You are on page 1of 12

Organizing Engineering

Research Papers (29)




http://www.chineseowl.idv.tw


(:)

Setting of research (): ?
?
Research problem () :
?
Quantitative specification of problem () :


Importance of problem () :
, ?
(:)
Research objective ()
Methodology to achieve objective
()
Anticipated results ()
Contribution to field ()
(:)
Multi-input multi-output (MIMO) schemes attempt to increase
the data rate in wireless communications. If N antennas are used in
MIMO systems, the data rate of MIMO systems can be N times that of
conventional systems, i.e. single-input single-output (SISO) systems,
subsequently increasing the data rate significantly. Despite the higher
data rate of MIMO systems, its performance is markedly lower than that
of SISO systems since MIMO systems can maintain many channels; in
addition, recognizing data of each antenna is extremely difficult. MIMO
systems thus adopt an advanced channel coding scheme called low-
density parity-check (LDPC) code.
However, although capable of significantly upgrading system
performance, LDPC codes are limited owing to their complex encoding
process. In LDPC codes, an extremely large generator matrix G must
be multiplied for encoding.
(:)
For instance, while the dimension of G
approximates to 2000 by 2000 in the IEEE 802.11n
standard, multiplying G expends a considerable amount of
time. However, only six registers are necessary to
complete encoding for conventional channel coding, i.e.
convolutional codes, explaining why LDPC and
conventional codes significantly differ in encoding
complexity.
An extremely complex encoding process
requires a significant amount of power for the system to
complete all encoding tasks. However, for a small wireless
communication device such as a mobile phone, notebook
computer and PDA, power is a highly valuable resource
since the battery power supply is crucial. Moreover, an
efficient encoding process for LDPC codes is problematic
for MIMO systems.
(:)
Based on the above, we should develop a novel
LDPC structure called a repeat-accumulate (RA) code, as
originally proposed in 2002. RA codes can provide the
system with an extremely low error rate of data, yet an
efficient encoding process. Its encoding resembles the
encode of convolutional codes, explaining the low complexity.
Of priority concern is how to design an RA code such that
the system performance can approach the system
capacity, as mentioned by the renowned communications
researcher Shannon in 1948.
(:)
To do so, an extrinsic information transfer
(EXIT) chart can be simulated in MIMO channel to become
the design baseline of MIMO systems. The MIMO system
capacity can then be determined by some formulas, as
provided by Channon, to derive an appropriate value of the
signal-to-noise ration (SNR). Additionally, based on this
appropriate SNR, a curve fitting can be derived to match the
EXIT chart. Moreover, a probability density function of
variable nodes and check nodes in the RA code
can be determined by the above curve and, finally, the
design of RA codes can be completed. Furthermore,
confirmation can be made that the RA code determined via
the above methods performs well in MIMO systems.
(:)
As anticipated, applying the adequately designed RA code
can ensure that the MIMO system achieves an extremely low data error
rate and, simultaneously, maintains the advantage of a high data
rate. Based on the simulation results, the MIMO system with RA codes
can perform equivalent to the SISO system. Hence, the low
performance problem in MIMO systems is averted by adopting the well-
designed RA code.
While cable-free wireless communication devices require
batteries, their power supply is limited, accentuating the importance of
the power resources. For wireless devices to perform efficiently, a
battery can supply the system for an extended period. Hence, the
encoding process must be simplified when applying LDPC to MIMO
systems. The proposed RA code, one class of LDPC, is feasible for
use in a MIMO system device, the encoding process can become
efficient and a significant amount of power is saved. Hence, small
wireless communication devices can operate for extended periods
without using battery chargers.
(:)
Among the numerous advantages of proxies include
controlling access, conserving network bandwidth, reducing
communication delay and alleviating loads of original server. Therefore,
various proxies appear in the Internet based on application
requirements, e.g., a HTTP proxy for the Internet, a FTP proxy for file
transmission, and a SOCKS proxy for firewall traversal. Meanwhile,
most applications can communicate through a proxy.
However, the mobile computing paradigm negatively impacts
certain applications. Referred to as mobility-unaware applications,
applications designed for fixed network environments are unaware of
the movements of mobile devices. When roaming, such applications
access the Internet through the configured proxies probably far from
the visited network rather than through nearby proxies. Such behavior
barely achieves advantages of the proxy. Additionally, communication
may incur interferences, e.g., becoming congested, incurring a long
delay, encountering a firewalls obstacle, or becoming intercepted.
(:)
For instance, in addition to the difficulty of
manually changing the proxy configurations of applications
during handoff, using a Proxy Auto-Config file (pac file)
neither satisfies non-HTTP applications nor enables users
to roam freely. Despite the many proposals to obtain the
address of the nearby proxy, applications must still detect
the movements, acquire the address of the nearby proxy
and utilize the nearby proxy.
While creating mobility-aware applications
hinders developer, modifying applications may be
infeasible owing to a lack of source codes. Providing
applications is an effective means of communicating
through a nearby proxy without modifying applications.
(:)
Based on the above, we should develop the Tapster
as the transparent proxy redirector for mobile computing.
To do so, the Tapster can be implemented in a
Windows XP environment. Experiments can then be performed
to demonstrate the effectiveness of the (NOTE: Add 1-2 more
sentences to describe the methodology)
As anticipated, simulation results can indicate that
the Tapster can quietly redirect the requests of applications to
the nearby proxy without application awareness, configuration
and modifications. The applications function as if they were
staying at the home network and interacting with the configured
proxy.
Importantly, the Tapster can support various proxies,
not just the HTTP proxy (NOTE: Elaborate more on the
theoretical and practical contributions of the Tapster in your
research field and industry).
Further details can be found at
http://www.chineseowl.idv.tw

You might also like