Do you want to publish a course? Click here

Design and Performance Analysis of a Chaotic Pseudo Orthogonal Carriers Multi-Access Communication System

115   0   0.0 ( 0 )
 Added by Hai-Peng Ren
 Publication date 2021
and research's language is English




Ask ChatGPT about the research

A Chaotic Pseudo Orthogonal Carriers Multi-Access (CPOCMA) communication based on Chaotic Pseudo Orthogonal Shape-forming Filter (CPOSF) bank, Chaotic Pseudo Orthogonal Matched Filter (CPOMF) bank and Chaotic Pseudo Orthogonal Correlation Filter (CPOCF) bank is proposed in this work. At the transmitter, the multiple CPOSFs are used to generate pseudo orthogonal signals. It provides a good trade-off between spectrum efficiency and high bit transmission rate. At the receiver, the CPOMF bank and CPOCF bank are used to maximize the Signal-to-Noise Ratio (SNR) and extract the received information from each sub-channel, respectively. The received signal is demodulated by averaging the sampled sequence from the matched filter bank output and sorting the sampling sequence from the CPOCF bank output to recover the transmitted information bits. The proposed CPOCMA communication system not only offers multiuser access with high reliability and high data transmission rate, but also achieves higher spectrum efficiency. Analytical Bit Error Rate (BER) expression is derived. The proposed communication system performance has been evaluated in Additive White Gaussian Noise (AWGN) channel and wireless channel by both numerical simulations and experiments based on a Wireless open-Access Research Platform (WARP), the results show the effectiveness and the superiority of the proposed method.



rate research

Read More

In this paper, we present a finite-block-length comparison between the orthogonal multiple access (OMA) scheme and the non-orthogonal multiple access (NOMA) for the uplink channel. First, we consider the Gaussian channel, and derive the closed form expressions for the rate and outage probability. Then, we extend our results to the quasi-static Rayleigh fading channel. Our analysis is based on the recent results on the characterization of the maximum coding rate at finite block-length and finite block-error probability. The overall system throughput is evaluated as a function of the number of information bits, channel uses and power. We find what would be the respective values of these different parameters that would enable throughput maximization. Furthermore, we analyze the system performance in terms of reliability and throughput when applying the type-I ARQ protocol with limited number of retransmissions. The throughput and outage probability are evaluated for different blocklengths and number of information bits. Our analysis reveals that there is a trade-off between reliability and throughput in the ARQ. While increasing the number of retransmissions boosts reliability by minimizing the probability of reception error, it results in more delay which decreases the throughput. Nevertheless, the results show that NOMA always outperforms OMA in terms of throughput, reliability and latency regardless of the users priority or the number of retransmissions in both Gaussian and fading channels.
Non-orthogonal multiple access (NoMA) as an efficient way of radio resource sharing has been identified as a promising technology in 5G to help improving system capacity, user connectivity, and service latency in 5G communications. This paper provides a brief overview of the progress of NoMA transceiver study in 3GPP, with special focus on the design of turbo-like iterative multi-user (MU) receivers. There are various types of MU receivers depending on the combinations of MU detectors and interference cancellation (IC) schemes. Link-level simulations show that expectation propagation algorithm (EPA) with hybrid parallel interference cancellation (PIC) is a promising MU receiver, which can achieve fast convergence and similar performance as message passing algorithm (MPA) with much lower complexity.
The proliferation of mobile Internet and connected devices, offering a variety of services at different levels of performance, represents a major challenge for the fifth generation wireless networks and beyond. This requires a paradigm shift towards the development of key enabling techniques for the next generation wireless networks. In this respect, visible light communication (VLC) has recently emerged as a new communication paradigm that is capable of providing ubiquitous connectivity by complementing radio frequency communications. One of the main challenges of VLC systems, however, is the low modulation bandwidth of the light-emitting-diodes, which is in the megahertz range. This article presents a promising technology, referred to as optical- non-orthogonal multiple access (O-NOMA), which is envisioned to address the key challenges in the next generation of wireless networks. We provide a detailed overview and analysis of the state-of-the-art integration of O-NOMA in VLC networks. Furthermore, we provide insights on the potential opportunities and challenges as well as some open research problems that are envisioned to pave the way for the future design and implementation of O-NOMA in VLC systems.
67 - Biao He , An Liu , Nan Yang 2016
This paper proposes a new design of non-orthogonal multiple access (NOMA) under secrecy considerations. We focus on a NOMA system where a transmitter sends confidential messages to multiple users in the presence of an external eavesdropper. The optimal designs of decoding order, transmission rates, and power allocated to each user are investigated. Considering the practical passive eavesdropping scenario where the instantaneous channel state of the eavesdropper is unknown, we adopt the secrecy outage probability as the secrecy metric. We first consider the problem of minimizing the transmit power subject to the secrecy outage and quality of service constraints, and derive the closed-form solution to this problem. We then explore the problem of maximizing the minimum confidential information rate among users subject to the secrecy outage and transmit power constraints, and provide an iterative algorithm to solve this problem. We find that the secrecy outage constraint in the studied problems does not change the optimal decoding order for NOMA, and one should increase the power allocated to the user whose channel is relatively bad when the secrecy constraint becomes more stringent. Finally, we show the advantage of NOMA over orthogonal multiple access in the studied problems both analytically and numerically.
To improve national security, government agencies have long been committed to enforcing powerful surveillance measures on suspicious individuals or communications. In this paper, we consider a wireless legitimate surveillance system, where a full-duplex multi-antenna legitimate monitor aims to eavesdrop on a dubious communication link between a suspicious pair via proactive jamming. Assuming that the legitimate monitor can successfully overhear the suspicious information only when its achievable data rate is no smaller than that of the suspicious receiver, the key objective is to maximize the eavesdropping non-outage probability by joint design of the jamming power, receive and transmit beamformers at the legitimate monitor. Depending on the number of receive/transmit antennas implemented, i.e., single-input single-output, single-input multiple-output, multiple-input single-output and multiple-input multiple-output (MIMO), four different scenarios are investigated. For each scenario, the optimal jamming power is derived in closed-form and efficient algorithms are obtained for the optimal transmit/receive beamforming vectors. Moreover, low-complexity suboptimal beamforming schemes are proposed for the MIMO case. Our analytical findings demonstrate that by exploiting multiple antennas at the legitimate monitor, the eavesdropping non-outage probability can be significantly improved compared to the single antenna case. In addition, the proposed suboptimal transmit zero-forcing scheme yields similar performance as the optimal scheme.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا