In the present thesis, the concept for beyond 3G mobile radio systems is described. A service area concept is introduced in order to combat the performance limiting interferences present in the cellular mobile communication systems, with each service area consisting of a various simultaneously active mobile terminals, a number of fixed access points and a central unit per- forming signal processing. About uplink transmission, the main characteristic of this service area system is that with the aid of joint detection of the transmit signals from the mobile ter- minals performed at uplink transmission, all interferences between the simultaneously active mobile terminals using the same bandwidth is drastically reduced. Moreover the use of OFDM subcarrierwise in the described service area based system allows for intersymbol interference free communication and for simple equalization in the frequency domain.
Through this subcarrierwise equalization the service area based system is equivalent with a number of smaller parallel systems, a fact that affects in a reduced computational complexity in the case of optimum multiuser operating with the maximum likehood principle and subop- timum linear detector zero-forcing. In this thesis the parallel interference cancellation detector is introduced, according to which the multi access interference is iteratively reconstructed and subtracted from the received signal. Parallel interference cancellation detector is compared in terms of performance with suboptimum linear detector, due to the reduced computational com- plexity.
Using standardized COST 207 channel models, the performance of parallel interference can- cellation detector compared with suboptimum linear detector has been investigated for a frozen channel, with the same snapshot using the same parameters of the channel, as well as for a number of system loads. A fact that can be observed in simulations results is that parallel in- terference cancellation detectors could achieve the same performance with a reduction of the complexity as suboptimum linear detector zero-forcing in the case of no estimate refinement and with estimate refinement by hard quantization depending on the load system. With esti- mate refinement by soft quantization the performance of the parallel interference cancellation detector is improved, having better performance than zero-forcing detector in cases with nor- mal load. Moreover with the improvement raised in this thesis, in this normal system load, the performance is more improved. On the other hand in the case of full load system, the PIC detector can not substract all the multi access interference producing error flow, this thing is not too important taking in account that the fully loaded system case should not be never present.
Approximate Algorithms for the Network Pricing Problem with Congestion - MS t...Desirée Rigonat
Thesis for the final dissertation for my MS degree in Computer Science & Engineering.
Subject is Mathematical Optimization in the field of Network Pricing Problems.
The present thesis is the result of a research carried on from September 2011 to August 2012; part of this work has been developed at the Graphes et Optimisation Mathématique (G.O.M.) group of the Université Libre de Bruxelles, under the supervision of Professor Martine Labbé; further development and experimentation have been carried on at the Laboratorio di Ricerca Operativa of the Università degli studi di Trieste with Professor Lorenzo Castelli as supervisor.
Real-time and high-speed vibrissae monitoring with dynamic vision sensors and...Aryan Esfandiari
This thesis shows that spiked-based neuromorphic sensors, such as dynamic vision sensors, open new possibilities for neuroscience instrumentation. Under specific circumstances, this can be an outstanding competitor to conventional technologies, making up for their disadvantages and rectifying current challenges during physical experiments. Such technology is more convenient while maintaining a desired level of accuracy and reliability.
This thesis discusses and considers algorithms through which multiple approaches to noise reduction are represented. Moreover, an Artificial Neural Network, as a classificatory, and the Kalman filter, as an estimator, are compared to determine the best options for a whisker movement monitoring and tracking algorithm. In this case, a modular weighted prediction-correction algorithm is generated with a noticeable level of accuracy and the ability to retain its reliability in noisy and unsuitable
experimental conditions.
This thesis discusses several conventional embedded system platforms for further implementations. All Programmable System-On-Chip is concluded as the most optimal solution for further research in this field. The platform shows noticeable capabilities for more complex dynamic vision sensors expected in the future, along with comprehensive algorithms. This thesis contributes necessary implementations for embedded system platforms with state-of-the-art technologies, such as System-On-Chip components including field-programmable gate array and microcontrollers. These can be used for further research and developments on asynchronous spiked-based neuromorphic sensors.
Approximate Algorithms for the Network Pricing Problem with Congestion - MS t...Desirée Rigonat
Thesis for the final dissertation for my MS degree in Computer Science & Engineering.
Subject is Mathematical Optimization in the field of Network Pricing Problems.
