communication delay when compared to related techniques.
62

Amplificador de saída de RF CMOS Classe-E com controle de potência para uso em 2,2 GHz / RF CMOS class-e power amplifier with power control useful to 2.2 GHz

Santana, Diogo Batista January 2016 (has links)
É apresentado um amplificador de potência (PA) com controle digital da potência de saída, operando na banda S de frequência (2,2 GHz). Este PA utiliza um transformador de entrada para reduzir as flutuações dos sinais de terra. Um estágio de excitação oferece uma impedância apropriada para a fonte de entrada e ganho para o próximo estágio. O estágio de controle é usado para melhorar a eficiência do PA, composto por quatro ramos paralelos de chaves, onde os estados (ligado ou desligado) são separadamente ativados por uma palavra de controle de 4 bits. O estágio de saída implementa um amplificador classe E, usando uma topologia cascode para minimizar o estresse de tensão sobre os transistores, permitindo sua utilização sob tensão de alimentação de 3,3 V para se atingir uma potência de saída máxima em torno de 1 W, em um processo CMOS 130 nm, cuja tensão típica de alimentação é 1,2 V. O PA proposto foi projetado em uma tecnologia CMOS 130 nm para RF, ocupa uma área de 1,900 x 0,875 mm2 e os resultados das simulações em leiaute extraído obtidos demonstram uma potência de saída máxima de 28,5 dBm (707 mW), com PAE (Power- Added Efficiency) correspondente de 49,7%, para uma tensão de alimentação de 3,3 V. O controle de 4 bits permite um ajuste dentro da faixa dinâmica da potência de saída entre 13,6 a 28,5 dBm (22,9 a 707 mW), divididos em 15 passos, com o PAE variando de 9,1% a 49,7%. O PA proposto permite redução do consumo de potência quando este não está transmitindo na potência máxima. A potência consumida atinge um mínimo de 0,21Wquando a potência de saída é de 13,6 dBm (22,9 mW) e um máximo de 1,4 W quando a potência de saída é de 28,5 dBm (707 mW), o que representa 1,19 W de economia, aumentando a vida da bateria. A linearidade obtida neste circuito mostrou-se suficiente para atender os requisitos da máscara de emissão de espúrios de um padrão de comunicação com envoltória constante largamente utilizado, apresentando desempenho adequado para atender as especificações dos sistemas de comunicações modernos. / A power amplifier with digital power control useful to S-Band (2.2 GHz) applications and with an output power around 1 W is presented. It uses an input transformer to reduce ground bounce effects. A tuned driver stage provides impedance matching to the input signal source and proper gain to the next stage. A control stage is used for efficiency improvement, composed by four parallel branches where the state (on or off) is separately activated by a 4-bit input. The class-E power stage uses a cascode topology to minimize the voltage stress over the power transistors, allowing higher supply voltages. The PA was designed in a 130 nm RF CMOS process and the layout has a total area of 1.900 x 0.875 mm2, post-layout simulations resulted a peak output power of 28.5 dBm with a maximum power added efficiency (PAE) around 49.7% under 3.3 V of supply voltage. The 4-bit control allows a total output power dynamic range adjustment of 14.9 dB, divided in 15 steps, with the PAE changing from 9.1% to 49.7%. The proposed PA allows reduce the power consumption when it isn’t transmitting at the maximum output power. Where the power consumption is only 0.21 W when the PA is at the minimum output power level of 13.6 dBm (22.9 mW), which is 1.19 W smaller than the power consumption at full mode (1.4 W), increasing the battery life. The linearity in this circuit meet the emission mask requirements for a widely used communication standard with constant envelope. Post-layout simulation results indicate an overall performance adequate to fulfill the specifications of modern wireless communication systems.
63

Distributed spectrum sharing: a social and game theoretical approach. / 基於社交與博弈理論的分佈式頻譜共享 / CUHK electronic theses & dissertations collection / Ji yu she jiao yu bo yi li lun de fen bu shi pin pu gong xiang

