• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 4
  • 2
  • 2
  • 1
  • Tagged with
  • 15
  • 15
  • 7
  • 6
  • 6
  • 6
  • 5
  • 5
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

MIMO Communication Capacity: Antenna Coupling and Precoding for Incoherent Detection

Bikhazi, Nicolas W. 17 November 2006 (has links) (PDF)
While the capacity of multiple-input multiple-output (MIMO) systems has been explored in considerable detail, virtually all literature on this topic ignores electromagnetic considerations. This dissertation explores electromagnetic effects on the capacity performance of these multi-antenna architectures. Specifically, it examines the impact of superdirectivity for compact antenna arrays, the effect of antenna mutual coupling, and MIMO performance of multi-mode optical fiber with non-linear detection. Superdirectivity can lead to abnormally large capacity bounds in a MIMO communication system, especially when the antennas are placed close together. Because superdirective behavior is difficult to achieve in practice, this work formulates an approach for limiting the impact of superdirectivity by introducing finite ohmic loss into the capacity expressions. Results show that even a small amount of ohmic loss significantly affects the achievable system capacity and suppresses superdirective solutions. This formulation allows a more detailed examination of the capacity of MIMO systems for compact arrays. For channels which do not vary in time, placing antennas closer together generally reduces the system capacity. However, recent work has demonstrated that for a MIMO system operating in a fast fading environment where the transmitter and receiver know the channel covariance information, the capacity increases as antennas are placed near each other due to an increase in spatial correlation. Analysis of this behavior illustrates that when these capacity gains (due to closely spaced antennas) are observed the radiated power is also increased. Constraining the radiated power leads to superdirective solutions in which the ohmic loss constraint developed must be used to properly determine the capacity behavior of this system. Application of this constraint then leads to an optimum antenna spacing in contrast to the findings of previous research which indicate that antennas should be as close together as possible. Additionally, this section provides an analysis regarding the number of spatial modes that can be used for various system configurations. Recent research has shown that it is possible for MIMO communication techniques to be used with multimode optical fibers to increase the available distance-bandwidth. However, implementation of traditional MIMO schemes requires the use of coherent optical detection which can lead to high system complexity and cost. This dissertation proposes a multimode fiber MIMO system architecture which allows simultaneous transmission of unique streams to different users on the same fiber while using incoherent detection with amplitude and phase modulation at the transmitter. The resulting capacity scales nearly linearly with the number of transmitters and receivers. Because the architecture requires channel state information at the transmitter, a training scheme appropriate for use with optical intensity detection is also discussed.
12

