Loading...
Search for: cellular-radio-systems
0.012 seconds

    Methods for failure analysis and diagnosis of millimeter-wave system-in-packages

    , Article IEEE Transactions on Device and Materials Reliability ; Volume 17, Issue 2 , 2017 , Pages 371-380 ; 15304388 (ISSN) Fakharzadeh, M ; Tazlauanu, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    This paper presents a sequence of affordable methods applied to diagnose a millimeter-wave system-in-package. The module used in this paper is a 60 GHz transceiver with a waveguide interface, designed to transmit 8 dBm of saturated power. It consists of a flip-chipped RFIC, a multi-layer organic substrate, a metal enclosure with a standard waveguide interface, passive components and a 30-pin connector. The first measured output power was 3 to 6 dB below the desired value over the 60 GHz band. Thus, all parts of the module were thoroughly investigated to detect the cause of power drop. By 3-D electromagnetic simulation of the enclosure, the cavity modes and power leakage in the enclosure were... 

    Breaking anonymity of some recent lightweight RFID authentication protocols

    , Article Wireless Networks ; Volume 25, Issue 3 , 2018 , Pages 1-18 ; 10220038 (ISSN) Baghery, K ; Abdolmaleki, B ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks... 

    Joint mode selection and resource allocation in D2D communication based underlaying cellular networks

    , Article Telecommunication Systems ; Volume 67, Issue 1 , 2018 , Pages 47-62 ; 10184864 (ISSN) Sobhi Givi, S ; Khazali, A ; Kalbkhani, H ; Shayesteh, M. G ; Solouk, V ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    Device-to-Device (D2D) communication technology, under the standardization of third generation partnership project and a component of the evolving fifth generation architecture, is mainly aimed to increase system capacity and data rate via providing direct communications between end devices without the use of routing data through the network. Apart from the attracting features, due to the resource sharing between cellular user equipment (CUE) and D2D user equipment (DUE) in such communications, an efficient algorithm for resource and power allocation to DUE, especially for mobile users is necessary to maintain the performance. The current paper introduces a joint mode algorithm for mobile... 

    Analysis of a deterministic power level selection algorithm with small and large power steps for Aloha networks under saturation

    , Article Wireless Networks ; Volume 15, Issue 3 , 2009 , Pages 407-418 ; 10220038 (ISSN) Khoshnevis, B ; Khalaj, B. H ; Sharif University of Technology
    2009
    Abstract
    Standard power control techniques are not deployable in Aloha networks due to lack of central controlling entity and/or inefficiency of such algorithms in large networks with bursty traffic. To handle this problem in practice, simple transmission power selection algorithms are used for ranging and/or combating harsh channel conditions. In such algorithms, the transmission power is steadily increased by an amount called power step, until the packet is successfully transmitted. Noting that ranging is the major concern of this approach, small power steps are ideal for its operation. However, as we will show in this paper, using small power steps with this algorithm causes a throughput collapse... 

    A new fractional call admission control scheme in integrated cellular network

    , Article Proceedings of 2009 IEEE International Conference on Electro/Information Technology, EIT 2009, 7 June 2009 through 9 June 2009, Windsor, ON ; 2009 , Pages 332-337 ; 9781424433551 (ISBN) Mortazavi Far, L ; Beigy, H ; Sharif University of Technology
    2009
    Abstract
    This paper presents a new model of call admission control which consists of a few key elements for protecting the network in different conditions of workload in a manner that, calls blocking /dropping are kept under desired level. This model consists of two traffic classes of voice and data. In order to give a priority to handoff call over new call, some parameters in this model are adjusted in a manner that handoff dropping is reduced to the least probability in the target cell and the adjacent cells. Some channels are reserved for voice and data calls in each cell to guarantee the quality of service requirements in the network. Limited fractional guard channel is used to have an optimized... 

