Planned maintenance
A system upgrade is planned for 24/9-2024, at 12:00-14:00. During this time DiVA will be unavailable.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Applications of Soft Computing Techniques for Wireless Communications
Blekinge Institute of Technology, Faculty of Engineering, Department of Applied Signal Processing.
2019 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

This thesis presents methods and applications of Fuzzy Logic and Rough Sets in the domain of Telecommunications at both the network and physical layers. Specifically, the use of a new class of functions, the truncated π functions, for classifying IP traffic by matching datagram size histograms is explored. Furthermore, work on adapting the payoff matrix in multiplayer games by using fuzzy entries as opposed to crisp values that are hard to quantify, is presented.

Additionally, applications of fuzzy logic in wireless communications are presented, comprised by a comprehensive review of current trends and applications, followed by work directed towards using it in spectrum sensing and power control in cognitive radio networks.

This licentiate thesis represents parts of my work in the fields of Fuzzy Systems and Wireless Communications. The work was done in collaboration between the Departments of Applied Signal Processing and Mathematics at Blekinge Institute of Technology.

Place, publisher, year, edition, pages
Karlskrona: Blekinge Tekniska Högskola, 2019.
Series
Blekinge Institute of Technology Licentiate Dissertation Series, ISSN 1650-2140 ; 1
National Category
Telecommunications
Identifiers
URN: urn:nbn:se:bth-17314ISBN: 978-91-7295-364-2 (print)OAI: oai:DiVA.org:bth-17314DiVA, id: diva2:1264294
Supervisors
Available from: 2018-12-19 Created: 2018-11-19 Last updated: 2019-01-17Bibliographically approved
List of papers
1. Truncated pi-functions in Approximation of Multi-shaped Polygons
Open this publication in new window or tab >>Truncated pi-functions in Approximation of Multi-shaped Polygons
2004 (English)Conference paper, Published paper (Refereed) Published
Abstract [en]

The studies of data, which result in sampled information in the form of finite fuzzy sets, give rise to the creation of polygons consisting of finite numbers of points tied together. Since the polygons are not formalized by some mathematical expressions, it would be desirable to find continuous functions approximating them rather thoroughly in spite of their irregular shapes. An approximation by the standard curves is sometimes too rough to be a reliable source of a further analysis of the polygons. To improve the accuracy of approximating we test a continuous function, which is composed of joined pi-class functions with seven parameters. The function, called by us “the sampled, truncated pi”, is very sensitive for each little deviation in the polygon’s shape, which allows us to classify it exactly without large errors usually accompanying a process of standard approximation.

Place, publisher, year, edition, pages
Warszawa: EXIT - the Polish Academy of Sciences, 2004
Keywords
truncated pi-functions, a polygon approximation, IP traffic characterization
National Category
Mathematics Computer Sciences
Identifiers
urn:nbn:se:bth-9549 (URN)oai:bth.se:forskinfoCB0BF618480D0527C1256FA3003832C3 (Local ID)83-87674-71-0 (ISBN)oai:bth.se:forskinfoCB0BF618480D0527C1256FA3003832C3 (Archive number)oai:bth.se:forskinfoCB0BF618480D0527C1256FA3003832C3 (OAI)
Conference
EURO WG on Fuzzy Sets
Available from: 2012-09-18 Created: 2005-02-09 Last updated: 2018-12-19Bibliographically approved
2. Pi-truncated Functions and Rough Sets in the Classification of Internet Protocols
Open this publication in new window or tab >>Pi-truncated Functions and Rough Sets in the Classification of Internet Protocols
2005 (English)Conference paper, Published paper (Refereed) Published
Abstract [en]

The studies of Internet Protocol data give rise to the creation of polygons consisting of finite numbers of points tied together. Since the polygons are not formalized by some mathematical expressions, we suggest creating continuous functions, which approximate them thoroughly in spite of their irregular shapes. To warrant a high accuracy of approximating, otherwise impossible to obtain when using standard curves, we test a continuous function, which is composed of joined truncated pi-class functions with seven parameters. By operating with the functions representing polygons having unusual shapes, we attempt a classification of Internet traffic data, based on datagram sizes. We adopt rough sets to assign the members to an investigated Internet class even if their origin sometimes is unknown.

