Search results

1 – 10 of over 12000
Article
Publication date: 9 March 2010

Xingzhong Xiong, Jianhao Hu, Feng Yang and Xiang Ling

The purpose of this paper is to introduce the analysis and performance of a hybrid multiple access scheme which combines interleave division multiple access (IDMA) and code

Abstract

Purpose

The purpose of this paper is to introduce the analysis and performance of a hybrid multiple access scheme which combines interleave division multiple access (IDMA) and code division multiple access (CDMA), referred to as IDMA/CDMA. With experimentations, the scheme can achieve good performance with simple user ends for the system.

Design/methodology/approach

IDMA technique is employed as the uplink transmission and CDMA technique as the downlink transmission. The performance comparison of IDMA and IDMA/CDMA downlink is studied with Monte Carlo simulations to investigate the bit error rates. For IDMA/CDMA downlink, the signals are interleaved by random interleavers, spreaded by M‐sequence and orthogonal Gold sequence, respectively, and then transmitted over an AWGN with BPSK modulation. Moreover, a channel estimation approach for IDMA based on expectation maximization (EM) algorithm is also presented.

Findings

The multi‐user detection (MUD) algorithm in uplink IDMA systems is much simpler than that used in traditional CDMA systems. It is also well known that the orthogonal spreading codes in CDMA can effectively help suppress the MAI in the synchronized environments. But for the asynchronized application, the performance of CDMA systems will degrade due to the serious multiple user interference. According to traditional IDMA and orthogonal code division multiple access/IDMA signal detection algorithms, every UE has to detect all of the signals of other users for iterative detection. The advantages of IDMA and CDMA technologies can be utilized substantially.

Originality/value

The proposed hybrid multiple access scheme can achieve a very simple chip‐by‐chip iterative MUD strategy at base station, and the simplified receiving operation at UE. On the other hand, this paper also evaluates channel estimation approach for IDMA based on EM algorithm.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 29 no. 2
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 11 October 2021

Y.K. Shobha and H.G. Rangaraju

The suggested work examines the latest developments such as the techniques employed for allocation of power, browser techniques, modern analysis and bandwidth efficiency of…

Abstract

Purpose

The suggested work examines the latest developments such as the techniques employed for allocation of power, browser techniques, modern analysis and bandwidth efficiency of nonorthogonal multiple accesses (NOMA) in the network of 5G. Furthermore, the proposed work also illustrates the performance of NOMA when it is combined with various techniques of wireless communication namely network coding, multiple-input multiple-output (MIMO), space-time coding, collective communications, as well as many more. In the case of the MIMO system, the proposed research work specifically deals with a less complex recursive linear minimum mean square error (LMMSE) multiuser detector along with NOMA (MIMO-NOMA); here the multiple-antenna base station (BS) and multiple single-antenna users interact with each other instantaneously. Although LMMSE is a linear detector with a low intricacy, it performs poorly in multiuser identification because of the incompatibility between LMMSE identification and multiuser decoding. Thus, to obtain a desirable iterative identification rate, the proposed research work presents matching constraints among the decoders and identifiers of MIMO-NOMA.

Design/methodology/approach

To improve the performance in 5G technologies as well as in cellular communication, the NOMA technique is employed and contemplated as one of the best methodologies for accessing radio. The above-stated technique offers several advantages such as enhanced spectrum performance in contrast to the high-capacity orthogonal multiple access (OMA) approach that is also known as orthogonal frequency division multiple access (OFDMA). Code and power domain are some of the categories of the NOMA technique. The suggested research work mainly concentrates on the technique of NOMA, which is based on the power domain. This approach correspondingly makes use of superposition coding (SC) as well as successive interference cancellation (SIC) at source and recipient. For the fifth-generation applications, the network-level, as well as user-experienced data rate prerequisites, are successfully illustrated by various researchers.

Findings

The suggested combined methodology such as MIMO-NOMA demonstrates a synchronized iterative LMMSE system that can accomplish the optimized efficiency of symmetric MIMO NOMA with several users. To transmit the information from sender to the receiver, hybrid methodologies are confined to 2 × 2 as well as 4 × 4 antenna arrays, and thereby parameters such as PAPR, BER, SNR are analyzed and efficiency for various modulation strategies such as BPSK and QAMj (j should vary from 8,16,32,64) are computed.

