• Title/Summary/Keyword: Multi-user MIMO system

Search Result 85, Processing Time 0.018 seconds

Relay-assisted Multiple Access Channel Protocol for Cooperative Diversity

  • Kim, Dong-Hyun;Kim, Gil;Lee, Kwang-Bok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.1C
    • /
    • pp.1-8
    • /
    • 2009
  • Cooperative diversity is a novel technique to improve diversity gains, capacity gains, and energy saving. This technique involves multiple terminals sharing resources in order to build a virtual antenna array in a distributed fashion. In this paper, we propose a multi-user cooperative diversity protocol called Relay-assisted Multiple Access Channel(R-MAC) that allows multiple source terminals to transmit their signals simultaneously and the relay terminal forwards the aggregated signal received from the source terminals to the destination terminal. The proposed protocol converts the distributed antenna channels into an effective MIMO channel by exploiting a relay, increasing both diversity gain and system throughput. We investigate the performance of the proposed protocol in terms of outage probability and diversity-multiplexing tradeoff where we assume block fading channel environment. Our simulation results show that the proposed protocol outperforms direct transmission in the high spectral efficiency regime where the conventional cooperative diversity protocols cannot outperform direct transmission.

Adaptive Resource Allocation Algorithm with GTD in Downlink MU-MIMO Channel (다중 사용자 다중 안테나 하향링크 채널에서 GTD 기반의 적응적인 자원 할당 기법)

  • Choi, Seung-Kyu;Lee, Chung-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.11
    • /
    • pp.53-59
    • /
    • 2011
  • We propose an adaptive resource allocation algorithm with generalized triangular decomposition scheme in downlink multi-user multiple-input-multiple-output channel to maximize the system throughput when we adopt the modulation scheme such as BPSK, QPSK, 16QAM, and 64QAM. The proposed scheme also considers an bit-error-rate performance as well as system throughput while performing resource allocation. We present simulation results to show that the proposed scheme achieves the system throughput up to 2bit difference by capacity and has better BER performance than SVD based resource allocation scheme in all SNR regions.

An Adaptive Joint Precoding for Multi-user MIMO Systems (다중 사용자 MIMO 시스템을 위한 적응적 결합 프리코딩)

  • Park, Ju Yong;Hanif, Mohammad Abu;Song, Sang Seob;Lee, Moon Ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.12
    • /
    • pp.3-11
    • /
    • 2014
  • Multiple antennas can provide huge capacity gains when the transmitter knows the channel state information (CSI). Precoding is a technique that exploits CSI at the transmitter side. In this paper, an adaptive precoding scheme is proposed, called a hybrid multiple-input multiple-output (MIMO) precoding (HMP). HMP is a combination of linear and nonlinear precoding. The number of transmit antennas less than or equal to four is as same as the conventional antenna selection scheme. Therefore, the HMP scheme uses more than four transmit antennas. The good channel means that the channels must be selected to maximize the channel capacity among the given channels, and the rest channels are called bad channel. In HMP scheme, we use the nonlinear precoding in the good channels and the linear precoding in the bad channels. The well-known Tomlinson-Harashima precoding (THP) is considered as nonlinear precoding. The system throughput and MSE (minimum square error) are shown for the performance of HMP scheme compared to the conventional schemes which are BD (block diagonalization), antenna selection and THP.

A User Detection Technique Based on Parallel Orthogonal Matching Pursuit for Large-Scale Random Access Networks (대규모 랜덤 액세스 네트워크에서 병렬 직교매칭퍼슛 기술을 이용한 사용자 검출 기법)

  • Park, Jeonghong;Jung, Bang Chul;Kim, Jinwoo;Kim, Jeong-Pil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1313-1320
    • /
    • 2015
  • In this paper, we propose a user detection technique based on parallel orthogonal matching pursuit (POMP) for uplink multi-user random access networks (RANs) with a number of users and receiver antennas. In general RANs, it is difficult to estimate the number of users simultaneously transmitting packets at the receiver because users with data send the data without grant of BS. In this paper, therefore, we modify the original POMP for the RAN and evaluate its performances through extensive computer simulations. Simulation results show that the proposed POMP can effectively detect activated users more than about 2%~8% compared with the conventional OMP in RANs.

A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks

  • Gao, Ning;Jing, Xiaojun;Sun, Songlin;Mu, Junsheng;Lu, Xiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3414-3434
    • /
    • 2016
  • Classical key generation is complicated to update and key distribution generally requires fixed infrastructures. In order to eliminate these restrictions researchers have focused much attention on physical-layer (PHY-layer) based key generation methods. In this paper, we present a PHY-layer fingerprints based fuzzy key generation scheme, which works to prevent primary user emulation (PUE) attacks and spectrum sensing data falsification (SSDF) attacks, with multi-node collaborative defense strategies. We also propose two algorithms, the EA algorithm and the TA algorithm, to defend against eavesdropping attacks and tampering attacks in mobile cognitive radio networks (CRNs). We give security analyses of these algorithms in both the spatial and temporal domains, and prove the upper bound of the entropy loss in theory. We present a simulation result based on a MIMO-OFDM communication system which shows that the channel response characteristics received by legitimates tend to be consistent and phase characteristics are much more robust for key generation in mobile CRNs. In addition, NIST statistical tests show that the generated key in our proposed approach is secure and reliable.