• Title/Summary/Keyword: wireless channels

Search Result 692, Processing Time 0.024 seconds

The Performance Improvement of MCMA Adaptive Equalization in 16-QAM Signal using Dual Weight Vector (이중 가중치 벡터를 이용한 16-QAM 신호의 MCMA 적응 등화 성능 개선)

  • Yoon, Jae-Sun;Lim, Seung-Gag
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.41-47
    • /
    • 2011
  • This paper is concerned with the DW-MCMA(Dual Weight vector Modified Constant Modulus Algorithm) adaptive equalization algorithm using the dual weight vector in order to improve the convergence characteristic and residual inter-symbol interference which are used as the performance index for an adaptive equalizer. The equalizer is used to reduce the distortion caused by the inter-symbol interference on the wireless and the wired band-limited channel that connect the transmitting system and receiving system. The CMA is widely known as the representative algorithm for equalization. In order to transmitting the mass information with a high speed through the channels, a fast convergence speed in the equalizer performance that is able to minimize overhead needed for equalization is acquired. In this paper, By the computer simulation, we confirmed that the proposed DW-MCMA has the faster convergence speed and the smaller residual inter-symbol interference than the conventional CMA and MCMA.

Performance Evaluation for Speed of Mobile Devices in UFMC Systems (UFMC 시스템에서 모바일 장치의 이동속도에 대한 성능평가)

  • Lee, Kyuseop;Choi, Ginkyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.53-58
    • /
    • 2017
  • UFMC is known as the one among novel multi-carrier modulation techniques which are designed for replacing OFDM for 5G wireless communication systems. It is the generalized model of OFDM and FBMC, which combines the advantages of OFDM and FBMC and avoids their weak points. UFMC is more robust in synchronization condition like Time-frequency misalignment compared to CP-OFDM. Moreover UFMC is more proper to burst uplink transmission like M2M 5G Communications. In this paper we analyze the BER performance in various channels and speeds. The simulation result shows that the BER performance is lowered when mobile devices are moving fast and the BER performance is so sensitive for the good channel environment.

Performance Analysis for MIMO Multiuser Systems considering Selection of Transmit Antennas, Constellations and Powers in Low-to-medium Mobile Speed (중저속 이동체환경에서의 MIMO시스템 기반 안테나 선택과 전력할당 성능분석)

  • Yoo Hyun;Kim Jin-Su;Kim Jong-Ki;Seo Myoung-Seok;Kwak Kyung-Sup
    • Proceedings of the KSR Conference
    • /
    • 2005.05a
    • /
    • pp.776-781
    • /
    • 2005
  • In this paper, using received channel information, we analyze performance in MIMO multiuser system in low-to-medium mobile speed by selecting each user's constellations, powers, and transmit antennas. Given a target of symbol error, we determine each user's constellations, powers, selected tranprobability smit antennas such that the required signal-to-noise(SNR) is minimized for MMSE, V-BLAST receiver according to each user's information and channel estimation information. When we do power control with antenna selection technique through uplink channels of MIMO system in low-to-medium mobile speed, we analyze system performance with wireless channel information from Base-Station(BS) to Users. By simulation, it has been shown that the proposed antenna selection scheme for transmitting data offer better performance improvement than all transmit antennas for transmitting data.

  • PDF

Performance Comparison of Relay Selection Methods for Incremental Cooperative Relaying Systems with Spatially Random Relay (랜덤한 릴레이를 갖는 추가 기회전송 협동 릴레이 시스템의 릴레이 선택법에 따른 성능비교)

  • Kim, Nam-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.65-71
    • /
    • 2016
  • Cooperative relaying systems have been studied actively to improve the system performance effectively in wireless fading channels. Most of the cooperative relay studies are assumed fixed relay, recently the performance analysis of the cooperative relaying systems with spatially random relays considering the practical mobile environment are introduced. However the comparative studies for relay selection methods of incremental cooperative relay systems, the performance of which is influenced by the selection methods, have not been studied. Therefore we derive the performance of the system which has MRC(Maximal-ratio combining) with Max SNR(signal-to-noise ratio) selection or Max-min SNR selection, respectively. And the outage performances of the system with Max or Max-min selection method are compared for different transmit power allocation to the source and to the relays. The analytical results serve as useful tools for relay selection and power allocation to transmit nodes for opportunistic incremental relaying systems.

A Novel Channel Estimation Method for Downlink Wideband CDMA Mobile Communication Systems (하향링크 광대역 CDMA 이동통신 시스템을 위한 새로운 채널추정 방법)

  • 임민중
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.4
    • /
    • pp.1-9
    • /
    • 2003
  • Many CDMA systems provide pilot channels in order to help channel estimation process. Especially in wideband CDMA systems, the number of receive diversity paths can be large due to small chip duration and high multi-path resolution capability. Hence, the received signal power of each path is small for a given total SNR (signal-to-noise ratio) and the pilot power of each path may not be sufficiently large for accurate channel estimation. When the pilot power is small, one can use decision-directed channel estimation to utilize more energy of the received data. However, the decision errors can deteriorate the quality of decision-directed channel estimation. This paper proposes a novel channel estimation method that optimally utilizes receiver decisions as well as pilot symbols with the help of estimated SER (symbol error rate) and SNR. The proposed method computes two channel estimates using the pilot and the data channel filters and optimally combines them. The simulation results show that the proposed method is robust and outperforms the conventional pilot-symbol-aided channel estimation method.