Originality/value

The proposed hybrid MIMO-NOMA methodologies are synchronized in terms of iterative process for optimization of LMMSE that can accomplish the optimized efficiency of symmetric for several users under different noisy conditions. From the obtained simulated results, it is found, there are 18%, 23% 16%, and 8% improvement in terms of Bit Error Rate (BER), Least Minimum Mean Squared Error (LMMSE), Peak to Average Power Ratio (PAPR), and capacity of channel respectively for Binary Phase Shift Key (BPSK) and Quadrature Amplitude Modulation (QAM) modulation techniques.

Details

International Journal of Intelligent Unmanned Systems, vol. 11 no. 1
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 30 April 2020

Kishor Purushottam Jadhav, Amita Mahor, Anirban Bhowmick and Anveshkumar N.

Non-orthogonal multiple access (NOMA) is a much hopeful scheme, which is deployed to enhance the spectral efficiency (SE) significantly, and it also enhances the massive access

Abstract

Purpose

Non-orthogonal multiple access (NOMA) is a much hopeful scheme, which is deployed to enhance the spectral efficiency (SE) significantly, and it also enhances the massive access that has attained substantial concern from industrial and academic domains. However, the deployment of superposition coding (SC) at the receiver side resulted in interference. For reducing this interference, “multi-antenna NOMA” seems to be an emerging solution. Particularly, by using the channel state information at the transmitter, spatial beam forming could be deployed that eliminates the interference in an effective manner.

Design/methodology/approach

This survey analyzes the literature review and diverse techniques regarding the NOMA-based spatial modulation (SM) environment. It reviews a bunch of research papers and states a significant analysis. Initially, the analysis depicts various transmit antenna selection techniques that are contributed in different papers. This survey offers a comprehensive study regarding the chronological review and performance achievements in each contribution. The analytical review also concerns on the amplitude phase modulation (APM) selection schemes adopted in several contributions. Moreover, the objective functions adopted in the reviewed works are also analyzed. Finally, the survey extends with various research issues and its gaps that can be useful for the researchers to promote improved future works on NOMA-based SM.

Findings

This paper contributes to a review related to NOMA-based SM systems. Various techniques and performance measures adopted in each paper are analyzed and described in this survey. More particularly, the selection of transmission antenna and APM are also examined in this review work. Moreover, the defined objective function of each paper is also observed and made a chronological review as well. Finally, the research challenges along with the gaps on NOMA-based SM systems are also elaborated.

Originality/value

This paper presents a brief analysis of NOMA-based SM systems. To the best of the authors’ knowledge, this is the first work that uses NOMA-based SM systems to enhance SE.

Details

International Journal of Pervasive Computing and Communications, vol. 16 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 22 July 2021

Ranjeet Yadav and Ashutosh Tripathi

Multiple input multiple-output (MIMO) has emerged as one among the many noteworthy technologies in recent wireless applications because of its powerful ability to improve…

Abstract

Purpose

Multiple input multiple-output (MIMO) has emerged as one among the many noteworthy technologies in recent wireless applications because of its powerful ability to improve bandwidth efficiency and performance, i.e. through developing its unique spatial multiplexing capability and spatial diversity gain. For carrying out an enhanced communication in next-generation networks, the MIMO and orthogonal frequency division multiple systems were combined that facilitate the spatial multiplexing on resource blocks (RBs) based on time-frequency. This paper aims to propose a novel approach for maximizing the throughput of cell-edge users and cell-center users.

Design/methodology/approach

In this work, the specified multi-objective function is defined as the single objective function, which is solved by the introduction of a new improved algorithm as well. This optimization problem can be resolved by the fine-tuning of certain parameters such as assigned power for RB, cell-center user, cell-edge user and RB allocation. The fine-tuning of parameters is attained by a new improved Lion algorithm (LA), termed as Lion with new cub generation (LA-NCG) model. Finally, the betterment of the presented approach is validated over the existing models in terms of signal to interference plus noise ratio, throughput and so on.

Findings

On examining the outputs, the adopted LA-NCG model for 4BS was 66.67%, 66.67% and 20% superior to existing joint processing coordinated multiple point-based dual decomposition method (JC-DDM), fractional programming (FP) and LA models. In addition, the throughput of conventional JC-DDM, FP and LA models lie at a range of 10, 45 and 35, respectively, at the 100th iteration. However, the presented LA-NCG scheme accomplishes a higher throughput of 58. Similarly, the throughput of the adopted scheme observed for 8BS was 59.68%, 44.19% and 9.68% superior to existing JC-DDM, FP and LA models. Thus, the enhancement of the adopted LA-NCG model has been validated effectively from the attained outcomes.

Originality/value

This paper adopts the latest optimization algorithm called LA-NCG to establish a novel approach for maximizing the throughput of cell-edge users and cell-center users. This is the first that work uses LA-NCG-based optimization that assists in fine-tuning certain parameters such as assigned power for RB, cell-center user, cell-edge user and RB allocation.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 4 September 2009

Scott Fowler, Marc Eberhard and Keith Blow

The purpose of this paper is to investigate the use of 802.11e MAC to resolve the transmission control protocol (TCP) unfairness.

Abstract

Purpose

The purpose of this paper is to investigate the use of 802.11e MAC to resolve the transmission control protocol (TCP) unfairness.

Design/methodology/approach

The paper shows how a TCP sender may adapt its transmission rate using the number of hops and the standard deviation of recently measured round‐trip times to address the TCP unfairness.

Findings

Simulation results show that the proposed techniques provide even throughput by providing TCP fairness as the number of hops increases over a wireless mesh network (WMN).

Research limitations/implications

Future work will examine the performance of TCP over routing protocols, which use different routing metrics. Other future work is scalability over WMNs. Since scalability is a problem with communication in multi‐hop, carrier sense multiple access (CSMA) will be compared with time division multiple access (TDMA) and a hybrid of TDMA and code division multiple access (CDMA) will be designed that works with TCP and other traffic. Finally, to further improve network performance and also increase network capacity of TCP for WMNs, the usage of multiple channels instead of only a single fixed channel will be exploited.

Practical implications

By allowing the tuning of the 802.11e MAC parameters that have previously been constant in 802.11 MAC, the paper proposes the usage of 802.11e MAC on a per class basis by collecting the TCP ACK into a single class and a novel congestion control method for TCP over a WMN. The key feature of the proposed TCP algorithm is the detection of congestion by measuring the fluctuation of RTT of the TCP ACK samples via the standard deviation, plus the combined the 802.11e AIFS and CWmin allowing the TCP ACK to be prioritised which allows the TCP ACKs will match the volume of the TCP data packets. While 802.11e MAC provides flexibility and flow/congestion control mechanism, the challenge is to take advantage of these features in 802.11e MAC.

Originality/value

With 802.11 MAC not having flexibility and flow/congestion control mechanisms implemented with TCP, these contribute to TCP unfairness with competing flows.

Details

International Journal of Pervasive Computing and Communications, vol. 5 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 August 2016

Chih-Ta Yen and Guan-Jie Huang

The purpose of this paper is to propose a new optical steganography framework that can be applied to public optical binary phase-shift keying (BPSK) systems by transmitting a…

Abstract

Purpose

The purpose of this paper is to propose a new optical steganography framework that can be applied to public optical binary phase-shift keying (BPSK) systems by transmitting a stealth spectrum-amplitude-coded optical code-division multiple-access signal through a BPSK link.

Design/methodology/approach

By using high-dispersion elements, the stealth data pulses temporally stretch and the amplitude of the signal decreases after stretching. Thus, the signal can be hidden underneath the public signal and system noise. At the receiver end, a polarizer is used for removing the public BPSK signal and the stealth signal is successfully recovered by a balanced detector.

Findings

In a simulation, the bit-error rate (BER) performance improved when the stealth power increased.

Research limitations/implications

The BER performance worsens when the noise power become large. Future work will consider increasing the system performance during high-noise power situation.