Place, publisher, year, edition, pages
Beijing, China: Tsinghua University Press - Springer, 2005
Keywords
truncated pi-functions, polygon approximation, indiscernibility relation, rough sets in IP traffic characterization
National Category
Mathematics Telecommunications Computer Sciences
Identifiers
urn:nbn:se:bth-9913 (URN)oai:bth.se:forskinfo706EBA0419C7295AC125705B004BF88C (Local ID)7-302-11377-7 (ISBN)oai:bth.se:forskinfo706EBA0419C7295AC125705B004BF88C (Archive number)oai:bth.se:forskinfo706EBA0419C7295AC125705B004BF88C (OAI)
Conference
Eleventh International Fuzzy Systems Association World Congress - IFSA 2005
Available from: 2012-09-18 Created: 2005-08-12 Last updated: 2018-12-19Bibliographically approved
3. Prioritisation of weighted strategies in multiplayer games with fuzzy entries of the payoff matrix
Open this publication in new window or tab >>Prioritisation of weighted strategies in multiplayer games with fuzzy entries of the payoff matrix
2010 (English)In: International Journal of General Systems, ISSN 0308-1079, E-ISSN 1563-5104, Vol. 39, no 3, p. 291-304Article in journal (Refereed) Published
Abstract [en]

We explore the classical model of a two-player game to select the best strategies, where action is expected to maintain the values of a certain variable on the neutral level. By inserting fuzzy sets as payoff values in the game matrix, we facilitate the procedure of formulations of payoff expectations by players. Instead of making inconvenient decisions about the choice of accurate numerical entries of the matrix, the players are able to use words, which should simplify communication between them when designing the preliminaries of the game. The players also have the possibility of making a ranking of their favourite strategies. At the next stage of the play, we involve group decision-making in order to aggregate results coming from several paired games, when more than two players contradict each other.

Place, publisher, year, edition, pages
Taylor&Francis, 2010
Keywords
two-player game, fuzzy payoff matrix, weighted strategies, group decision-making
National Category
Mathematics
Identifiers
urn:nbn:se:bth-7893 (URN)10.1080/03081070903552882 (DOI)000275196000006 ()oai:bth.se:forskinfoA575B78E12FDA721C12576B7004FEEA3 (Local ID)oai:bth.se:forskinfoA575B78E12FDA721C12576B7004FEEA3 (Archive number)oai:bth.se:forskinfoA575B78E12FDA721C12576B7004FEEA3 (OAI)
External cooperation:
Available from: 2012-09-18 Created: 2010-01-26 Last updated: 2018-12-19Bibliographically approved
4. Fuzzy Logic Applications in Wireless Communications
Open this publication in new window or tab >>Fuzzy Logic Applications in Wireless Communications
2009 (English)Conference paper, Published paper (Refereed) Published
Abstract [en]

A survey of fuzzy logic applications and principles in wireless communications is presented, with the aim of highlighting successful usage of fuzzy logic techniques in applied telecommunications and signal processing. To the best of our knowledge, this is the first such study of its kind. This paper will focus firstly on discerning prevalent fuzzy logic or fuzzy-hybrid approaches in the areas of channel estimation, channel equalization and decoding, and secondly outlining what conditions and situations for which fuzzy logic techniques are most suited for these approaches. Furthermore, after insights gained from isolating fuzzy logic techniques applied to real problems, this paper proposes areas for further research targeted to practice-oriented researchers.