    Cellular learning automata based dynamic channel assignment algorithms

    , Article International Journal of Computational Intelligence and Applications ; Volume 8, Issue 3 , 2009 , Pages 287-314 ; 14690268 (ISSN) Beigy, H ; Meybodi, M. R ; Sharif University of Technology
    2009
    Abstract
    A solution to channel assignment problem in cellular networks is self-organizing channel assignment algorithm with distributed control. In this paper, we propose three cellular learning automata based dynamic channel assignment algorithms. In the first two algorithms, no information about the status of channels in the whole network will be used by cells for channel assignment whereas in the third algorithm, the additional information regarding status of channels may be gathered and then used by cells in order to allocate channels. The simulation results show that by using the proposed channel assignment algorithms the micro-cellular network can self-organize itself. The simulation results... 

    Downlink resource allocation for autonomous infrastructure-based multihop cellular networks

    , Article Eurasip Journal on Advances in Signal Processing ; Volume 2009 , 2009 ; 16876172 (ISSN) Shabany, M ; Sousa, E. S ; Sharif University of Technology
    2009
    Abstract
    Considering a multihop cellular system with one relay per sector, an effective modeling for the joint base-station/relay assignment, rate allocation, and routing scheme is proposed and formulated under a single problem for the downlink. This problem is then formulated as a multidimensional multichoice knapsack problem (MMKP) to maximize the total achieved throughput in the network. The well-known MMKP algorithm based on Lagrange multipliers is modified, which results in a near-optimal solution with a linear complexity. The notion of the infeasibility factor is also introduced to adjust the transmit power of base stations and relays adaptively. To reduce the complexity, and in order to... 

    Statistical properties of amplify and forward relay links with channel estimation errors

    , Article Proceedings of the 2009 Australian Communications Theory Workshop, AusCTW 2009, 4 February 2009 through 7 February 2009, Sydney, NSW ; 2009 , Pages 44-49 ; 9781424433575 (ISBN) Tabataba, F. S ; Pakravan, M. R ; Sadeghit, P ; Lamahewat, T ; Australian National University ; Sharif University of Technology
    2009
    Abstract
    This paper studies the statistical properties of the signal-to-noise ratio (SNR) of the relay link in a cooperative wireless communication system with fixed gain relay in presence of channel estimation error. The SNR expression is derived and three different analytic approaches with different approximate assumptions are used to obtain the probability distribution function of the SNR and outage probability of the relay link. The first approach is the most accurate one in many cases, however it does not have a closed-form expression. The other two approaches result in closed-form expressions for the outage probability. Therefore, the third approach has been used to find a sub-optimum power... 

    Breaking anonymity of some recent lightweight RFID authentication protocols

    , Article Wireless Networks ; Volume 25, Issue 3 , 2019 , Pages 1235-1252 ; 10220038 (ISSN) Baghery, K ; Abdolmaleki, B ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2019
    Abstract
    Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks... 

    ECG denoising and compression using a modified extended Kalman filter structure

    , Article IEEE Transactions on Biomedical Engineering ; Volume 55, Issue 9 , September , 2008 , Pages 2240-2248 ; 00189294 (ISSN) Sayadi, O ; Shamsollahi, M. B ; Sharif University of Technology
    2008
    Abstract
    This paper presents efficient denoising and lossy compression schemes for electrocardiogram (ECG) signals based on a modified extended Kalman filter (EKF) structure. We have used a previously introduced two-dimensional EKF structure and modified its governing equations to be extended to a 17-dimensional case. The new EKF structure is used not only for denoising, but also for compression, since it provides estimation for each of the new 15 model parameters. Using these specific parameters, the signal is reconstructed with regard to the dynamical equations of the model. The performances of the proposed method are evaluated using standard denoising and compression efficiency measures. For... 

    Frequency planning of GSM cellular communication network in urban areas including traffic distribution, a practical implementation

    , Article 2008 Asia-Pacific Symposium on Electromagnetic Compatibility and 19th International Zurich Symposium on Electromagnetic Compatibility, APEMC 2008, Suntec, 19 May 2008 through 23 May 2008 ; 2008 , Pages 891-894 ; 9810806280 (ISBN); 9789810806286 (ISBN) Atamanesh, M ; Farzaneh, F ; Sharif University of Technology
    2008
    Abstract
    Using an in-house developed software the signal level, the best server cells, and the amount of interference using standard propagation models are determined in a cellular environment. The program is also able to assign the frequency channels automatically to the TRXs taking into account the carrier to interference and the traffic distribution using a genetic algorithm. In this paper, the cost function is based on the total Carrier to Interference ratio (C/I) and the traffic density of the serving area. The software by means of a genetic algorithm approaches a frequency assignment which increases the overall quality of service throughout the cellular network. The package has been used in a... 