January 2012 (has links)
動態頻譜共享(dynamic spectrum sharing) 允許不具有執照的無線電用戶(坎級用戶)擇機使用具有執照的無線電用戶(主用戶)的頻譜,因此被認為是一種有效解決頻譜低效利用問題的方案。本論文研究次級用戶如何智能地實現高效率的動態頻譜共享。我們考慮兩種智能共享模式:社交智能(social intelligence) 以及個體智能(individual intelligence) 。 / 對於社交智能,次級用戶基於社交互動(social interactions) 來協作地共享頻譜。受到電子商務工業的推薦系統(recommendation sYstem) 的啟發,我們提出了一種基於推薦的社交頻譜共享機制。其中,次級用戶相互協作,彼此推薦良好的信道, 并動態接入信道。我們設計了種基於馬爾科夫決策過程( Markovdecision process) 的自適應信道推薦算法。該算法可突現良好的系統通信性能。同時,我們也提出種基於模仿(imitation) 的社交頻譜分享機制。其中,次級用戶根據自身觀察來估計自己的期望通信速率并彼此分享。如果鄰近用戶的期望通信速率更高,該用戶則模仿鄰近用戶的信道接入。我們證明該機制能夠有效地收斂到模仿均衡。如果次級用戶的數目較多,收斂的模仿均衡即是納什均衡(Nashequilibrium) 。該均衡是個次級用戶相互滿意的頻譜共享結果。 / 對於個體智能,次級用戶基於策略互動(strategic interactions) 來競爭地共享頻譜。對於基於空間複用(spatial reuse) 的競爭性頻譜共享,我們提出了種新穎的空間頻譜接入博弈框架。我們研究了不同的干擾圖形結構對於納什均衡的存在性的影響。同時,我們設計了種基於用戶自身觀察的分佈式學習算法。該算法適用於所有空間頻譜接入博弈,并能夠有效地收斂到近似納什均衡(approximateNash equilibrium) 。對於基於數據庫的電視頻譜(white-space spectrum) 無線AP(access point)網絡,我們運用博弈理論方法為分佈式AP 信道選擇問題以及分佈式次級用戶AP 連接問題建立理論模型。我們證明了分佈式AP信道選擇博奔以及分佈式次級用戶AP 連接博弈屬於勢博弈(potential game) 的範疇。基於勢博莽的有限改進性質(finite improvement property) ,我們設計了分佈式算法能夠有效地收斂到納什均衡。 / Dynamic spectrum sharing enables unlicensed secondary wireless users to opportunistically share the spectrum with licensed primary users, and thus is envisioned as a promising solution to address the spectrum under-utilization problem. This thesis explores the intelligence of secondary users for achieving efficient distributed spectrum sharing. We consider two types of intelligences: social intelligence and individual intelligence. / For the social intelligence, secondary users share the spectrum collaboratively based on social interactions. Inspired by the recommendation system in the electronic commerce industry, we propose a recommendation-based social spectrum sharing mechanism, where secondary users collaboratively recommend "good" channels to each other and access accordingly. We devise an adaptive channel recommendation algorithm based on Markov decision process, which achieves a good system communication performance. We then propose an imitation-based social spectrum sharing mechanism, where each secondary user estimates its expected throughput based on local observations, and imitates another neighboring user’s channel selection if neighbor’s estimated throughput is higher. We show that the mechanism can converge to an imitation equilibrium. When the number of users is large, the convergent imitation equilibrium corresponds to a Nash equilibrium, which is a mutually satisfactory spectrum sharing solution. / For the individual intelligence, secondary users share the spectrum competitively based on strategic interactions. To formulate the competitive spectrum sharing with spatial reuse, we propose a framework of spatial spectrum access game on general directed interference graphs. We investigate the impact of the underlying interference graph structure on the existence of a Nash equilibrium. We also design a distributed learning algorithm based on local observations that can converge to an approximate Nash equilibrium for any spatial spectrum access games. We then apply the game theoretic approach for modeling the distributed channel selection problem among the APs and distributed AP association problem among the secondary users in database-assisted white-space AP networks. We show that both the distributed AP channel selection game and the distributed AP association game are potential games. We then design distributed algorithms for achieving Nash equilibria by utilizing the finite improvement property of potential game. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Chen, Xu. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2012. / Includes bibliographical references (leaves 180-188). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract also in Chinese. / Abstract --- p.i / Acknowledgement --- p.v / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Motivation and Overview --- p.1 / Chapter 1.2 --- Thesis Outline --- p.5 / Chapter I --- Social Intelligence For Distributed Spectrum Sharing --- p.7 / Chapter 2 --- Recommendation-based Social Spectrum Sharing --- p.8 / Chapter 2.1 --- Introduction --- p.8 / Chapter 2.2 --- System Model --- p.12 / Chapter 2.3 --- Introduction To Channel Recommendation --- p.13 / Chapter 2.3.1 --- Review of Static Channel Recommendation --- p.14 / Chapter 2.3.2 --- Motivations For Adaptive Channel Recommendation --- p.16 / Chapter 2.4 --- Adaptive Channel Recommendation With Channel Homogeneity --- p.18 / Chapter 2.4.1 --- MDP Formulation For Adaptive Channel Recommendation --- p.19 / Chapter 2.4.2 --- Existence of Optimal Stationary Policy --- p.21 / Chapter 2.5 --- Model Reference Adaptive Search For Optimal Spectrum Access Policy --- p.22 / Chapter 2.5.1 --- Model Reference Adaptive Search Method --- p.23 / Chapter 2.5.2 --- Model Reference Adaptive Search For Optimal Spectrum Access Policy --- p.24 / Chapter 2.5.3 --- Convergence of Model Reference Adaptive Search --- p.29 / Chapter 2.6 --- Adaptive Channel Recommendation With Channel Heterogeneity --- p.30 / Chapter 2.7 --- Numerical Results --- p.33 / Chapter 2.7.1 --- Simulation Setup --- p.33 / Chapter 2.7.2 --- Homogeneous Channel Recommendation --- p.34 / Chapter 2.7.3 --- Heterogenous Channel Recommendation --- p.35 / Chapter 2.8 --- Chapter Summary --- p.38 / Chapter 2.9 --- Appendix --- p.39 / Chapter 2.9.1 --- Proof of Lemma 2.1 --- p.39 / Chapter 2.9.2 --- Derivation of Transition Probability --- p.40 / Chapter 2.9.3 --- Proof of Theorem 2.1 --- p.41 / Chapter 2.9.4 --- Proof of Theorem 2.2 --- p.42 / Chapter 2.9.5 --- Proof of Theorem 2.3 --- p.47 / Chapter 2.9.6 --- Proof of Theorem 2.4 --- p.50 / Chapter 3 --- Imitation-based Social Spectrum Sharing --- p.52 / Chapter 3.1 --- Introduction --- p.52 / Chapter 3.2 --- Spectrum Sharing System Model --- p.55 / Chapter 3.3 --- Imitative Spectrum Access Mechanism --- p.58 / Chapter 3.3.1 --- Expected Throughput Estimation --- p.59 / Chapter 3.3.2 --- Information Sharing Graph --- p.63 / Chapter 3.3.3 --- Imitative Spectrum Access --- p.63 / Chapter 3.4 --- Convergence of Imitative Spectrum Access --- p.65 / Chapter 3.4.1 --- Cluster-based Representation of Information Sharing Graph --- p.65 / Chapter 3.4.2 --- Dynamics of Imitative Spectrum Access --- p.67 / Chapter 3.4.3 --- Convergence of Imitative Spectrum Access --- p.71 / Chapter 3.5 --- Imitative Spectrum Access with Innovation --- p.73 / Chapter 3.6 --- Imitative Spectrum Access With User Heterogeneity --- p.75 / Chapter 3.7 --- Simulation Results --- p.77 / Chapter 3.7.1 --- Large User Population --- p.78 / Chapter 3.7.2 --- Small User Population --- p.82 / Chapter 3.7.3 --- Markovian Channel Environment --- p.85 / Chapter 3.7.4 --- Imitative Spectrum Access With User Heterogeneity --- p.88 / Chapter 3.8 --- Chapter Summary --- p.88 / Chapter 3.9 --- Appendix --- p.89 / Chapter 3.9.1 --- Proof of Theorem 3.1 --- p.89 / Chapter 3.9.2 --- Proof of Theorem 3.2 --- p.91 / Chapter II --- Individual Intelligence For Distributed Spectrum Sharing --- p.93 / Chapter 4 --- Spatial Spectrum Access Game --- p.94 / Chapter 4.1 --- Introduction --- p.94 / Chapter 4.2 --- System Model --- p.97 / Chapter 4.3 --- Spatial Spectrum Access Game --- p.101 / Chapter 4.4 --- Existence of Nash Equilibria --- p.102 / Chapter 4.4.1 --- Existence of Pure Nash Equilibria on Directed Interference Graphs --- p.103 / Chapter 4.4.2 --- Existence of Pure Nash Equilibria on Undirected Interference Graphs --- p.108 / Chapter 4.5 --- Distributed Learning For Spatial Spectrum Access --- p.113 / Chapter 4.5.1 --- Expected Throughput Estimation --- p.114 / Chapter 4.5.2 --- Distributed Learning Algorithm --- p.115 / Chapter 4.5.3 --- Convergence of Distributed Learning Algorithm --- p.117 / Chapter 4.6 --- Numerical Results --- p.121 / Chapter 4.7 --- Chapter Summary --- p.126 / Chapter 4.8 --- Appendix --- p.127 / Chapter 4.8.1 --- Proof of Theorem 4.2 --- p.127 / Chapter 4.8.2 --- Proof of Theorem 4.3 --- p.129 / Chapter 4.8.3 --- Proof of Lemma 4.4 --- p.131 / Chapter 4.8.4 --- Proof of Lemma 4.5 --- p.133 / Chapter 4.8.5 --- Proof of Theorem 4.5 --- p.136 / Chapter 4.8.6 --- Proof of Theorem 4.6 --- p.139 / Chapter 5 --- Distributed AP Channel Selection Game --- p.141 / Chapter 5.1 --- Introduction --- p.141 / Chapter 5.2 --- Distributed AP Channel Selection --- p.144 / Chapter 5.2.1 --- Problem Formulation --- p.144 / Chapter 5.2.2 --- Distributed AP Channel Selection Game --- p.146 / Chapter 5.3 --- Distributed AP Channel Selection Algorithms --- p.149 / Chapter 5.3.1 --- Distributed AP Channel Selection Algorithm With Information Exchange --- p.149 / Chapter 5.3.2 --- Distributed AP Channel Selection Algorithm Without Information Exchange --- p.151 / Chapter 5.4 --- Numerical Results --- p.157 / Chapter 5.4.1 --- Distributed AP Channel Selection With Information Exchange --- p.157 / Chapter 5.4.2 --- Distributed AP Channel Selection Without Information Exchange --- p.159 / Chapter 5.5 --- Chapter Summary --- p.161 / Chapter 5.6 --- Appendix --- p.162 / Chapter 5.6.1 --- Proof of Theorem 5.2 --- p.162 / Chapter 6 --- Distributed AP Association Game --- p.165 / Chapter 6.1 --- Introduction --- p.165 / Chapter 6.2 --- Distributed AP Association --- p.166 / Chapter 6.2.1 --- Channel Contention Within an AP --- p.167 / Chapter 6.2.2 --- Distributed AP Association Game --- p.168 / Chapter 6.2.3 --- Distributed AP Association Algorithm --- p.170 / Chapter 6.3 --- Numerical Results --- p.172 / Chapter 6.4 --- Chapter Summary --- p.175 / Chapter 7 --- Conclusions and Future Work --- p.176 / Bibliography --- p.180
64

