• Title/Summary/Keyword: multiuser

Search Result 388, Processing Time 0.024 seconds

Low-Complexity MIMO Detection Algorithm with Adaptive Interference Mitigation in DL MU-MIMO Systems with Quantization Error

  • Park, Jangyong;Kim, Minjoon;Kim, Hyunsub;Jung, Yunho;Kim, Jaeseok
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.210-217
    • /
    • 2016
  • In this paper, we propose a low complexity multiple-input multiple-output (MIMO) detection algorithm with adaptive interference mitigation in downlink multiuser MIMO (DL MU-MIMO) systems with quantization error of the channel state information (CSI) feedback. In DL MU-MIMO systems using the imperfect precoding matrix caused by quantization error of the CSI feedback, the station receives the desired signal as well as the residual interference signal. Therefore, a complexMIMO detection algorithm with interference mitigation is required for mitigating the residual interference. To reduce the computational complexity, we propose a MIMO detection algorithm with adaptive interference mitigation. The proposed algorithm adaptively mitigates the residual interference by using the maximum likelihood detection (MLD) error criterion (MEC). We derive a theoretical MEC by using the MLD error condition and a practical MEC by approximating the theoretical MEC. In conclusion, the proposed algorithm adaptively performs interference mitigation when satisfying the practical MEC. Simulation results show that the proposed algorithm reduces the computational complexity and has the same performance, compared to the generalized sphere decoder, which always performs interference mitigation.

A study on the SIC of using group separation in CDMA system (CDMA 시스템에서 그룹분리를 이용한 순차적 간섭 제거기에 관한 연구)

  • 최병구;이영철;염순진;박용완
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.130-134
    • /
    • 1999
  • In this paper, we introduce a modified interference cancellation scheme for multiuser detection in CDMA. This detector uses successive interference canceller(SIC) and the divided received signal concepts. The active users are splits into two groups large signal power group and small signal power group- throughout ranking, matched filter, decision, regeneration. And each group is subtracted from the received signal respectively to obtain good BER performance. Each of the resulting signal is become respectively SICs input signal The computer simulation and analysis of structure demonstrate that the proposed SIC keeps the SICs BER performance, complexity and reduces SICs delay time.

  • PDF

Calculation of UWB Communication System Capacity with Timing litter (타이밍 지터를 고려한 UWB 통신 시스템 용량 계산)

  • 박장우
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.767-773
    • /
    • 2004
  • An UWB communication system are a promising communication technique suitable for the current trends, which are requesting communication methods with the high throughputs and very high speed. A key feature of UWB communication systems is the very narrow pulse used in transmitting the data and PPM(Pulse Position Modulation) for modulating the data. So, the timing accuracy is very important. It is very important to accurately analyze the effect of the timing jitter on the performance of UWB communication systems. In this paper, the methods of analyzing the timing jitter effects on UWB communication systems are introduced. In particular, the channel capacities with timing jitter are calculated including the multiuser access interference.

Cooperative Diversity using Cyclic Delay for OFDM systems (OFDM 시스템을 위한 순환 지연을 사용하는 협력 다이버시티 기법)

  • Lee, Dong-Woo;Jung, Young-Seok;Lee, Jae-Hong
    • Journal of Broadcast Engineering
    • /
    • v.13 no.2
    • /
    • pp.172-178
    • /
    • 2008
  • Orthogonal Frequency Division Multiplexing (OFDM) is one of the most promising technologies for high data rate wireless communications. OFDM has been adopted in wireless standards such as digital audio/video broadcasting. The combination of OFDM and cooperative diversity techniques can provide the diversity gain and/or increased capacity. In this paper, the cooperative coding using cyclic delay diversity (CDD) for multiuser OFDM systems is introduced. To improve the beneficial effects of relays's cooperation, CDD is adopted in cooperative transmission of relays. Simulation results show the bit error rate (BER) for various consideration. The proposed scheme provides improved performance compared to delay.

A Multilevel Key Distribution using Pseudo - random Permutations (의사 랜덤치환을 이용한 다중레벨 키분배)

  • Kim, Ju-Seog;Shin, Weon;Lee, Kyung-Hyune
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2493-2500
    • /
    • 1997
  • We propose a new key management scheme for multiuser group which is classified as hierarchical structure (sometimes it is called a multilevel security hierarchy) in the symmetric key cryptosystem. The proposed scheme is based on the trapdoor one-way permutations which are generated by the pseudo-random permutation algorithm, and it is avaliable for multilevel hierarchical structure composed of a totally ordered set and a partially ordered set, since it has advantage for time and storage from an implemental point of view. Moreover, we obtain a performance analysis by comparing with the other scheme, and show that the proposed scheme is very efficient for computing time of key generation and memory size of key storage.