The present thesis is the result of a research carried on from September 2011 to August 2012; part of this work has been developed at the Graphes et Optimisation Mathématique (G.O.M.) group of the Université Libre de Bruxelles, under the supervision of Professor Martine Labbé; further development and experimentation have been carried on at the Laboratorio di Ricerca Operativa of the Università degli studi di Trieste with Professor Lorenzo Castelli as supervisor.
Real-time and high-speed vibrissae monitoring with dynamic vision sensors and...Aryan Esfandiari
This thesis shows that spiked-based neuromorphic sensors, such as dynamic vision sensors, open new possibilities for neuroscience instrumentation. Under specific circumstances, this can be an outstanding competitor to conventional technologies, making up for their disadvantages and rectifying current challenges during physical experiments. Such technology is more convenient while maintaining a desired level of accuracy and reliability.
This thesis discusses and considers algorithms through which multiple approaches to noise reduction are represented. Moreover, an Artificial Neural Network, as a classificatory, and the Kalman filter, as an estimator, are compared to determine the best options for a whisker movement monitoring and tracking algorithm. In this case, a modular weighted prediction-correction algorithm is generated with a noticeable level of accuracy and the ability to retain its reliability in noisy and unsuitable
experimental conditions.
This thesis discusses several conventional embedded system platforms for further implementations. All Programmable System-On-Chip is concluded as the most optimal solution for further research in this field. The platform shows noticeable capabilities for more complex dynamic vision sensors expected in the future, along with comprehensive algorithms. This thesis contributes necessary implementations for embedded system platforms with state-of-the-art technologies, such as System-On-Chip components including field-programmable gate array and microcontrollers. These can be used for further research and developments on asynchronous spiked-based neuromorphic sensors.
Im-ception - An exploration into facial PAD through the use of fine tuning de...Cooper Wakefield
Cooper Wakefield's Engineering Honours research paper into the field of facial PAD through the use of fine tuning deep convolutional neural networks. It places specific emphasis on developing the proof of concept around replay attacks with the intention to illuminate the possibilities within this field.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Parallel Interference Cancellation in beyond 3G multi-user and multi-antenna OFDM systems
1. Final Research Project
Parallel interference cancellation in beyond 3G multi-user
and multi-antenna OFDM systems
David Sabater Dinter
May 2003
2. Universit¨at Kaiserslautern
Fachbereich Elektrotechnik
Lehrstuhl f¨ur hochfrequente
Signal¨ubertragung- und Verarbeitung
-Grundlagen der Elektrotechnik-
Prof. Dr.-Ing. habil. Dr.-Ing E.h. P.W. Baier
final research project
Parallel interference cancellation in beyond 3G multi-user
and multi-antenna OFDM systems
David Sabater Dinter
May 2003
Betreuer: Prof. Dr.-Ing. habil. Dr.-Ing E.h. P.W. Baier
Dipl.-Ing. A. Sklavos
Bearbeiter: David Sabater Dinter
c/ Cami de Son Vich, 12
07150 Andratx, Islas Baleares (Spain)
3. Statement
I hereby assure that I did not use other aid than the ones mentioned within the text to write this
thesis.
Die vorliegende Diplomarbeit wurde von mir selbst¨andig auf Initiative von Herr Dipl.-Ing.
A. Sklavos angefertigt. Bei der Erstellung habe ich mich ausschließlich der angegebenen Hilfs-
mittel bedient.
Kaiserslautern, May 2003
(David Sabater Dinter)
4. Acknowledgements
Sincere gratitude is expressed to Prof. P. W. Baier for presenting me this great opportunity
in working on such an interesting concept of beyond third generation mobile radio systems.
I would like to thank all the members of the Research Group for RF Communications, Uni-
versity of Kaiserslautern, Germany, who contributed in some way or another in the succesful
completion of this diploma thesis.
I would like to thank the invaluable support received from my supervisor Dipl. -Ing. Alexandros
Sklavos throughout the duration of this project. He helped me to explain perfectly all that I had
thought and to understand deep concepts. Thank You very much for all Alex.
Thanks to Prof. Ignaci Furio of the ”Universidad de las Illes Balears”for bring me the opportu-
nity to work in another country with another people and in a very interesting concept.
