Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

Theses/Dissertations

2004

Wireless

Articles 1 - 2 of 2

Full-Text Articles in Engineering

An Examination Into The Statistics Of The Singular Vectors For The Multi-User Mimo Wireless Channel, Scott Nathan Gunyan Aug 2004

An Examination Into The Statistics Of The Singular Vectors For The Multi-User Mimo Wireless Channel, Scott Nathan Gunyan

Theses and Dissertations

Many capacity and near-capacity achieving methods in multiple-input-multipleoutput (MIMO) wireless channels make use of the singular value decomposition (SVD) of the channel matrix. For the multi-user case, the SVD of the channel matrix for each user may result in right and left singular vectors that are similar between users. This proposes another descriptive characterization of the multi-user MIMO channel. Closely aligned singular vectors between any two users could reduce the achievable signaling rates of signal processing communication methods as one user would be more difficult to resolve in space-time from another. An examination into how this alignment can be described …


Design And Hardware Implementation Of A Novel Scrambling Security Algorithm For Robust Wireless Local Area Networks, Mohit Jagetia Jan 2004

Design And Hardware Implementation Of A Novel Scrambling Security Algorithm For Robust Wireless Local Area Networks, Mohit Jagetia

Electronic Theses and Dissertations

The IEEE802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is a popular wireless secure communication stream cipher protocol approach to network security used to protect link-layer communications from eavesdropping and other attacks. It allows user to communicate with the user; sharing the public key over a network. It provides authentication and encrypted communications over unsecured channels. However, WEP protocol has an inherent security flaw. It is vulnerable to the various attacks, various experiments has proved that WEP fails to achieve its security goals. This thesis entails designing, evaluating and prototyping a wireless security infrastructure that …