Loading...
Search for: multiusers
0.004 seconds
Total 41 records

    A new joint power and subcarrier allocation scheme for multiuser OFDM systems

    , Article 14th IEEE 2003 International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC2003, Beijing, 7 September 2003 through 10 September 2003 ; Volume 2 , 2003 , Pages 1959-1963 ; 0780378229 (ISBN); 9780780378223 (ISBN) Bakhtiari, E ; Khalaj, B. H ; Sharif University of Technology
    2003
    Abstract
    In this paper, a new scheme for adaptiva subcarrier, bit and power allocation for downlink transmission of multiuser orthogonal frequency division multiplexing (OFDM) systems is presented. An adaptive algorithm is introduced to achieve the desired bit rate and BER for QoS (quality of service) of different users in a frequency selective fading channel, while the total transmit power is minimized. The performance and complexity of the proposed scheme is also thoroughly compared with the other existing methods. As the simulation results show, the proposed algorithm outperforms all prior sub-optimum schemes, while offering comparable computational complexity. © 2003 IEEE  

    Asymptotic bounds on the optimum multiuser efficiency of randomly spread CDMA

    , Article 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2014 ; May , 2014 , pp. 599-603 ; ISBN: 9783901882630 Sedaghat, M. A ; Muller, R. R ; Marvasti, F ; Sharif University of Technology
    Abstract
    We derive some bounds on the Optimum Asymptotic Multiuser Efficiency (OAME) of randomly spread CDMA as extensions of the result by Tse and Verdú. To this end, random Gaussian and random binary antipodal spreading are considered. Furthermore, the input signal is assumed to be Binary Phase Shift Keying (BPSK). It is shown that in a CDMA system with K-user and N chips when K and N → 8 and the loading factor, K over N, grows logarithmically with K, the OAME converges to 1 almost surely under some condition. It is also shown that a Gaussian randomly spread CDMA system has a performance close to the single user system at high Signal to Noise Ratio (SNR) when the loading factor is kept less than... 

    Multiuser orthogonal signal division multiplexing for doubly-selective fading channel in autonomous vehicular communications

    , Article 1st International Conference for Students on Applied Engineering, ICSAE 2016, 20 October 2016 through 21 October 2016 ; 2017 , Pages 323-327 ; 9781467390538 (ISBN) Tavakkolnia, I ; Dehghani Soltani, M ; Azami, H ; Mashhadi, S ; Al-Shibaany Z. Y. A ; Hameed A. F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    Communication networks with highly mobile users are emerging rapidly. Autonomous vehicular communication is an interesting example of such systems. High mobility speed causes drastic change in channel states, and consequently a doubly selective fading scenario is a proper model for such channels. In this paper, by considering this proper model, we introduce a multiuser system based on orthogonal signal division multiplexing in a cognitive radio scenario. Carrier interferometry codes are also utilized in this system. By designing the transmitter and receiver, the performance of such system is investigated. We show that this system works properly when users are moving rapidly, and moreover the... 

    An adaptive latency mitigation scheme for massively multiuser virtual environments

    , Article Journal of Network and Computer Applications ; Volume 32, Issue 5 , September , 2009 , Pages 1049–1063 Hariri, B. (Behnoosh) ; Shirmohammadi, Sh. (Shervin) ; Pakravan, M. R. (Mohammad Reza) ; Alavi, M. R. (Mohammad Hosein) ; Sharif University of Technology
    Abstract
    As massively multiuser virtual environments (MMVEs) expand in terms of size and user population, they tend toward using P2P architectures as a way to provide scalability without the need for large centralized resources. Distributed hash table (DHT)-based networks have been introduced as a promising option for overlay-based distributed massively multiuser virtual environment applications. However, overlay latency stretch seriously affects MMVE performance where QoS is crucial for real-time user collaboration. This work includes a series of efforts in the alleviation of such undesired latency. Our approach to latency mitigation consists of two phases. First, we propose a position-based ID... 

    Multiuser detections for optical CDMA networks based on expectation-maximization algorithm

    , Article IEEE Transactions on Communications ; Volume 52, Issue 4 , 2004 , Pages 652-660 ; 00906778 (ISSN) Motahari, A. S ; Nasiri Kenari, M ; Sharif University of Technology
    2004
    Abstract
    In this paper, we introduce new unblind and blind multiuser detectors for an optical code-division multiple-access system. The detectors have two soft and hard stages. In the soft stage, a soft estimation of the interference is obtained by solving an unconstrained maximum-likelihood problem via the iterative expectation-maximization (EM) algorithm. Then, the hard stage detects the user information bit by solving a one-dimensional Boolean constrained problem conditioned on knowing the interference. Our results reveal that the proposed detectors have very low complexity, and are robust against changes in parameters. Moreover, the numerical results illustrate that despite of their simplicities,... 