Este trabajo se lo dedico a mis padres Jos´e y Ute con todo mi cari˜no, si no fuera por ellos,
yo no estar´ia aqu´i, tambi´en se lo dedico a mis hermanos Malena, Mat´ias y Patrick, me siento
afortunado por tener una familia as´i. Tambi´en para mi abuela Margarita por su confianza y
aprecio. Dankesch¨on Oma.
Gracias a todos mis amigos de Kaiserslautern, de Mallorca y sur de la pen´insula, ya que sin
ellos hubiera sido imposible hacer todo esto. Moltes gr`acies a tots.
Kaiserslautern, May 2003
(David Sabater Dinter)
8. 22nd May 2003
1
1 Introduction
1.1 Mobile radio systems
The elementary target of a mobile radio system is provide seamless and qualitative commu-
nication between mobile users or between mobile users and users of a fixed communication
network, by means of transmission of signals in the radio frequency (RF) band. 100 years ago
G. Marconi managed to set up a radio link across the Atlantic, an accomplishment for which
he was awarded the Nobel prize in 1909. A fact that G. Marconi would probably not have
guessed is that thanks to decisive advances in technology, mobile communications is a radically
changing field, dominantly present in every aspect of worldwide research and economy. Repre-
sentative about this phenomenon is that the number of mobile cellular subscribers will surpass
conventional fixed lines during the first decade of this century as indicated by the forecasts.
In what follows a brief outline of the evolution of the mobile communications will be performed.
1.2 Evolution of mobile communications
1.2.1 First generation
In the 80’s several analogue cellular network came into operation around the world, based on
the cellular concept invented by Bell Labs in 1979 [McD79]. Frequency modulation (FM)
and frequency division multiple access (FDMA) [Pro95] were used. According to FDMA,
active users are separated in the frequency domain, by means of assignment of non overlapping
frequency bands to different users. The first generation of analog cellular systems included the
Advanced Mobile Telephone System (AMPS) in the USA, the Total Access Communication
System (TACS) in Europe, the C-450 system in Germany and Portugal, the Nordic Mobile
Telephones (NMT) in Scandinavian countries and the Nippon Telephone and Telegraph (NTT)
system in Japan [PGH95, St¨u01].
1.2.2 Second generation
Parallel to the evolution of mobile communications, decisive progress in digital communications
took place. The increase of the device density in integrated circuits (ICs) and the development
of low rate speech coders spawned the second generation of mobile radio systems. Due to this
fact, the integration of the mobile radio systems in the digitalized Public Switched Telephone
Networks (PSTNs) could be performed more naturally. Another improvement thanks to the dig-
italization was the provision of new services aside from speech, such as data communication. In
contrast to the first generation where FDMA was used, in the second generation Time Division
9. 1.2 Evolution of mobile communications
22nd May 2003
2
Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are used, thanks to the
digital technology CDMA with analog transmission applied in the signal processing techniques
can be used.
In TDMA, the time axis is subdivided in separate non overlapping time slots. Each user is as-
signed a separate slot to transmit and receive information, during which the user uses the whole
available bandwith. Often TDMA can be combined with FDMA. CDMA uses a set of orthog-
onal or quasi-orthogonal codes to spread the information to be transmitted in the frequency
domain. On the receiver, linear filtering with a synchronized replica of the spreading code is
applied to recover the information [Pro95].
With the need of a transition from the multiple standards of many European national radio sys-
tems characterizing the first generation to a Europe-wide standard for the second generation of
mobile radio systems the Groupe Sp´eciale Mobile (GSM) was established by the Conf´erence
Europ´eene des Postes et T´el´ecommunications (CEPT) at 1982 which was later renamed to
Global System of Mobile communications [PGH95, OP98]. In 1988, the European Telecom-
munication and Standardization Institute (ETSI) was founded and GSM became the Technical
Comittee Special Mobile Group (TC SMG).
