scholarly journals Using Least Mean p-Power Algorithm to Correct Channel Distortion in MC-CDMA Systems

Author(s):  
Mohammed Zidane ◽  
Said Safi ◽  
Mohamed Sabri ◽  
Miloud Frikel

This work focuses on adaptive Broadband Radio Access Network (BRAN) channel identification and on downlink Multi-Carrier Code Division Multiple Access (MCCDMA) equalization. We use the normalized BRAN C channel model for 4G mobile communications, distinguishing between indoor and outdoor scenarios. On the one hand, BRAN C channel parameters are identified using the Least Mean p-Power (LMP) algorithm. On the other, we consider these coefficients in the context of adaptive equalization. We provide an overview and a mathematic formulation of MC-CDMA systems. According to these fundamental concepts, the equalizer technique is investigated analytically to compensate for channel distortion in terms of the bit error rate (BER). The numerical simulation results, for various signal-to-noise ratios and different p threshold, show that the presented algorithm is able to simulate the BRAN C channel measured with different accuracy levels. Furthermore, as far as the adaptive equalization problem is concerned, the results obtained using the zero-forcing equalizer demonstrate that the algorithm is adequate for some particular cases of threshold p.

2015 ◽  
Vol 13 (2) ◽  
pp. 14-29
Author(s):  
Mohammed Boutalline ◽  
Belaid Bouikhalene ◽  
Said Safi

In this paper the authors are focused on channel identification and equalization for Multi-Carrier Code Division Multiple Access (MC-CDMA) system. For this, they identify the impulse response of two practical selective frequency fading channels called Broadband Radio Access Network (BRAN A and BRAN B) normalized by the European Telecommunications Standards Institute (ETSI). To identify the channel parameters, they have the positive definite kernels to build on algorithm. The simulations show that the presented method confirms the good performance for different SNR values. In part of equalization, the authors use the Zero Forcing (ZF) and Minimum Mean Square Error (MMSE) equalizers.


Author(s):  
Josef Urban ◽  
Dave Wisely ◽  
Edgar Bolinth ◽  
Georg Neureiter ◽  
Mika Liljeberg ◽  
...  

Author(s):  
Mohammed Zidane ◽  
Said Safi ◽  
Mohamed Sabri ◽  
Ahmed Boumezzough

The aim of this paper is to contribute to study the problems of the blind identification and equalization using Higher Order Cumulants (HOC) in downlink Multi-Carrier Code Division Multiple Access (MC-CDMA) systems. For this problem, two blind algorithms based on HOC for Broadband Radio Access Network (BRAN) channel are proposed. In the one hand, to assess the performance of these approaches to identify the parameters of non minimum phase channels, we have considered two theoretical channels, and one practical frequency selective fading channel called BRAN C, driven by non gaussian signal. In the other hand, we use the Minimum Mean Square Error (MMSE) equalizer technique after the channel identification to correct the channel distortion. Theoretical analysis and numerical simulation results, in noisy environment and for different signal to noise ratio (SNR), are presented to illustrate the performance of the proposed methods.


Systems ◽  
2021 ◽  
Vol 9 (2) ◽  
pp. 46
Author(s):  
Hicham Oualla ◽  
Rachid Fateh ◽  
Anouar Darif ◽  
Said Safi ◽  
Mathieu Pouliquen ◽  
...  

In this paper, we discuss the problem of channel identification by using eight algorithms. The first three algorithms are based on higher-order cumulants, the next three algorithms are based on binary output measurement, and the last two algorithms are based on reproducing kernels. The principal objective of this paper is to study the performance of the presented algorithms in different situations, such as with different sizes of the data input or different signal-to-noise ratios. The presented algorithms are applied to the estimation of the channel parameters of the broadband radio access network (BRAN). The simulation results confirm that the presented algorithms are able to estimate the channel parameters with different accuracies, and each algorithm has its advantages and disadvantages for a given situation, such as for a given SNR and data input. Finally, this study provides an idea of which algorithms can be selected in a given situation. The study presented in this paper demonstrates that the cumulant-based algorithms are more adequate if the data inputs are not available (blind identification), but the kernel- and binary-measurement-based methods are more adequate if the noise is not important (SNR≥16 dB).