    Model-based ECG fiducial points extraction using a modified extended Kalman filter structure

    , Article 2008 1st International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL 2008, Aalborg, 25 October 2008 through 28 October 2008 ; December , 2008 ; 9781424426478 (ISBN) Sayadi, O ; Shamsollahi, M. B ; Sharif University of Technology
    2008
    Abstract
    This paper presents an efficient algorithm based on a nonlinear dynamical model for the precise extraction of the characteristic points of electrocardiogram (ECG), which facilitates the HRV analysis. Determining the precise position of the waveforms of an ECG signal is complicated due to the varying amplitudes of its waveforms, the ambiguous and changing form of the complex and morphological variations with unknown sources of drift. A model-based approach handles these complications; therefore a method based on the usage of this concept in an extended Kalman filter structure has been developed. The fiducial points are detected using both the parameters of Gaussian-functions of the model, and... 

    Power consumption evaluation of sleep mode in the IEEE 802.16e MAC with multi service connections

    , Article 2007 IEEE International Conference on Signal Processing and Communications, ICSPC 2007, Dubai, 14 November 2007 through 27 November 2007 ; 2007 , Pages 1363-1366 ; 9781424412365 (ISBN) Pour Nejatian, N. M ; Nayebi, M. M ; Tadaion, A. A ; Sharif University of Technology
    2007
    Abstract
    In the sleep mode, a Mobile Subscribe Station (MSS) sleeps for a sleep interval and wakes up at the end of this interval in order to check buffered packet(s) at Base Station (BS) destined to it. If there is no packet, the MSS increases the sleep window up to the maximum value or keeps it unchanged and sleeps again. In this paper, we study the effect of presence of multi service connections with different power saving classes (PSCs) on power consumption for IEEE 802.16e nodes while operating in the sleep mode. Using multi service connections may result in overlapping of availability and unavailability intervals and reducing the effectiveness of power saving mode of the subscriber. © 2007 IEEE... 

    On the optimization of mobile power-controlled cellular networks regarding practical limitations

    , Article 2006 American Control Conference, Minneapolis, MN, 14 June 2006 through 16 June 2006 ; Volume 2006 , 2006 , Pages 6103-6107 ; 07431619 (ISSN); 1424402107 (ISBN); 9781424402106 (ISBN) Sadati, N ; Yousefi, M. I ; Sharif University of Technology
    2006
    Abstract
    In this paper, the intra-cell link adaptation problem is formulated as a constrained nonconvex nondifferentiable optimization problem to maximize the average link throughput while guaranteeing the best possible coverage reliability. We proceed to solve the resulted nonsmooth optimization problem using proximal point bundle method known in nondifferentiable optimization context. For this purpose, we first exploit the problem structure and reduce the original large scale optimization problem to a sequence of one-dimensional problems coordinated by a master program using direct primal decomposition technique. Proximal bundle method with aggregation policy is then adopted in master program to... 

    An adaptive feedback bit allocation method for wireless systems with transmit diversity

    , Article 2005 1st International Conference on Computers, Communications and Signal Processing with Special Track on Biomedical Engineering, CCSP 2005, Kuala Lumpur, 14 November 2005 through 16 November 2005 ; 2005 , Pages 181-184 ; 1424400112 (ISBN); 9781424400119 (ISBN) Babadi, B ; Shariatpanahi, P ; Hossein Khalaj, B ; Sharif University of Technology
    2005
    Abstract
    Using multiple antenna transmitters and/or receivers is becoming a common method for improving spectral efficiency of wireless channels. The physical layer of the next generation of WLAN systems (802.11n) is based on a Multiple Input Multiple Output (MIMO) system which seems to be an efficient solution for defects which could occur in wireless channels. In this paper, we investigate an adaptive bit allocation method to feed the quantized channel state data back to the transmitting antennas, depending on the channel condition in a Multiple Input Single Output (MISO) scheme. We have proposed an adaptive bit allocation scheme with a significant performance improvement over the fixed bit...