Open Access. Powered by Scholars. Published by Universities.®

Signal Processing Commons

Open Access. Powered by Scholars. Published by Universities.®

OFDM

Western University

Articles 1 - 2 of 2

Full-Text Articles in Signal Processing

Monostatic Airborne Synthetic Aperture Radar Using Commercial Wimax Transceivers In The License-Exempt Spectrum, Kai Liu Nov 2014

Monostatic Airborne Synthetic Aperture Radar Using Commercial Wimax Transceivers In The License-Exempt Spectrum, Kai Liu

Electronic Thesis and Dissertation Repository

The past half-century witnessed an evolution of synthetic aperture radar (SAR). Boosted by digital signal processing (DSP), a variety of SAR imaging algorithms have been developed, in which the wavenumber domain algorithm is mature for airborne SAR and independent of signal waveforms. Apart from the algorithm development, there is a growing interest in how to acquire the raw data of targets’ echoes before the DSP for SAR imaging in a cost-effective way. For the data acquisition, various studies over the past 15 years have shed light on utilizing the signal generated from the ubiquitous broadband wireless technology – orthogonal frequency …


Secure Ofdm System Design For Wireless Communications, Hao Li Jun 2013

Secure Ofdm System Design For Wireless Communications, Hao Li

Electronic Thesis and Dissertation Repository

Wireless communications is widely employed in modern society and plays an increasingly important role in people's daily life. The broadcast nature of radio propagation, however, causes wireless communications particularly vulnerable to malicious attacks, and leads to critical challenges in securing the wireless transmission. Motivated by the insufficiency of traditional approaches to secure wireless communications, physical layer security that is emerging as a complement to the traditional upper-layer security mechanisms is investigated in this dissertation. Five novel techniques toward the physical layer security of wireless communications are proposed. The first two techniques focus on the security risk assessment in wireless networks …