  • PDF

Optimal Strategies for Cooperative Spectrum Sensing in Multiple Cross-over Cognitive Radio Networks

  • Hu, Hang;Xu, Youyun;Liu, Zhiwen;Li, Ning;Zhang, Hang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3061-3080
    • /
    • 2012
  • To improve the sensing performance, cooperation among secondary users can be utilized to collect space diversity. In this paper, we focus on the optimization of cooperative spectrum sensing in which multiple cognitive users efficiently cooperate to achieve superior detection accuracy with minimum sensing error probability in multiple cross-over cognitive radio networks. The analysis focuses on two fusion strategies: soft information fusion and hard information fusion. Under soft information fusion, the optimal threshold of the energy detector is derived in both noncooperative single-user and cooperative multiuser sensing scenarios. Under hard information fusion, the optimal randomized rule and the optimal decision threshold are derived according to the rule of minimum sensing error (MSE). MSE rule shows better performance on improving the final false alarm and detection probability simultaneously. By simulations, our proposed strategy optimizes the sensing performance for each cognitive user which is randomly distributed in the multiple cross-over cognitive radio networks.

Verification of Temporal Relations on SMIL 2.0 Document using an Extended Temporal Interval Model (확장된 시간 구간 모델을 이용한 SMIL2.0 문서의 시간관계 검증)

  • Kim, Kyung-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.828-836
    • /
    • 2008
  • This paper suggests a method for verification of temporal relations on SMIL 2.0 document using an extended temporal interval model. The SMIL 2.0 document has more asynchronous temporal relations and supports more interactive relations between objects than traditional SMIL document. But it is higher to produce temporal inconsistency by various interactive relations between objects. So the suggested verification method expresses SMIL 2.0 document as functional relations based on an extended temporal interval model and verifies SMIL 2.0 document using interactive relations and temporal intervals between objects. Applications to the verification method are as follows; multiuser interactive contents, online-learning, etc.

Energy Efficiency Optimization for multiuser OFDM-based Cognitive Heterogeneous networks

  • Ning, Bing;Zhang, Aihua;Hao, Wanming;Li, Jianjun;Yang, Shouyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.2873-2892
    • /
    • 2019
  • Reducing the interference to the licensed mobile users and obtaining the energy efficiency are key issues in cognitive heterogeneous networks. A corresponding rate loss constraint is proposed to be used for the sensing-based spectrum sharing (SBSS) model in cognitive heterogeneous networks in this paper. Resource allocation optimization strategy is designed for the maximum energy efficiency under the proposed interference constraint together with average transmission power constraint. An efficiency algorithm is studied to maximize energy efficiency due to the nonconvex optimal problem. Furthermore, the relationship between the proposed protection criterion and the conventional interference constraint strategy under imperfect sensing condition for the SBSS model is also investigated, and we found that the conventional interference threshold can be regarded as the upper bound of the maximum rate loss that the primary user could tolerate. Simulation results have shown the effectiveness of the proposed protection criterion overcome the conventional interference power constraint.

A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks

  • Ren, Huimin;Kim, Suhyun;Seo, Daehee;Lee, Imyeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1687-1707
    • /
    • 2022
  • With the development of multiuser online meetings, more group-oriented technologies and applications for instance collaborative work are becoming increasingly important. Authenticated Group Key Agreement (AGKA) schemes provide a shared group key for users with after their identities are confirmed to guarantee the confidentiality and integrity of group communications. On the basis of the Public Key Cryptography (PKC) system used, AGKA can be classified as Public Key Infrastructure-based, Identity-based, and Certificateless. Because the latter type can solve the certificate management overhead and the key escrow problems of the first two types, Certificateless-AGKA (CL-AGKA) protocols have become a popular area of research. However, most CL-AGKA protocols are vulnerable to Public Key Replacement Attacks (PKRA) due to the lack of public key authentication. In the present work, we present a CL-AGKA scheme that can resist PKRA in order to solve impersonation attacks caused by those attacks. Beyond security, improving scheme efficiency is another direction for AGKA research. To reduce the communication and computation cost, we present a scheme with only one round of information interaction and construct a CL-AGKA scheme replacing the bilinear pairing with elliptic curve cryptography. Therefore, our scheme has good applicability to communication environments with limited bandwidth and computing capabilities.

Low complexity ordered successive interference cancelation detection algorithm for uplink MIMO SC-FDMA system

  • Nalamani G. Praveena;Kandasamy Selvaraj;David Judson;Mahalingam Anandaraj
    • ETRI Journal
    • /
    • v.45 no.5
    • /
    • pp.899-909
    • /
    • 2023
  • In mobile communication, the most exploratory technology of fifth generation is massive multiple input multiple output (MIMO). The minimum mean square error and zero forcing based linear detectors are used in multiuser detection for MIMO single-carrier frequency division multiple access (SCFDMA). When the received signal is detected and regularization sequence is joined in the equalization of spectral null amplification, these schemes experience an error performance and the signal detection assesses an inversion of a matrix computation that grows into complexity. Ordered successive interference cancelation (OSIC) detection is considered for MIMO SC-FDMA, which uses a posteriori information to eradicate these problems in a realistic environment. To cancel the interference, sorting is preferred based on signal-to-noise ratio and log-likelihood ratio. The distinctiveness of the methodology is to predict the symbol with the lowest error probability. The proposed work is compared with the existing methods, and simulation results prove that the defined algorithm outperforms conventional detection methods and accomplishes better performance with lower complication.