FDTD Modelling For Wireless Communications: Antennas and Materials

Saario, Seppo Aukusti, n/a January 2003 (has links)
The application of the finite-difference time-domain (FDTD) method for the numerical analysis of complex electromagnetic problems related to wireless communications is considered. Since exact solutions to many complex electromagnetic problems are difficult, if not impossible, the FDTD method is well suited to modelling a wide range of electromagnetic problems. Structures considered include single and twin-slot antennas for millimetre-wave applications, monopole antennas on mobile handsets and chokes for the suppression of currents on coaxial cables. Memory efficient techniques were implemented for the split-field perfectly matched layer (PML) absorbing boundary condition. The frequency-domain far-field transformations were used for the calculation of far-field radiation patterns. Dipole, slot and mobile handset antenna benchmark problems verified the accuracy of the FDTD implementation. The application of slot antennas for millimetre-wave imaging arrays was investigated. An optimal feed network for an offset-fed single-slot antenna was designed for the X band with numerical and experimental results in excellent agreement. A twin-slot antenna structure reduced surface wave coupling by 7.6 dB in the substrate between coplanar waveguide-fed slot antenna elements in a planar array. The reduction of substrate surface waves for the twin-slot antenna allows for closer element spacings with less radiation pattern degradation in array applications. Suppression techniques for currents flowing on the exterior surface of coaxial cables were investigated. These include the use of ferrite beads and a quarter-wave sleeve balun. The frequency dependent behaviour of ferrite based chokes showed highly resonant effects which resulted in less than 5 dB of isolation at the resonant frequencies of the bead. An analysis of air-gaps between the ferrite bead and cable are shown to be extremely detrimental in the isolation characteristics of ferrite bead chokes. An air-gap of 0.5 mm can reduce the isolation effectiveness of a bead by 20 dB. The first rigorous analysis of a quarter-wave sleeve balun is presented, enabling an optimal choke design for maximum isolation. A standard 0.25[symbols] sleeve balun achieved 10.9 dB isolation with [symbols]=4, whereas a choke of optimal length 0.232[symbols] had an isolation of better than -20 dB. Several techniques for the measurement of antenna characteristics of battery powered handsets were compared and perturbation effects associated with the direct connection of a coaxial cable to a mobile handset was quantified. Significant perturbation in both return loss and radiation pattern can occur depending on cable location on the handset chassis. The effectiveness of ferrite chokes in any location was marginal. However, the application of an optimal quarter-wave sleeve balun in the centre of the largest plane of the handset, orthogonal to the primary polarisation resulted in minimal perturbation of both radiation patterns and return loss.
65

Design of frequency synthesizers for short range wireless transceivers

Valero Lopez, Ari Yakov 30 September 2004 (has links)
The rapid growth of the market for short-range wireless devices, with standards such as Bluetooth and Wireless LAN (IEEE 802.11) being the most important, has created a need for highly integrated transceivers that target drastic power and area reduction while providing a high level of integration. The radio section of the devices designed to establish communications using these standards is the limiting factor for the power reduction efforts. A key building block in a transceiver is the frequency synthesizer, since it operates at the highest frequency of the system and consumes a very large portion of the total power in the radio. This dissertation presents the basic theory and a design methodology of frequency synthesizers targeted for short-range wireless applications. Three different examples of synthesizers are presented. First a frequency synthesizer integrated in a Bluetooth receiver fabricated in 0.35μm CMOS technology. The receiver uses a low-IF architecture to downconvert the incoming Bluetooth signal to 2MHz. The second synthesizer is integrated within a dual-mode receiver capable of processing signals of the Bluetooth and Wireless LAN (IEEE 802.11b) standards. It is implemented in BiCMOS technology and operates the voltage controlled oscillator at twice the required frequency to generate quadrature signals through a divide-by-two circuit. A phase switching prescaler is featured in the synthesizer. A large capacitance is integrated on-chip using a capacitance multiplier circuit that provides a drastic area reduction while adding a negligible phase noise contribution. The third synthesizer is an extension of the second example. The operation range of the VCO is extended to cover a frequency band from 4.8GHz to 5.85GHz. By doing this, the synthesizer is capable of generating LO signals for Bluetooth and IEEE 802.11a, b and g standards. The quadrature output of the 5 - 6 GHz signal is generated through a first order RC - CR network with an automatic calibration loop. The loop uses a high frequency phase detector to measure the deviation from the 90° separation between the I and Q branches and implements an algorithm to minimize the phase errors between the I and Q branches and their differential counterparts.
66

Cross layer scheduling and resource allocation algorithms for cellular wireless networks

Ali, Syed Hussain 11 1900 (has links)
This thesis considers the problem of cross layer scheduling and radio resource allocation of multiple users in the downlink of time-slotted and frequency-slotted cellular data networks. For these networks, opportunistic scheduling algorithms improve system performance by exploiting time variations of the radio channel. Within the broader framework of opportunistic scheduling, this thesis solves three distinct problems and proposes efficient and scalable solutions for them. First, we present novel optimal and approximate opportunistic scheduling algorithms that combine channel fluctuation and user mobility information in their decision rules. The algorithms propose the use of dynamic fairness constraints. These fairness constraints adapt according to the user mobility. The optimal algorithm is an off-line algorithm that precomputes constraint values according to a known mobility model. The approximate algorithm is an on-line algorithm that relies on the future prediction of the user mobility locations in time. We show that the use of mobility information increases channel capacity. We also provide analytical bounds on the performance of the approximate algorithm. Second, this thesis presents a new opportunistic scheduling solution that maximizes the aggregate user performance subject to certain minimum and maximum performance constraints. By constraining the performance experienced by individual users, who share a common radio downlink, to some upper bounds, it is possible to provide the system operator with a better control of radio resource allocations and service differentiation among different classes of users. The proposed solution offers better performance than existing solution under practical channel conditions. Finally, we present a dynamic subcarrier allocation solution for fractional frequency reuse in multicell orthogonal frequency division multiple access systems. We formulate the subcarrier allocation as an equivalent set partitioning problem and then propose an efficient hierarchical solution which first partitions subcarriers into groups and next schedules subcarriers opportunistically to users. Simulation results for three solutions illustrate the usefulness of the proposed schemes.
67

Coding and Information-Theoretic Aspects of Multiple Antenna Communication Systems

Fozunbal, Majid 20 January 2005 (has links)
Future wireless networks will be required to transmit real-time multimedia data reliably with high speed and low latency. This demands new approaches to the design and analysis of wireless networks. In this context, multiple antenna architectures are a promising solution which provide wireless systems with a high degree of functionality, adaptability, capacity, and robustness. However, efficient use of these systems is possible only by solving a number of critical problems. In this dissertation, we focus on coding and information theoretic aspects of multiple antenna systems. Knowledge in these areas provides us with guidelines into analysis and design of systems, reveals inherent limitations, pinpoints problems and opportunities for improvement, and also allows for rigorous argument and justification of observations. We present novel results on multiple antenna communication systems with both theoretical and practical impacts. In the area of coding theory, performance limits and error bounds for space-time codes will be discussed, along with guidelines for systematic design of space-time codes in the presence of the channel correlation profile. In the area of information theory, a unified approach to the capacity analysis of multiple antenna channels will be discussed. We also present a novel partial ordering relation on fading channels that is helpful in information theoretic analysis of compound and non-stationary channels. The results of the dissertation can be generalized to multiple-user channels. This could lead to a solid understanding of fundamental limits of wireless systems and opportunities for opening new trends and paradigms for future generations of wireless networks.
68