Place, publisher, year, edition, pages
Lisbon: EUROPEAN SOC FUZZY LOGIC & TECHNOLOGY, 2009
Keywords
Fuzzy Logic, Channel equalization, Channel Estimation, Wireless Communications
National Category
Telecommunications Signal Processing
Identifiers
urn:nbn:se:bth-8008 (URN)000279170600134 ()oai:bth.se:forskinfo2B0764574F71C8CDC125760E0064E426 (Local ID)978-989-95079-6-8 (ISBN)oai:bth.se:forskinfo2B0764574F71C8CDC125760E0064E426 (Archive number)oai:bth.se:forskinfo2B0764574F71C8CDC125760E0064E426 (OAI)
Conference
IFSA2009 / EUSFLAT09
Available from: 2012-09-18 Created: 2009-08-10 Last updated: 2018-12-19Bibliographically approved
5. ANFIS based Opportunistic power control for cognitive radio in spectrum sharing
Open this publication in new window or tab >>ANFIS based Opportunistic power control for cognitive radio in spectrum sharing
2013 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Cognitive radio is an intelligent technology that helps in resolving the issue of spectrum scarcity. In a spectrum sharing network, where secondary user can communicate simultaneously along with the primary user in the same frequency band, one of the challenges is to obtain balance between two conflicting goals that are to minimize the interference to the primary users and to improve the performance of the secondary user. In our paper we have considered a primary link and a secondary link (cognitive link) in a fading channel. To improve the performance of the secondary user by maintaining the Quality of Service (Qos) to the primary user, we considered varying the transmit power of the cognitive user. For this we proposed ANFIS based opportunistic power control strategy with primary user's SNR and primary user's interference channel gain as inputs. By using fuzzy inference system, Qos of primary user is adhered and there is no need of complex feedback channel from primary receiver. The simulation results of the proposed strategy shows better performance than the one without power control.

Place, publisher, year, edition, pages
Khulna, Bangladesh: IEEE, 2013
Keywords
ANFIS, Fuzzy inference system, spectrum sharing
National Category
Telecommunications Signal Processing
Identifiers
urn:nbn:se:bth-6353 (URN)000342218600027 ()oai:bth.se:forskinfoDB11F4D6BC7593A9C1257E50004540B7 (Local ID)978-1-4799-2299-4 (ISBN)oai:bth.se:forskinfoDB11F4D6BC7593A9C1257E50004540B7 (Archive number)oai:bth.se:forskinfoDB11F4D6BC7593A9C1257E50004540B7 (OAI)
Conference
International Conference on Electrical Information and Communication Technology (EICT)
Available from: 2015-05-25 Created: 2015-05-25 Last updated: 2018-12-19Bibliographically approved
6. A Novel Spectrum Sensing Scheduling Algorithm for Cognitive Radio Networks
Open this publication in new window or tab >>A Novel Spectrum Sensing Scheduling Algorithm for Cognitive Radio Networks
2012 (English)In: Self-Organization and Green Applications in Cognitive Radio Networks / [ed] Al-Dulaimi, Anwer; Cosmas, John; Mohammed, Abbas, IGI Global , 2012, p. 136-153Chapter in book (Other academic)
Abstract [en]

Cognitive Radios are recognized as a novel approach to improve the utilization of a precious natural resource of wireless communications: the radio frequency spectrum. Historically, telecom regulators assigned fixed spectrum bands to the licensed wireless network operators. This spectrum management approach guarantees an interference free environment, except for some configuration faults or illegal usage. However, with the increasing demand for more bandwidth in the finite radio spectrum, the spectrum becomes underutilized. Hence, the concept of secondary operators have emerged, but with emphasis not to influence licensed operators. Consequently, the Cognitive Radio Network (CRN) architecture enters the market as an intelligent solution to these issues, with concentration on spectrum sensing procedures to achieve the regulatory constraint. The most successful sensing algorithms are those applying cooperation and scheduling to have better scanning information; however, those algorithms are developed based on the primary network activities, which are good in terms of reducing expected interference, albeit with more computational load on the CRN. In this chapter, a novel sensing scheduler algorithm is proposed. The idea is to utilize the CRN by fairly distributing the sensing task among the sensors and afterwards utilizing the radio spectrum shared with the primary networks.

Place, publisher, year, edition, pages
IGI Global, 2012
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-17310 (URN)10.4018/978-1-4666-2812-0.ch007 (DOI)
Available from: 2018-11-19 Created: 2018-11-19 Last updated: 2023-02-16Bibliographically approved

Open Access in DiVA

fulltext(13215 kB)449 downloads
File information
File name FULLTEXT02.pdfFile size 13215 kBChecksum SHA-512
3222497a8e73d0795ad4b7da8b3bd1328adc2c31b67791365c6cac29be98047a6599cb8f0b9e4b1f73198748249397fdf82c65ec0fc1a85b39cc1831b189d126
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Erman, Maria
By organisation
Department of Applied Signal Processing
Telecommunications

Search outside of DiVA

GoogleGoogle Scholar
Total: 478 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 800 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf