Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Engineering
An Examination Into The Statistics Of The Singular Vectors For The Multi-User Mimo Wireless Channel, Scott Nathan Gunyan
An Examination Into The Statistics Of The Singular Vectors For The Multi-User Mimo Wireless Channel, Scott Nathan Gunyan
Theses and Dissertations
Many capacity and near-capacity achieving methods in multiple-input-multipleoutput (MIMO) wireless channels make use of the singular value decomposition (SVD) of the channel matrix. For the multi-user case, the SVD of the channel matrix for each user may result in right and left singular vectors that are similar between users. This proposes another descriptive characterization of the multi-user MIMO channel. Closely aligned singular vectors between any two users could reduce the achievable signaling rates of signal processing communication methods as one user would be more difficult to resolve in space-time from another. An examination into how this alignment can be described …
Design And Hardware Implementation Of A Novel Scrambling Security Algorithm For Robust Wireless Local Area Networks, Mohit Jagetia
Design And Hardware Implementation Of A Novel Scrambling Security Algorithm For Robust Wireless Local Area Networks, Mohit Jagetia
Electronic Theses and Dissertations
The IEEE802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is a popular wireless secure communication stream cipher protocol approach to network security used to protect link-layer communications from eavesdropping and other attacks. It allows user to communicate with the user; sharing the public key over a network. It provides authentication and encrypted communications over unsecured channels. However, WEP protocol has an inherent security flaw. It is vulnerable to the various attacks, various experiments has proved that WEP fails to achieve its security goals. This thesis entails designing, evaluating and prototyping a wireless security infrastructure that …