MIMO Selection and Modeling Evaluations for Indoor Wireless Environments

Dong, Lu 12 November 2007 (has links)
Array-to-array, or multiple-input multiple-output (MIMO), links are known to provide extremely high spectral efficiencies in rich multipath environments, such as indoor wireless environments. The selection of a subset of receiver array antennas for a MIMO wireless link has been studied by many as a way to reduce cost and complexity in a MIMO system while providing diversity gain. Combined with a switched multi-beam beamformer, it becomes the beam selection system that can gain high signal-to-interference ratio (SIR) improvement in an interference-imited environment. The objective of this research is to evaluate the performance of low-complexity antenna or beam subset selection methods for small MIMO networks. The types of networks include (1) point-to-point MIMO links with out-of-system interference, (2)multi-user networks with a single, but possibly spatially distributed access point. We evaluate various selection techniques on measured indoor channels, which has not been done before. We propose a new practical selection metric, the peak-to-trough ratio of orthogonal frequency division multiplexing (OFDM) training symbols. We also compare antenna and beam selection on measured indoor channels under more general conditions than has previously been done. Finally, we consider some channel modeling issues associated with beamformers. We investigate the validity of three types of statistical MIMO channel models. A new beamformer is designed based on the ideal of the ``Weichselberger model.'
69

Analytic Models for a Cellular CDMA System with Variable Code Reservation Periods and Cell Coverage

Hou, Jaw-Huei 10 May 2006 (has links)
In this dissertation, we present mathematical analyses for a cellular CDMA communication system by investigating two important performance factors, the spreading code reservation periods and the cell coverage in soft handoff. First, an innovative code assignment scheme is presented by fully utilizing the characteristics of voice and data traffic. In other words, a voice terminal has higher priority to reserve a spreading code to transmit packets in multiple talk spurts, while a data terminal can only transmit packets by either employing the unassigned codes or borrowing the codes from the voice terminals during their silent periods. The code assignment scheme is then extended to analyze a priority-based CDMA system where the code reservation periods can be varied. Two performance measures, the average dropping probability for delay-sensitive traffic and the average packet delay for delay-insensitive traffic, are derived from the analytic models based on the equilibrium point analysis (EPA). Finally, for the cellular CDMA system, we study the influences of enlarging or shrinking the soft handoff coverage on the new-call blocking and the handoff-call dropping probabilities. From the mathematical analyses, we reveal that enlarging the outer cell while fixing the inner cell may significantly increase both blocking and dropping probabilities. On the other hand, if we enlarge the inner cell and fix the outer cell, the two probabilities can be reduced slightly. The impact of activating a call admission control on the proposed cellular CDMA system is also discussed.
70

Low-overhead cooperation to mitigate interference in wireless networks

Peters, Steven Wayne 23 October 2013 (has links)
Wireless cellular networks, which serve a large area by geographically partitioning users, suffer from interference from adjacent cells transmitting in the same frequency band. This interference can theoretically be completely mitigated via transceiver cooperation in both the uplink and downlink. Optimally, base stations serving the users can utilize high-capacity backbones. to jointly transmit and receive all the data in the network across all the base stations. In reality, the backbone connecting the base stations is of finite capacity, limiting joint processing to localized clusters. Even with joint processing on a small scale, the overhead involved in sharing data between multiple base stations is large and time-sensitive. Other forms of cooperation have been shown to require less overhead while exhibiting much of the performance benefit from interference mitigation. One particular strategy, called interference alignment (IA), has been shown to exploit all the spatial degrees of freedom in the channel provided data cannot be shared among base stations. Interference alignment was developed for the multi-user interference channel to exploit independent channel observations when all of the links in the network have high signal-to-noise ratio, and assumes all the nodes utilizing the physical resources are participating in the cooperative protocol. When some or all of the links are at moderate signal-to-noise ratio, or when there are non-cooperating users, IA is suboptimal. In this dissertation, I take three approaches to addressing the drawbacks of IA. First, I develop cooperative transmission strategies that outperform IA in various operationg regimes, including at low-to-moderate SNR and in the presence of non-cooperating users. These strategies have the same complexity and overhead as IA. I then develop algorithms for network partitioning by directly considering the overhead of cooperative strategies. Partitioning balances the capacity gains of cooperation with the overhead required to achieve them. Finally, I develop the shared relaying model, which is equivalent to the interference channel but with a single multi-antenna relay mediating communications between transceivers. The shared relay requires less overhead and cooperation than interference alignment but requires added infrastructure. It is shown to outperform conventional relaying strategies in cellular networks with a fixed number of total relay antennas. / text

Page generated in 0.1008 seconds