In the United States an important factor considered by the standardization of second generation
mobile radio systems was the need of backwards the compatibility to AMPS due to the large
number of analog handsets already in operation. The Electronic Industry Association (EIA) and
the Telecommunications Industry Association (TIA) adopted the TDMA based Interim Standard
(IS-) 54 [TIA92, PGH95, OP98], also known as US-TDMA or digital AMPS. IS-136 is the
version of IS-54 with a digital control channel, and is the most commonly used term when
referring to US-TDMA. Backwards compatibility to the analog AMPS system was enabled by
the use of the same carrier spacing of 30 kHz.
1.2.3 Third generation
The need for high data rates and spectrum efficiencies as well as for a global standard initiated
in 1992 research and standardization activities for mobile radio systems of the third generation
(3G) [OP98]. The term initially used to describe the 3G systems in International Communica-
tion Union (ITU) was Future Public Land Mobile Telephone System (FPLMTS) which was later
renamed to International Mobile Telecommunication 2000 (IMT-2000) [IMT]. The 3G Partner-
ship Project (3GPP) was initiated in 1998 to coordinate research activities and standardization
around the world. 3GPP does not contribute directly to ITU and is formed by Organizational
partners, such as ETSI (Europe), Association of Radio Industries and Business (ARIB) and the
Telecommunications Technology Association (TTA) (Korea) and T1 (USA). Several companies
take part in 3GPP as market representation partners and other standardization bodies [3GP]. In
Europe, research concerning 3G mobile radio system is known under the term Universal Mobile
Telephone System (UMTS), began in 1990. In 1998, WCDMA was selected for the FDD mode
10. 1.2 Evolution of mobile communications
22nd May 2003
3
and time division CDMA (TD-CDMA) [KB93] for the TDD mode of UMTS. An important
target of the standardization of UMTS is that the bit rates offered should be determined in ac-
cordance with the Integrated Services Digital Network (ISDN) rates. In particular, 144 Kpbs
(rate of 2B+D ISDN channels) is offered with full coverage and supporting full mobility, and
for limited coverage and mobility, 1920 Kbps (rate of H12 ISDN channel) should be available.
1.2.4 Beyond 3G mobile radio systems
As 3G systems already operate in some parts of the world, research activities directed towards
the definition and design of beyond 3G systems have started in many parts of the world and is
far from being immature. With the expected development of new mobile multimedia services in
the coming years, new technical approaches will be necessary for the future mobile communi-
cations systems. Looking the approximately 10 years of time span observed for 2G or 3G from
first research to the deployment of the system, a new air interface and complete network con-
cepts for beyond 3G systems are already being discussed in research since last year 2000. Due
to the new mobile multimedia services, data services will dominate over pure voice services.
Moreover, in the future the allotted frequency bands will be a scarce resource (more expensive
than scarce 50 billion ¤ for 3G in Germany) , the support of high data rates requires system
designs which make optimum use of the assigned frequency spectrum and thus guarantee a high
spectrum efficiency.
¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡
¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡
¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡
¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡
¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡
¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡
¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡
¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡
¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡
¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡
¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡
¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡
¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡
¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡ ¡
¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢
¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢
¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢
¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢
¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢
¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢
¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢
¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢
¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢
¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢
¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢
¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢
¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢
¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢
£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£
£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£
£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£
£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£
£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£
£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£
£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£
£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£
£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£
£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£¤£
¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥
¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥
¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥
¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥
¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥
¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥
¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥
¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥
¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥¤¥
vehicular
pedestrian
stationary
3rd Generation
0.1 10 100
Mobility
Wireless LAN
Beyond 3G
Data rate [Mbps]
Figure 1.1. General Requirements for Beyond 3G generation mobile communication systems
11. 1.3 Outline of the thesis
22nd May 2003
4
Fig. 1.1 shows that variable and specially high data rates will be requested, which should be
available at a variety of mobility scenarios. Moreover asymmetric data services between up-
and downlink should be supported.
Orthogonal Frequency Division Multiplexing (OFDM) transmission techniques at the physical
layer with interference suppression is considered by the majority of the scientific community to
be the leading the candidate for the beyond 3G mobile radio systems, due to its inherent ability
to mitigate the effects of multipath propagation, which pose a limit at the achievable data rates.