    Iterative multiuser detection and decoding for coded CDMA systems in frequency-selective fading channels

    , Article IEICE Transactions on Communications ; Volume E85-B, Issue 12 , 2003 , Pages 2807-2815 ; 09168516 (ISSN) Farmanbar, H ; Nasiri Kenari, M ; Sharif University of Technology
    Institute of Electronics, Information and Communication, Engineers, IEICE  2003
    Abstract
    A receiver structure, which has linear computational complexity with the number of users, is proposed for decoding multiuser information data in a convolutionally coded asynchronous DS-CDMA system in multipath fading channels. The proposed receiver architecture consists of a multiuser likelihood calculator followed by a bank of soft-input soft-output (SISO) channel decoders. Information is fed back from SISO channel decoders to multiuser likelihood calculator, and the processing proceeds in an iterative fashion analogous to the decoding of turbo codes. A simplification to the above receiver structure is given too. Simulation results demonstrate that for both receiver structures at high... 

    Iterative multiuser detection and decoding for coded CDMA in frequency-selective fading channels

    , Article 12th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2001), San Diego, CA, 30 September 2001 through 3 October 2001 ; Volume 1 , 2001 , Pages A11-A15 Farmanbar, H ; Nasiri Kenari, M ; IEEE ; Sharif University of Technology
    2001
    Abstract
    A receiver structure, which has linear computational complexity with the number of users, is proposed for decoding multiuser information data in a convolutionally coded asynchronous DS-CDMA system in multipath fading channels. The proposed receiver architecture consists of a multiuser likelihood calculator followed by a bank of soft-input soft-output (SISO) channel decoders. Information is fed back from SISO channel decoders to multiuser likelihood calculator, and the processing proceeds in an iterative fashion analogous to the decoding of turbo codes. A simplification to the above receiver structure is given also. Simulation results demonstrate that, for both receiver structures, at high... 

    Bounds on the sum capacity of synchronous binary CDMA channels

    , Article IEEE Transactions on Information Theory ; Volume 55, Issue 8 , 2009 , Pages 3577-3593 ; 00189448 (ISSN) Alishahi, K ; Marvasti, F ; Aref, V ; Pad, P ; Sharif University of Technology
    2009
    Abstract
    In this paper, we obtain a family of lower bounds for the sum capacity of code-division multiple-access (CDMA) channels assuming binary inputs and binary signature codes in the presence of additive noise with an arbitrary distribution. The envelope of this family gives a relatively tight lower bound in terms of the number of users, spreading gain, and the noise distribution. The derivation methods for the noiseless and the noisy channels are different but when the noise variance goes to zero, the noisy channel bound approaches the noiseless case. The behavior of the lower bound shows that for small noise power, the number of users can be much more than the spreading gain without any... 

    Approximation of Delay-Memory Trade-off for Cache-aided Multiuser Channels

    , M.Sc. Thesis Sharif University of Technology Zamani, Amir Reza (Author) ; Maddah Ali, Mohammad Ali (Supervisor) ; Mirmohseni, Mahtab (Co-Supervisor)
    Abstract
    In last decades, network traffic has shifted from voice to content, which can cause network congestion. A common technique to reduce the chance of congestion during peaktraffic periods, which leads to fewer congestion, is to duplicate contents in distributed memories across the network (servers, users, routers, ...). This technique is called caching. We study a cache-aided Gaussian broadcast channel (BC), where a transmitter is connected to two users through a Gaussian BC. The transmitter has access to a server with N equal size files. Each user has a local cache memory which is filled up in the placement phase. In the delivery phase, each user requests one of the files from the transmitter... 