Practical implications

By properly adjusting the power of the amplified spontaneous emission noise, the stealth signal can be hidden well in the public channel while producing minimal influence on the public BPSK signal.

Originality/value

In conclusion, the proposed optical steganography framework makes it more difficult for eavesdroppers to detect and intercept the hidden stealth channel under public transmission, even when using a dispersion compensation scheme.

Details

Engineering Computations, vol. 33 no. 6
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 13 August 2021

Manju V.M. and Ganesh R.S.

Multiple-input multiple-output (MIMO) combined with multi-user massive MIMO has been a well-known approach for high spectral efficiency in wideband systems, and it was targeted to…

Abstract

Purpose

Multiple-input multiple-output (MIMO) combined with multi-user massive MIMO has been a well-known approach for high spectral efficiency in wideband systems, and it was targeted to detect the MIMO signals. The increasing data rates with multiple antennas and multiple users that share the communication channel simultaneously lead to higher capacity requirements and increased complexity. Thus, different detection algorithms were developed for the Massive MIMO.

Design/methodology/approach

This paper focuses on the various literature analyzes on various detection algorithms and techniques for MIMO detectors. Here, it reviews several research papers and exhibits the significance of each detection method.

Findings

This paper provides the details of the performance analysis of the MIMO detectors and reveals the best value in the case of each performance measure. Finally, it widens the research issues that can be useful for future researchers to be accomplished in MIMO massive detectors

Originality/value

This paper has presented a detailed review of the detection of massive MIMO on different algorithms and techniques. The survey mainly focuses on different types of channels used in MIMO detections, the number of antennas used in transmitting signals from the source to destination, and vice-versa. The performance measures and the best performance of each of the detectors are described.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 April 2000

Technology Task Group 3

Addresses the current state of the art of wireless technologies and infrastructures, projects where the field will be in the next decade, and discusses some of the challenges that…

5173

Abstract

Addresses the current state of the art of wireless technologies and infrastructures, projects where the field will be in the next decade, and discusses some of the challenges that must be met. Elaborates on the established major areas of commercial wireless access technology in the USA, ranked by deployment extent, which are: terrestrial mobile wireless access; terrestrial broadband wireless access; and mobile satellite service.

Details

info, vol. 2 no. 2
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 1 August 2002

Alan D. Smith and Felix Offodile

Automatic identification and data capture/collection (AIDC) systems are one of the most widely used and under‐recognized IT strategic assets in use in the global economy. Data…

3540

Abstract

Automatic identification and data capture/collection (AIDC) systems are one of the most widely used and under‐recognized IT strategic assets in use in the global economy. Data collection and integration strategies are essential to enterprise resource management systems as well as warehouse management systems. The development of innovation through the development and marketing of products and services has been a key source of competitive advantage for many large and small manufacturing firms and is greatly aided by AIDC technologies. Management needs to control quality, cost, schedule, location of warehouses and plants, inventory levels, pricing, shipment, and a vast host of factors that are based almost entirely on the volume and quality of data and data collection. A discussion of types of bar coding technologies and their associated software/hardware requirements is included, with a mobile communications example.

Details

Information Management & Computer Security, vol. 10 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 August 2001

Seoyong Kim

This paper focuses on searching for the conditions of cooperation in collaborative technology innovation including the Government and private enterprises. After assuming the…

1159

Abstract

This paper focuses on searching for the conditions of cooperation in collaborative technology innovation including the Government and private enterprises. After assuming the collaborative project of code division multiple access (CDMA) as one of the collective actions, attempts to analyze the case of CDMA technology development process by applying the theoretical propositions derived from two approaches, collective action andprisoner dilemma. Identifies government’s roles and strategies as a third party who guarantees the realistic conditions for cooperation to induce the success of joint ventures which inherently have the potential risk of cooperation collapse caused by the opportunistic or free‐riding behaviors of private collaborators as self‐interest seekers. Finally, suggests therealistic conditions for cooperation, government’s roles, and policy tools for the future collaborative R&D.

Details

Benchmarking: An International Journal, vol. 8 no. 3
Type: Research Article
ISSN: 1463-5771

Keywords

1 – 10 of over 12000