1.3 Outline of the thesis
1.3.1 Objectives of the thesis
Concerning wireless transmissions in the air interface of a mobile radio system one can discern
between uplink (UL) and downlink (DL) transmissions, depending on the direction of the in-
formation flow in the wireless links. In the UL, information is sent from the mobile terminals
(MTs) of the mobile subscribers via the air interface of the mobile radio system to the fixed base
stations (BSs). The transmitted information is then properly forwarded from the core network
of the mobile radio system until the desired communication partners are reached. In the DL,
mobile subscribers are the endpoints of communication links and information is transmitted
wirelessly from the BSs to the MTs. To accomplish the bidirectional flow of information in the
air interface, different time or frequency resources are used for the UL and DL transmissions in
a mobile radio system. Time division duplexing (TDD) is used if different time slot groups are
devoted to UL and DL, whereas is different (paired) frequency bands are used for UL and DL,
frequency division duplexing (FDD) is said to be used.
In UL as well as in the DL, the air interface of a mobile radio system is a system consisting of a
multitude of transmitters and receivers. In the UL (DL) the transmitters are the MTs (BSs) and
the receivers the BSs (MTs) of the mobile radio system. In the general case, transmitters and re-
ceivers employ multiple element antennas and the signals impinging at the antenna elements of
each receiver are the signals from all transmitters, along with noise signals, which represent sig-
nals stemming from sources other than the transmitters the mobile radio system. Equivalently,
signals from a single transmitter are received from all receivers. Hence, the channel of a mobile
radio system can be modelled as a linear, time variant multiple input multiple output (MIMO)
channel, in which the inputs are the antennas of the transmitters and the outputs the antennas of
the receivers. The mobile radio system consisting of the MIMO channel, the transmitters and
the receivers is then modelled as a MIMO system, as Fig. 1.2 shows.
In Fig. 1.2 the general case of an air interface of a mobile radio system modelled as a MIMO
system is depicted. Groups of inputs and outputs of the MIMO channel of Fig. 1.2 are bundled
together to indicate the antenna elements of a single transmitter or receiver, respectively. In
some state of the art mobile radio systems, as e.g. in TD-CDMA [Kle96], signals corresponding
13. 1.3 Outline of the thesis
22nd May 2003
6
ment techniques and to compare the results with ZF detector. Finally a modified data estimate
refinement technique in PIC detector will be introduced and investigated. All the investigations
will take in account different channel characteristics of the channel.
14. 22nd May 2003
7
2 OFDM modulation technique
2.1 Introduction
2.2 History of OFDM
The concept of OFDM can be better comprehended by looking back to its history. At the end of
the 1960s a parallel data transmission was proposed, system Frequency Division Multiplexing
(FDM) is a technique which was used for analog systems. According to FDM the available
bandwidth is divided into a number of narrower frequency bands, then the spectra do not overlap
and each of the simultaneously active users is assigned one of the non overlapping frequency
bands.
A parallel transmission technique is effective in combatting the effects of amplitude and delay
distortion, and impulse noise because each subchannel occupies a relatively to the whole system
bandwidth. In order to get an efficient use of the available spectrum, the spectra of the different
subchannels are allowed to overlap.
Multicarrier modulation is a technique of transmitting data by dividing the data into several
interleaved, or not, bit streams and use these to modulate several carriers. A special case of
multicarrier modulation with spectra overlap is the OFDM where the carrier spacing is carefully
selected so that each subcarrier is orthogonal to the other subcarriers.
In the 1960s, the OFDM technique was used in several high-frequency military systems such as
KINEPLEX, ANDEFT and KATHRYN.
In 1971, Weinstein and Ebert applied the discrete Fourier transform (DFT) to parallel data
transmission systems as part of the modulation and demodulation process. If DFT is used at the
receiver and correlation values with the center of frequency of each subcarrier are calculated,
the transmitted data with no crosstalk can be recovered.
Moreover, to eliminate the banks of subcarrier oscillators and coherent demodulators required
by frequency-division multiplex, completely digital implementations could be realized on spe-
cially developed hardware performing the fast Fourier transform (FFT), which is an efficient im-
plementation of the DFT. Using this method, if ¢¡ is the number of nonoverlapping frequency
subchannels, both transmitter and receiver are implemented using efficient FFT techniques that
reduce the number of operations from
¥
¡ in DFT to £¡ log £¡ in FFT.