    On optimum asymptotic multiuser efficiency of randomly spread CDMA

    , Article IEEE Transactions on Information Theory ; Volume 61, Issue 12 , 2015 , Pages 6635-6642 ; 00189448 (ISSN) Sedaghat, M. A ; Müller, R. R ; Marvasti, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    We extend the result by Tse and Verdú on the optimum asymptotic multiuser efficiency of randomly spread code division multiple access (CDMA) with binary phase shift keying input. Random Gaussian and random binary antipodal spreading are considered. We obtain the optimum asymptotic multiuser efficiency of a K-user system with spreading gain N when K and N → ∞ and the loading factor, (K/N) , grows logarithmically with K under some conditions. It is shown that the optimum detector in a Gaussian randomly spread CDMA system has a performance close to the single user system at high signal-to-noise ratio when K and N → ∞ and the loading factor, (K/N), is kept less than (log3 K/2). Random binary... 

    Power control for multirate CDMA systems with imperfect successive interference cancellation

    , Article 2004 IEEE Wireless Communications and Networking Conference, WCNC 2004, Atlanta, GA, 21 March 2004 through 25 March 2004 ; Volume 3 , 2004 , Pages 1388-1393 ; 0780383443 (ISBN) Jalali, S ; Khalaj, B. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2004
    Abstract
    In this paper, we will address the issue of power distribution and decoding order in the uplink side of a multirate code division multiple access (CDMA) system based on linear successive interference cancellation (SIC). First, the closed form expressions for the required received powers at the base station, in order to achieve the users bit rate and Quality of Service (QoS) requirements, will be derived. Then, we will investigate the problem of optimal decoding order of the users under imperfect interference cancellation condition and will show that optimum decoding order of users, unlike the case of perfect SIC, is a function of their requested SINR values in addition to their path gains.... 

    Iterative mmse group-blind multiuser detection for a coded cdma system

    , Article IEEE Wireless Communications and Networking Conference, WCNC ; Volume 1 , 2002 , Pages 492-496 ; 15253511 (ISSN); 0780373766 (ISBN) Taheri, M. M ; Nasiri Kenari, M ; Sharif University of Technology
    2002
    Abstract
    In this paper, we consider the problem of multiuser detection in the presence of users with unknown signature codes for a synchronous coded CDMA system. Interference suppression for unknown users is done by projecting the received signal on the null space of known users and then using eigenvalue decomposition and subspace techniques to derive a detector that cancels the known interference and successfully mitigates the unknown interference. Significant performance gains over detectors that ignore unknown users and treats them as noise is achieved. © 2001 IEEE  

    Wireless LAN Scheduling for Achieving Multiuser Diversity and QoS

    , M.Sc. Thesis Sharif University of Technology Marzi, Zhinus (Author) ; Golestani, Jamaloddin (Supervisor)
    Abstract
    Increasing demand for higher data rates and more reliable communications along with growing applications of multimedia networks in everyday life on one hand, and limited resources on the other, have given rise to researches investigating spectrum efficiency enhancement techniques, among which multiuser diversity has always been of considerable importance. This thesis is a study on utilization of multiuser diversity in wireless LANs via scheduling. Where throughput and Quality of Service (QoS) in communication networks are being investigated, it is mostly advantageous to describe the traffic behavior of resources by greedy or non-greedy models. So far, there are plenty of investigations on... 

    Rendezvous Algorithms for Cognitive Radio Networks

    , M.Sc. Thesis Sharif University of Technology Tahernia, Mehrdad (Author) ; Pakravan, Mohammadreza (Supervisor)
    Abstract
    In the present thesis we will design and study some rendezvous algorithms for cognitive radio networks. In cognitive radio networks, secondary users try to access the spectrum of primary users in an opportunistic manner. Each secondary user constructs a channel list of accessible resources by channel sensing. These resources are not necessarily the same for different users; therefore, in order to make a connection in absence of a fixed control channel, different secondary users should find each other properly and quickly after entering the network. This is known as the blind rendezvous problem. We will develop and examine a new sequence based algorithm for blind rendezvous. Moreover, some... 

    Performance Analysis of Cognitive Radio Networks With Capability of Spectrum Mobility

    , M.Sc. Thesis Sharif University of Technology Bayat, Mozhgan (Author) ; Ashtinani, Farid (Supervisor)
    Abstract
    In cognitive radio networks, secondary users try to use empty channels that primary users provide for transmitting data. First, the secondary users sense the target channels. If the selected channel is empty, they send their data. When the primary user returns, the secondary user has to find another empty channel for transmitting data. The process of changing channel is called hand off. In recent years, there are challenges in the spectrum mobility of for reducing delay time of secondary users packet. In this thesis, we assume that the secondary users network is an ad-hoc network. We use contestation based method for reducing collision between secondary users. In this thesis, we present an... 

