This work is dedicated to the analysis, design and performance evaluation of physical layer network coding strategies in multiuser communication systems. The first part is devoted to study the compute-and-forward protocol in the basic multiple access channel. For this strategy, we propose an optimal solution to design efficient network codes based on solving a lattice shortest vector problem. Moreover, we derive novel bounds on the ergodic rate and the outage probability for the CF operating in fast and slow fading channels respectively. Besides, we develop novel decoding algorithms proved numerically to outperform the traditional decoding scheme for the CF. The second part is dedicated to the design and end-to-end performance evaluation of network codes for the CF and the analog network coding in the two-way relay channel and the multi-source multi-relay channel. For each network model we study the decoding at the relay nodes and the end destination, propose search algorithms for optimal network codes for the CF and evaluate, theoretically and numerically, the end-to-end error rate and achievable transmission rate. In the last part, we study new decoders for the distributed MIMO channel termed integer forcing (if). Inspired by the CF, if receivers take advantage of the interference provided by the wireless medium to decode integer linear combinations of the original codewords. We develop in our work efficient algorithms to select optimal if receivers parameters allowing to outperform existing suboptimal linear receivers
from HAL : Dernières publications http://ift.tt/1JiNsGJ
Home » Informatique » [tel-01183684] Multi-user communication systems : from interference management to network coding
dimanche 20 septembre 2015
[tel-01183684] Multi-user communication systems : from interference management to network coding
lainnya dari HAL : Dernières publications, Informatique
- [hal-01170063] A Day-ahead Centralized Unit Commitment Algorithm for A Multi-agent Smart Grid
- [hal-01202398] L’Internet des objets : un nouveau champ d’action pour la cybercriminalité
- [hal-01185255] About Interface Conditions for Coupling Hydrostatic and Nonhydrostatic Navier-Stokes Flows
- [hal-00982087] Towards optimized Schwarz methods for the Navier-Stokes equations
- [hal-01343348] D.1.3 – Protocols for emergent localities
- [hal-01316014] A Methodology for Quality Assessment in Collaborative Score Libraries
- [hal-01343121] Impact de la recherche d'amorces mutées sur les résultats d'analyses métagénomiques
- [hal-01313749] Temperature dependence of the particle/gas partition coefficient: An application to predict indoor gas-phase concentrations of semi-volatile organic compounds
- [hal-01308004] Impact of the French 3rd and 4th generation pill scare in women seeking termination of pregnancy
- [hal-01290932] An Extension of SPARQL with Fuzzy Navigational Capabilities for Querying Fuzzy RDF Data
- [hal-01343753] Frederic Lee and post-Keynesian pricing theory
- [hal-01108627] From complexity to algebra and back: digraph classes, collapsibility and the PGP
- [hal-01134194] Optimal Transport using Helmholtz-Hodge Decomposition and First-Order Primal-Dual Algorithms
- [hal-01133948] Modélisations de textures par champ gaussien à orientation locale prescrite
Ditulis Oleh : Unknown // 07:29
Kategori:
Informatique
Inscription à :
Publier les commentaires (Atom)
0 commentaires:
Enregistrer un commentaire