In the 1980s, the application of OFDM was investigated on high-speed modems, digital mobile
communications, and high-density recording. Systems realizing the OFDM technique for mul-
tiplexed QAM using DFT, carrier stabilization, clock frequency control and trellis coding are
also implemented.
18. 2.3 Basic principles of OFDM
22nd May 2003
11
Amplitude
Time
Figure 2.3. Spectra of individual subcarriers
is made £¡ times larger, which also reduces the multipath delay spread, relative to the symbol
time, by the same factor. To eliminate intersymbol interference almost completely, a guard
time is introduced for each OFDM symbol. The guard time is chosen larger than the expected
delay spread, such that multipath components from one symbol cannot interfere with the next
symbol. The guard time could consist of no signal at all. In that case, however, the problem of
Intercarrier Interference (ICI) would arise. ICI is crosstalk between different subcarriers, which
means they are no longer orthogonal.
This effect is illustrated in Fig. 2.4. In this example, a subcarrier 1 and a delayed subcarrier 2 are
shown. When an OFDM receiver tries to demodulate the first subcarrier, it will encounter some
interference from the second subcarrier, because within the FFT interval, there is no integer
number of cycles difference between subcarrier 1 and 2. At the same time, there will be crosstalk
from the first to the second subcarrier for the same reason. To eliminate ICI, the OFDM symbol
is cyclically extended in the guard time, as shown in Fig. 2.5. This ensures that delayed replicas
19. 2.3 Basic principles of OFDM
22nd May 2003
12
g replacements
Part of subcarrier #2
causing ICI on subcarrier #1
Delayed subcarrier #2
Subcarrier #1
Guard time FFT integration time = 1/Carrier spacing
OFDM symbol time
Figure 2.4. Effect of multipath with zero signal in the guard time; the delayed subcarrier 2
causes ICI on subcarrier 1 and vice versa
of the OFDM symbol always have an integer number of cycles within the FFT interval, as long
as the delay is smaller than the guard time. As a result, multipath signals with delays smaller
than the guard time cannot cause ICI. As an example of how multipath affects OFDM, Fig. 2.6
shows received signals for a two-ray channel, where the dotted curve is a delayed replica of the
solid curve. Three separate subcarriers are shown during three symbol intervals. In reality, an
OFDM receiver only sees the sum of all these signals, but showing the separated components
makes it more clear what the effect of multipath is. From the figure, It can seen that the OFDM
subcarriers are BPSK modulated, which means that there can be 180-degree phase jumps at
the symbol boundaries. For the dotted curve, these phase jumps occur at a certain delay after
the first path. In this particular example, this multipath delay is smaller than the guard time ,
which means there are no phase transitions during the FFT interval. Hence, an OFDM receiver
”sees”the sum of pure sine waves with some phase offsets. This summation does not destroy
the orthogonality between the subcarriers, it only introduces a different phase shift for each
subcarrier. The orthogonality does become lost if the multipath delay becomes larger than the
guard time. In that case, the phase transitions of the delayed path within the FFT interval of the
receiver. The summation of the sine waves of the first path with the phase modulated waves of
the delayed path no longer gives a set of orthogonal pure sine waves, resulting in a certain level
of interference.
20. 2.4 Parameterization of an OFDM system
22nd May 2003
13
Guard time / cyclic prefix FFT integration time = 1/carrier spacing
OFDM symbol time
Figure 2.5. OFDM symbol with cyclic extension
2.4 Parameterization of an OFDM system
The choice of various parameters of an OFDM system is a tradeoff between various, often
conflicting requirements. Usually, there are three main requirements to start with: bandwidth,
bit rate, and delay spread. The delay spread directly dictates the guard time. As a rule, the
guard time should be about two to four times the root-mean-squared delay spread. This value
depends on the type of coding and QAM modulation. Higher order QAM (like 64-QAM) is
more sensitive to ICI and ISI than QPSK; while heavier coding obviously reduces the sensitivity
to such interference.
21. 2.5 OFDM signal processing
22nd May 2003
14
g replacements
First arriving path
Reflection delay
Reflection delay
Guard time
Guard time
FFT integration time
Phase transitions
OFDM symbol time
Figure 2.6. Example of an OFDM signal with three subcarriers in a two-ray multipath channel.