Modulation Division for Multiuser Wireless Communication Networks

Dong, Zheng January 2016 (has links)
This thesis considers the modulation division based on the concept of uniquely factorable constellation pair (UFCP) and uniquely decodable constellation group (UDCG) in multiuser wireless communication networks. We first consider a two-hop relay network consisting of two single-antenna users and a two-antenna relay node, for which a novel distributed concatenated Alamouti code is devised. This new design allows the source and relay nodes to transmit their own information to the destination node concurrently at the symbol level with the aid of the UFCP generated from both PSK and square QAM constellations as well as by jointly processing the noisy signals received at the relay node. Moreover, an asymptotic symbol error probability (SEP) formula is derived for the ML receiver, showing that the maximum diversity gain function is achieved, which is proportional to $\ln \mathtt{SNR}/\mathtt{SNR}^2$. Then, we concentrate on the point-to-point correlated multiple-input and multiple-output (MIMO) communication systems where full knowledge of channel state information (CSI) is available at the receiver and only the first- and second-order statistics of the channels are available at the transmitter. When the number of antenna elements of both ends goes to infinity while keeping their ratio constant, the asymptotic SEP analysis is carried out for either optimally precoded or uniformly precoded correlated large MIMO fading channels using the zero-forcing (ZF) detector with equally likely PAM, PSK or square QAM constellations. For such systems, we reveal some very nice structures which inspire us to explore two very useful mathematical tools (i.e., the Szego's theorem on large Hermitian Toeplitz matrices and the well-known limit: $\lim_{x\to\infty}(1+1/x)^x=e$), for the systematic study of asymptotic behaviors on their error performance. This new approach enables us to attain a very simple expression for the SEP limit as the number of the available antenna elements goes to infinity. In what follows, the problem of precoder design using a zero-forcing decision-feedback (ZF-DF) detector is also addressed. For such a MIMO system, our principal goal is to efficiently design an optimal precoder that minimizes the asymptotic SEP of the ZF-DF detector under a perfect decision feedback. By fully taking advantage of the product majorization relationship among eigenvalues, singular-values and Cholesky values of the precoded channel matrix parameters, a necessary condition for the optimal solution to satisfy is first developed and then the structure of the optimal solution is characterized. With these results, the original non-convex problem is reformulated into a convex one that can be efficiently solved by using an interior-point method. In addition, by scaling up the antenna array size of both terminals without bound for such a network, we propose a novel method as we did for the ZF receiver scenario to analyze the asymptotic SEP performance of an equal-diagonal QRS precoded large MIMO system when employing an abstract Toeplitz correlation model for the transmitter antenna array. This new approach has a simple expression with a fast convergence rate and thus, is efficient and effective for error performance evaluation. For multiuser communication networks, we first consider a discrete-time multiple-input single-output (MISO) Gaussian broadcast channel (BC) where perfect CSI is available at both the transmitter and all the receivers. We propose a flexible and explicit design of a uniquely decomposable constellation group (UDCG) based on PAM and rectangular QAM constellations. With this new concept, a modulation division (MD) transmission scheme is developed for the considered MISO BC. The proposed MD scheme enables each receiver to uniquely and efficiently recover their desired signals from the superposition of mutually interfering cochannel signals in the absence of noise. Using max-min fairness as a design criterion, the optimal transmitter beamforming problem is solved in a closed-form for two-user MISO BC. Then, for a general case with more than two receivers, a user-grouping based beamforming scheme is developed, where the grouping method, beamforming vector design and power allocation problems are addressed by employing weighted max-min fairness. Then, we consider an uplink massive single-input and multiple-output (SIMO) network consisting of a base station (BS) and several single-antenna users. To recover the transmitted signal matrix of all the users when the antenna array size is large, a novel multi-user space-time modulation (MUSTM) scheme is proposed for the considered network based on the explicit construction of QAM uniquely-decomposable constellation groups (QAM-UDCGs). In addition, we also develop a sub-constellation allocation method at the transmitter side to ensure the signal matrix is always invertible. In the meanwhile, an efficient training correlation receiver (TCR) is proposed which calculates the correlation between the received sum training signal vector and the sum information carrying vector. Moreover, the optimal power allocation problems are addressed by maximizing the coding gain or minimizing the average SEP of the received sum signal under both average and peak power constraints on each user. The proposed transmission scheme not only allows the transmitted signals with strong mutual interference to be decoded by a simple TCR but it also enables the CSI of all the users to be estimated within a minimum number of time slots equal to that of the users. Comprehensive computer simulations are carried out to verify the effectiveness of the proposed uniquely decomposable space-time modulation method in various network topologies and configurations. Our modulation division method will be one of the promising technologies for the fifth generation (5G) communication systems. / Dissertation / Doctor of Philosophy (PhD)
13

Diversity-Mutiplexing Tradeoff Of Asynchronous Cooperative Relay Networks And Diversity Embedded Coding Schemes

Naveen, N 07 1900 (has links)
This thesis consists of two parts addressing two different problems in fading channels. The first part deals with asynchronous cooperative relay communication. The assumption of nodes in a cooperative communication relay network operating in synchronous fashion is often unrealistic. In this work we consider two different models of asynchronous operation in cooperative-diversity networks experiencing slow fading and examine the corresponding Diversity-Multiplexing Tradeoffs (DMT). For both models, we propose protocols and distributed space-time codes that asymptotically achieve the transmit diversity bound on DMT for all multiplexing gains and for number of relays N ≥ 2. The distributed space-time codes for all the protocols considered are based on Cyclic Division Algebras (CDA). The second part of the work addresses the DMT analysis of diversity embedded codes for MIMO channels. Diversity embedded codes are high rate codes that are designed so that they have a high diversity code embedded within them. This allows a form of opportunistic communication depending on the channel conditions. The high diversity code ensures that at least a part of the information is received reliably, whereas the embedded high rate code allows additional information to be transferred if the channel is good. This can be thought of coding the data into two streams: high priority and low priority streams so that the high priority stream gets a better reliability than the lower priority stream. We show that superposition based diversity embedded codes in conjunction with naive single stream decoding is sub-optimal in terms of the DM tradeoff. We then construct explicit diversity embedded codes by the superposition of approximately universal space-time codes from CDAs. The relationship between broadcast channels and the diversity embedded setting is then utilized to provide some achievable Diversity Gain Region (DGR) for MIMO broadcast Channels.
14