    On marton's inner bound and its optimality for classes of product broadcast channels

    , Article IEEE Transactions on Information Theory ; Vol. 60, Issue. 1 , 2014 , pp. 22-41 ; ISSN: 0018-9448 Geng, Y ; Gohari, A ; Nair, C ; Yu, Y ; Sharif University of Technology
    Abstract
    Marton's inner bound is the tightest known inner bound on the capacity region of the broadcast channel. It is not known, however, if this bound is tight in general. One approach to settle this key open problem in network information theory is to investigate the multiletter extension of Marton's bound, which is known to be tight in general. This approach has become feasible only recently through the development of a new method for bounding cardinalities of auxiliary random variables by Gohari and Anantharam. This paper undertakes this long overdue approach to establish several new results, including 1) establishing the optimality of Marton's bound for new classes of product broadcast... 

    An adaptive latency mitigation scheme for massively multiuser virtual environments

    , Article Journal of Network and Computer Applications ; Volume 32, Issue 5 , 2009 , Pages 1049-1063 ; 10848045 (ISSN) Hariri, B ; Shirmohammadi, S ; Pakravan, M. R ; Alavi, M. H ; Sharif University of Technology
    2009
    Abstract
    As massively multiuser virtual environments (MMVEs) expand in terms of size and user population, they tend toward using P2P architectures as a way to provide scalability without the need for large centralized resources. Distributed hash table (DHT)-based networks have been introduced as a promising option for overlay-based distributed massively multiuser virtual environment applications. However, overlay latency stretch seriously affects MMVE performance where QoS is crucial for real-time user collaboration. This work includes a series of efforts in the alleviation of such undesired latency. Our approach to latency mitigation consists of two phases. First, we propose a position-based ID... 

    A hierarchical HMM model for online gaming traffic patterns

    , Article 2008 IEEE International Instrumentation and Measurement Technology Conference, I2MTC, Victoria, BC, 12 May 2008 through 15 May 2008 ; 2008 , Pages 2195-2200 ; 10915281 (ISSN) ; 1424415411 (ISBN); 9781424415410 (ISBN) Hariri, B ; Shirmohammadi, S ; Pakravan, M. R ; Sharif University of Technology
    2008
    Abstract
    Online games seem to become major contributors to Internet traffic. Therefore a great deal of effort is being devoted to the analysis and modeling of network game traffic. However the results from the previous measurements have not been unified into a single frame work while gaming traffic model is of high importance to network designers. Considering the fact that Gaming traffic is generated by the player's interaction during game sessions, we propose to model the player's activities and later use this model to extract the traffic pattern. We will propose a model for the gaming player behavior regarding traffic generation based on hierarchical hidden markov model. Player activities are... 

    Multiuser Detection in Spread Time CDMA Systems via Circular Multiple Access Codes

    , M.Sc. Thesis Sharif University of Technology Baghali Khanian, Zahra (Author) ; Mashhadi, Saeed (Supervisor) ; Khalaj, Babak (Co-Advisor)
    Abstract
    Multiuser detection provides the first comprehensive of the subject of multiuser digital communication, dealing with demodulation of mutually interfering digital information streams. Multiple access spread time codes which are more resistant to various channel impairments, is a motivation to design a multiple access system using spread time systems via circulant codes, to detect users bit stream without multiuser interference. So first of all we introduce multiple access systems and spread time codes. To have an overview of desired system we present a matrix representation of OFDM system. With allocating multiuser circulant coded to users in spread time system, in AWGN channel , users’ bit... 

    Multiuser Interference Mitigation for Performance Enhancement in OCDMA and OFDMA Systems

    , Ph.D. Dissertation Sharif University of Technology Nezamalhosseini, Alireza (Author) ; Marvasti, Farokh (Supervisor)
    Abstract
    Due to the extremely fast growth in high speed data rate demand in the recent years, it is necessary to make use of the optical technologies in telecommunication access networks. Passive optical networks (PONs) has got much attention compared to other optical access architectures due to some advantages such as low installation and maintenance expenses, and providing more reliable network transmission.
    In this thesis, we will study two multiple access techniques, namely optical code division multiple access (OCDMA) and optical orthogonal frequency division multiple access (OOFDMA). Since the system performance of these techniques are mainly limited by multiple access interference, we...