The dashed line represents a delayed multipath component
Now that the guard time has been set, the symbol duration can be fixed. To minimize the signal-
to-noise ratio (SNR) loss caused by the guard time, it is desirable to have the symbol duration
much larger then the guard time. It cannot be arbitrarily large, however, because a larger symbol
duration means more subcarriers with a smaller subcarrier spacing, a larger implementation
complexity, and more sensitivity to phase noise and frequency offset, as well as an increased
peak-to-average power ratio. Hence, a practical design choice is to make the symbol duration
at least five times the guard time, which implies a 1 dB SNR loss because of the guard time.
After the symbol duration and guard time are fixed, the number of subcarriers follows directly
as the requiered -3 dB bandwidth divided by de subcarrier spacing, which is the inverse of the
symbol duration less the guard time. Alternatively, the number of subcarriers may be deter-
mined by the required bit rate divided by the bit rate per subcarrier. The bit rate per subcarrier
is defined by the modulation type, coding rate, and symbol rate.
An additional requirement that can affect the chosen parameters is the demand for an integer
number of samples both within the FFT/IFFT interval and in the symbol interval. The only
solution to this problem is to change one of the parameters slightly to meet the integer constraint.
2.5 OFDM signal processing
Until now, how the basic OFDM signal is formed using the IFFT and adding a cycling extension
has been described.
22. 2.5 OFDM signal processing
22nd May 2003
15
The system model of an OFDM transmission technique is shown in Fig. 2.7.
The high rate input data stream is divided into many low rate parallel data streams. Each parallel
data stream is then coded using a forward error correcting (FEC) scheme and mapped to a
complex symbol alphabet. Both operations can be done in one module if coded modulation
is applied. These complex symbols are the input for the inverse fast Fourier transform (IFFT)
module which computes the time samples corresponding to the set of parallel subchannels in
frequency. Then a cyclic prefix (CP) is inserted to avoid ISI due to multipath propagation in the
mobile radio channel. Finally, the transmission filter forms the continuous time signal that is
upconverted into high frequency for its transmission over the channel.
At the receiver the received signal is downconverted and sampled to obtain the discrete signal
after the reception filter. The received block is windowed to remove the cyclic prefix and the
samples are converted from time into frequency domain by the FFT module. Then, depending
on the used modulation scheme, the amplitude and phase shifts of each subchannel have to be
equalized and the received complex symbols are inversely mapped and decoded. Finally, the
original serial data stream is obtained.
24. 22nd May 2003
17
3 Investigated system
3.1 Service area concept versus cellular concept
Mobile radio systems have to serve a large number of mobile subscribers. To cope with the
problematic regarding the efficient coverage of the theoretically infinite geographical area, the
cellular system invented by Bell Labs in 1979 [McD79] is applied in the mobile radio systems
of the first, second and third generation. According to the cellular system, mobile radio oper-
ators distribute a number of base stations (BSs) over the geographical area of responsibility in
order to accomplish radio coverage. Mobile terminals (MTs) are served by the nearest BS and
the area responsability of each BS is termed cell.
To avoid interference situations between the individual radio links of the MTs of neighboring
cells utilizing the same frequencies, different frequency bands may be assigned to each cell.
However, given the theoretically infinite size of the area to be covered, such a solution would
lead to a waste of resources. In the cellular concept, the frequency band assigned to the mobile
radio operator, is distributed among cells of a particular group, termed cluster and the number
of cells forming a cluster is called cluster size.
As attenuation of electromagnetic waves grows with the distance of propagation, a specific par-
tial frequency band of a cell is reused after a sufficiently large distance, because the interference
between MTs of the two cells using the same frequencies can be considered to be negligible.
In this way, the whole geographical area is covered with clusters of cells. In GSM cluster size
of 4 is used but in 3G mobile radio system (UMTS), unity cluster size is used and the resulting
intercell interference is mitigated by the use of spread spectrum techniques in each cell. Fig. 3.1
shows the architecture of a conventional cellular system. Each cell contains a BS, and the MTs
of each cell communicate solely with this BS. All BSs are connected to a central entity termed
core network in Fig. 3.1, which, in the case of GSM, consists of the base station controllers and
the mobile switching centers [MP92]. The core network can be considered the data source and
data sink in the communication with the MTs.