2018 ◽  
Vol 7 (4.6) ◽  
pp. 350
Author(s):  
Karthikala. P ◽  
Dr. C.Arunachala Perumal ◽  
Ms. M.Ramya

Mobile data traffic is finding exponential growth currently in telecommunications industry. It has become important to concentrate on both spectral and energy efficiencies in utilizing cellular networks under green communication standpoint. Thus, for 5G the utmost priority is that to increase data traffic and reduce the total network energy ingesting by half. The proposed work is to design the Cloud Radio Access Network (C-RAN) with energy efficient, flexible and capacity-enhanced features by effectively bundling and establishing relation between BBU and RRU utilizing Catechistic technique. Mathematical results with realistic parameters prove that the projected optimization design clearly improve the energy efficiency of C-RAN’s compared to standard schemes. 


2019 ◽  
Vol 2019 (2) ◽  
pp. 24-30
Author(s):  
Василий Типаков ◽  
Vasily Sergeevich Tipakov ◽  
Тимур Яковлев ◽  
Timur Aleksandrovich Yakovlev

The article is focused on the problem of degrading the signals of broadband 3G / 4G mobile radio access systems in places of subscribers clustering and in so-called “dead zones”. The analysis of the actual principles of building mobile networks has been carried out, the main disadvantages of the approaches to the development of cellular networks have been identified. The current trend of building macro cells in the urban environment has lost its effectiveness due to the increasing frequencies used; it has to be replaced by a fundamentally new way of planning mobile networks. A new principle of providing access to mobile communications “from inside to outside” is proposed, which takes into account the needs of a large number of subscribers in the premises. It is based on setting the maximum number of internal base stations fully meeting the needs of internal network users. Such a distinction will positively affect all subscribers and improve the experience from using the high-quality services of the mobile operators, which will result in increasing the economic performance


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Ke Xiao ◽  
Shaowei Zhang ◽  
Yunhua He

The new radio technology for the fifth-generation wireless system has been extensively studied all over the world. Specifically, the air interface protocols for 5G radio access network will be standardized by the 3GPP in the coming years. In the next-generation 5G new radio (NR) networks, millimeter wave (mmWave) communications will definitely play a critical role, as new NR air interface (AI) is up to 100 GHz just like mmWave. The rapid growth of mmWave systems poses a variety of challenges in physical layer (PHY) security. This paper investigates those challenges in the context of several 5G new radio communication technologies, including multiple-input multiple-output (MIMO) and nonorthogonal multiple access (NOMA). In particular, we introduce a ray-tracing (RT) based 5G NR network channel model and reveal that the secrecy capacity in mmWave band widely depends on the richness of radio frequency (RF) environment through numerical experiments.


2016 ◽  
Vol 37 (2) ◽  
Author(s):  
N. Alsowaidi ◽  
Tawfig Eltaif ◽  
M. R. Mokhtar

AbstractIn this paper we introduce a successive interference cancellation (SIC) scheme for direct sequence optical code division multiple access (DS-OCDMA) systems using pulse position modulation (PPM). Considering double-padded modified prime code (DPMPC) as a signature sequence code, results show that the system has better performance in terms of both capacity and bit error rate (BER) as compared to the one without cancellation scheme, where the system with SIC scheme can support up to 88 users while the system without SIC scheme can support only 38 users at similar BER=10


2009 ◽  
pp. 2752-2765
Author(s):  
Christos Xenakis

The global system for mobile communications (GSM) is the most popular standard that implements second generation (2G) cellular systems. 2G systems combined with general packet radio services (GPRS) are often described as 2.5G, that is, a technology between the 2G and third generation (3G) of mobile systems. GPRS is a service that provides packet radio access for GSM users. This chapter presents the security architecture employed in 2.5G mobile systems focusing on GPRS. More specifically, the security measures applied to protect the mobile users, the radio access network, the fixed part of the network, and the related data of GPRS are presented and analyzed in detail. This analysis reveals the security weaknesses of the applied measures that may lead to the realization of security attacks by adversaries. These attacks threaten network operation and data transfer through it, compromising end users and network security. To defeat the identified risks, current research activities on the GPRS security propose a set of security improvements to the existing GPRS security architecture.


Sign in / Sign up

Export Citation Format

Share Document