Implementation of π/4-DQPSK Modem for Maritime Digital Communication in VHF Band (VHF 대역 해상 디지털 통신용 π/4-DQPSK 모뎀 구현)

  • Kwak, Jaemin
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.541-545
    • /
    • 2014
  • Rec. ITU-R M.1842-1 is international recommendation for VHF band communication guideline in maritime mobile service RR Appendix 18 channels. In this paper, we simulate 28.8 kbps VHF ${\pi}$/4-DQPSK digital baseband modem compatible with the recommendation, then it is designed and implemented with FPGA. Cazac sequence is used as a preamble since packet format is not defined untill now in the recommendation. Baseband modem is designed by VHDL language and implemented on NEXYS4 development platform having Atrix7 FPGA chip from Xilinx. For wireless communication test of total prototype system, ADC/DAC board is implemented and EV9730 RF module is utilized. From the experimental results, implemented FPGA modem shows spectral bandwidth of 25 kHz and successful data exchanges between tx and rx communication platform.

Design of Hybrid V2X Communication Module for Cooperative Automated Driving (자율협력주행을 위한 하이브리드 V2X 통신모듈 설계)

  • Lim, Ki-taeg;Jin, Seong-keun;Kwak, Jae-min
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.3
    • /
    • pp.213-219
    • /
    • 2018
  • In this paper, we propose a design method and process for hardware and software of hybrid V2X communication module that supports both C-ITS communication protocol designed for vehicle environment and Legacy LTE communication technology. C-ITS is suitable for safety service applications due to its low latency characteristics, and Legacy LTE is a technology suitable for non-safety applications such as traffic information and infotainment due to high latency and high capacity. The hybrid V2X communication module supports multiple communication technologies of WAVE and LTE, in which WAVE supports multiple channels, so that it is designed to transmit road information such as LDM and positioning correction information to an autonomous vehicle in real time. The main design results presented in this paper will be applied to the implementation of future hybrid V2X communication terminals for vehicles.

A Study on FTN Decoding Method for High Throughput Satellite Communication (고전송율 위성통신을 위한 FTN 신호 복호 기법 연구)

  • Kwon, Hae-Chan;Jung, Ji-Won
    • Journal of Navigation and Port Research
    • /
    • v.38 no.3
    • /
    • pp.211-216
    • /
    • 2014
  • In this paper, high throughput method is studied to provide floating objects with broadband service as ship by using satellite. In recent, satellite broadcastings standard is based on DVB-S3 for communication service using wireless device on navigation communication by satellite. LDPC codes are iterative coding algorithm proposed in DVB-S3. In this paper, FTN technique is applied to LDPC codes with 8-PSK modulation and then present the method to alleviate performance degradation due to FTN through BICM-ID. BICM-ID is the method to improve performance by calculating a new LLR from hard-decision value of decoder output. DVB-S2 system with 8-PSK modulation and FTN technique based on iterative decoding had a better performance than DVB-S2 with 8-PSK modulation and FTN technique over Gaussian channels.

An Active Network Execution Environment for on Demand Customization of Communication Protocols and Services (맞춤형 통신 프로토콜과 서비스를 위한 액티브 네트워크 실행환경)

  • Lee Hwa Young;Kang Bo-young;Lim Kyungshik
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.937-950
    • /
    • 2004
  • In this paper, we present the design and implementation of new execution environment named Customizable Architecture for Flexible Execution Environment(CAFEs) that supports the mechanism of protocol customization and service referencing. We introduce a new concept as micro protocols and active services to enhance software reusability. Micro protocol represents a specific algorithm or functionality of existing network protocol and the active service is in charge of binding legacy application and releasing the active network oriented services. The pro-posed active network execution environment is made up of three parts, virtual network system, protocol and service manager, event engine. First, the virtual network system is used to connect each active nodes using virtual network channels which are based on multiple existing protocol layers. Second, the protocol and service manager is responsible for composing micro protocols and active services to develop new network proto-col and service easily. Finally, the event engine is used to detect the automatic transition of system components using event delegation model. To verify the CAFTs, we have an experiment about the delivery of web contents which are suitable for the user's terminals in the wireless Internet environment. As a result. we are able to obtain the availability of developed execution environment.

Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems (프라이버시 보호를 위한 RFID 인증 프로토콜의 안전성 분석과 개선)

  • Kim, Jiye;Won, Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.581-591
    • /
    • 2016
  • RFID(Radio Frequency IDentification) is a key technology in ubiquitous computing and is expected to be employed in more fields in the near future. Nevertheless, the RFID system is vulnerable to attacks by eavesdropping or altering of the messages transmitted in wireless channels. In 2013, Oh et al. proposed a mutual authentication protocol between a tag and a reader in RFID systems. Their protocol is designed to resist location tracking for privacy protection. However, all tags and readers use only one network-wide key in their protocol and tags are usually vulnerable to physical attacks. We found that their protocol is still vulnerable to tag/reader impersonation attacks and location tracking if an attacker obtains the network-wide key from a tag. In this paper, we propose a security improved authentication protocol for privacy protection in RFID systems. In addition, we demonstrate that the proposed scheme is efficient in terms of computation and communication costs.