An alternative air interface architecture to cellular systems are service area (SA) based systems
[WMS
A
02, SWC
A
02, SWC
A
01]. In the SA based air interface architecture, instead of individ-
ual BSs access points (AP) are introduced with groups of such APs being linked to a central
unit (CU). The CUs in their turn are connected to the core network. Each such group defines
a SA, and the MTs of each SA communicate with the SA specific CU via all APs of the SA.
Instead of a number of cells - each with a BS- of a conventional cellular systems we now have
a SA with a number of APs, which are connected to a CU. Fig. 3.2 shows the architecture of a
SA-based system as opposed to the cellular system architecture, shown in Fig. 3.1.
In the UL, the transmit signals of the simultaneously MTs of a SA are received by ¢¡ APs
of the SA and fed to the CU, where they are jointly processed. The aim of this joint processing
consists in exploiting the signal energies received by the £¡ APs of the SA in a optimum way,
25. 3.1 Service area concept versus cellular concept
22nd May 2003
18
PSfrag replacements
core network
BS
MS
cell
Figure 3.1. Conventional cellular system with 12 cells and cluster size 4
C U
C U
c o r e n e t w o r k
S A
A P
M T
C U
Figure 3.2. Architecture of a SA-based system, example with 3 SAs
and in simultaneously combating the impacts of intersymbol interference (ISI) and intra-SA
multiple access interference (MAI). The CU jointly detects the signals radiated by MTs of
the SA and provides the data transmitted by the MTs at its output. This means that in the UL
the CU performs joint detection (JD) [Ver98].
In the DL, each MT of a SA is supported by transmit signals radiated by ¢¡ APs of the SA.
These signals are generated in the CU based on the data for each MT of the SA in such a way
that the transmit signals for each MT have minimum powers and cause minimum interference
at other MTs, and the complexity of the MTs can be kept low. This means that in the DL the
CU performs joint transmission (JT) [MBW
A
00].
50. 22nd May 2003
43
7 Results
7.1 Introduction
In this chapter an investigation concerning PIC detectors is developed for Beyond 3G systems,
for a SA based system in the uplink transmission. Different performance measures described in
Chapter 6, are used to assess the performance of the PIC detector, a special case is introduced
and finally a modification of the PIC estimate refinement is applied and investigated.
It is assumed that the MTs employ such a power control scheme described in Section 3.4, that
the energy of the partial received signal
%£ ¢
k£ n
2
¥ , at the APs of the SA caused by the transmission
of a single data symbol
¢
k£ n
2
¥ is constant for all data symbols
¢
k£ n
2
¥ ¢ k ¦ ¨S ¢ n¡ ¦
¨q £¡ . This fact is expressed by a proper normalization of the channel transfer matrix
%
.
It is to be remarked that all the simulations have been performed over a frozen channel with the
same parameters fixed for all simulations, i.e., the same snapshot of a channel with exponen-
tially fading power delay spectrum, according to the COST 207 channel model, is used in all
simulations.
The fixed parameters are:
¥ Carrier frequency UTq¦ cP c¡
¢£¢
¥ System used bandwidth
¡
¦
I
`¡¤
¢£¢
¥ Length of channel impulse response in taps ¥ ¦ ¨
7.2 Spectral radius of PIC
As one of the most important aspects about the PIC detectors due to the iterative nature of PIC
is the convergence, an important performance measure for the PIC detector is the spectral radius
described in Section 6.4.
Consequently an investigation regarding spectral radius is developed in this section, taking in
account that a frozen channel is used in all simulations.
The spectral radius for each subcarrier can describe the convergence in the case of no refinement
estimation. In Figs. 7.1 and 7.2 the cumulative distribution function (cdf) of spectral radius 9 ,
is shown for the case of a scenario where PIC is performed subcarrierwise and a sufficiently
large number £¡ of subcarriers is used. In the case of ¡ ¦
¤
APs seen in Fig. 7.1, it can be