Sécurité pour les réseaux sans fil / Security for wireless communications

Kamel, Sarah 10 March 2017 (has links)
Aujourd’hui, le renforcement de la sécurité des systèmes de communications devient une nécessité, par anticipation du développement des ordinateurs quantiques et des nouvelles attaques qui en découleront. Cette thèse explore deux techniques complémentaires permettant d’assurer la confidentialité des données transmises sur des liens sans-fils. Dans la première partie de ce travail, nous nous intéressons au schéma de cryptographie à clé publique basée sur des réseaux de points, qui représente une des techniques les plus prometteuses pour la cryptographie post-quantique. En particulier, nous considérons le cryptosystème Goldreich-Goldwasser-Halevi (GGH), pour lequel nous proposons un nouveau schéma utilisant les GLD. Dans la seconde partie de ce travail, nous étudions la sécurité des canaux de diffusion multi-utilisateur, ayant accès à des mémoires de caches, en présence d'un espion. Nous considérons deux contraintes de sécurité: la contrainte de sécurité individuelle et la contrainte de sécurité jointe. Nous dérivons des bornes supérieure et inférieure pour le compromis sécurisé capacité-mémoire en considérant différentes distributions de cache. Afin d'obtenir la borne inférieure, nous proposons plusieurs schémas de codage combinant codage wiretap, codage basé sur la superposition et codage piggyback. Nous prouvons qu'il est plus avantageux d'allouer la mémoire de cache aux récepteurs les plus faibles. / Today, there is a real need to strengthen the communication security to anticipate the development of quantum computing and the eventual attacks arising from it. This work explores two complementary techniques that provide confidentiality to data transmitted over wireless networks. In the first part, we focus on lattice-based public-key cryptography, which is one of the most promising techniques for the post-quantum cryptography systems. In particular, we focus on the Goldreich-Goldwasser-Halevi (GGH) cryptosystem, for which we propose a new scheme using GLD lattices. In the second part of this work, we study the security of multi-user cache-aided wiretap broadcast channels (BCs) against an external eavesdropper under two secrecy constraints: individual secrecy constraint and joint secrecy constraint. We compute upper and lower bounds on secure capacity-memory tradeoff considering different cache distributions. To obtain the lower bound, we propose different coding schemes that combine wiretap coding, superposition coding and piggyback coding. We prove that allocation of the cache memory to the weaker receivers is the most beneficial cache distribution scenario.
15

Schémas pratiques pour la diffusion (sécurisée) sur les canaux sans fils / (Secure) Broadcasting over wireless channels practical schemes

Mheich, Zeina 19 June 2014 (has links)
Dans cette thèse, on s'est intéressé à l'étude des canaux de diffusion avec des contraintes de transmission pratiques. Tout d'abord, on a étudié l'impact de la contrainte pratique de l'utilisation d'un alphabet fini à l'entrée du canal de diffusion Gaussien avec deux utilisateurs. Deux modèles de canaux de diffusion sont considérés lorsqu'il y a, en plus d'un message commun pour les deux utilisateurs, (i) un message privé pour l'un des deux utilisateurs sans contrainte de sécurité (ii) un message confidentiel pour l'un des deux utilisateurs qui doit être totalement caché de l'autre utilisateur. On a présenté plusieurs stratégies de diffusion distinguées par leur complexité d'implémentation. Plus précisément, on a étudié les régions des débits atteignables en utilisant le partage de temps, la superposition de modulation et le codage par superposition. Pour la superposition de modulation et le cas général du codage par superposition, les régions des débits atteignables maximales sont obtenues en maximisant par rapport aux positions des symboles dans la constellation et la distribution de probabilité jointe. On a étudié le compromis entre la complexité d'implémentation des stratégies de transmission et leurs efficacités en termes de gains en débits atteignables. On a étudié aussi l'impact de la contrainte de sécurité sur la communication en comparant les débits atteignables avec et sans cette contrainte. Enfin, on a étudié les performances du système avec des schémas d'accusés de réception hybrides (HARQ) pour un canal à écoute à évanouissement par blocs lorsque l'émetteur n'a pas une information parfaite sur l'état instantané du canal mais connait seulement les statistiques. On a considéré un schéma adaptatif pour la communication sécurisée en utilisant des canaux de retour à niveaux multiples vers l'émetteur pour changer la longueur des sous mots de code à chaque retransmission afin que le débit utile secret soit maximisé sous des contraintes d'"outages". / In this thesis, we aim to study broadcast channels with practical transmission constraints. First, we study the impact of finite input alphabet constraint on the achievable rates for the Gaussian broadcast channel with two users. We consider two models of broadcast channels, when there is in addition of a common message for two users, (i) a private message for one of them without secrecy constraint (ii) a confidential message for one of them which should be totally hidden from the other user. We present several broadcast strategies distinguished by their complexity of implementation. More precisely, we study achievable rate regions using time sharing, superposition modulation and superposition coding. For superposition modulation and superposition coding strategies, maximal achievable rate regions are obtained by maximizing over both symbol positions in the constellation and the joint probability distribution. We study the tradeoff between the complexity of implementation of the transmission strategies and their efficiency in terms of gains in achievable rates. We study also the impact of the secrecy constraint on communication by comparing the achievable rates with and without this constraint. Finally, we study the system performance using HARQ schemes for the block-fading wiretap channel when the transmitter has no instantaneous channel state information but knows channel statistics. We consider an adaptive-rate scheme for the secure communication by using multilevel feedback channels to change sub-codeword lengths at each retransmission, in order to maximize the secrecy throughput under outage probabilities constraints.

Page generated in 0.317 seconds