Search In this Thesis
   Search In this Thesis  
العنوان
Large Scale MIMO for the Next Generation of Wireless Communication Systems /
المؤلف
Awad, Mona Mohamed Hassan Mohamed.
هيئة الاعداد
باحث / منى محمد حسن محمد عوض
مشرف / محمد السعيد نصر
مناقش / محمد محمد فؤاد
مناقش / محمود احمد عطية
الموضوع
Electronics and Electrical Communications Engineering.
تاريخ النشر
2021.
عدد الصفحات
123 p. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
14/12/2021
مكان الإجازة
جامعة طنطا - كلية الهندسه - Electronics and Electrical Communications Engineering
الفهرس
Only 14 pages are availabe for public view

from 142

from 142

Abstract

The 5G innovations has seen a lot of expanded movement over the most recent couple of years. Among the proposed advances with much potential for turning into a significant part in the 5G is the massive Multiple Input Multiple Output (MIMO). Massive- MIMOMassive-MIMO, large antenna system, is a critical innovation to fulfill the client needs in execution and nature of administrations for the cutting-edge remote correspondence frameworks. Because of an enormous number of antennasAntennas and Radio Frequency (RF) chains, intricacy of the image indicators expanded quickly in a Massive-MIMO uplink receiver. Thus, in this Massive-MIMO algorithms with ideal execution and low that has been proposed literature is discussed. To expand the transmission unwavering quality, both helpful CR and non-symmetrical different Non-Orthogonal Multiple Access (NOMA) strategies, together are examined. Especially, NOMA has been as of late proposed and to be a promising procedure for the future fifth era (5G) versatile organizations. The behind NOMA is to serve numerous clients by a similar asset block (i.e., time, recurrence, code) yet with various force levels. In this way, NOMA method presents prevalent Spectral Efficiency (SE) for future organizations. An improved secrecy of cooperative NOMA networks with two-way untrusted relaying is introduced.Two Way Relay (TWR) and Interuser Interference (IUI) strategies were utilized at Untrusted Relay (UR) to escalate the exchange of data flags and the snooping ability, separately, to save time and from listening. An insightful articulation for the lower bound of uplink/downlink ESSR is determined and checked with reproduction results to exhibit the benefits of the proposed . The outcomes showed that the proposed plan can improve the uplink/downlink ESSR contrasted with the benchmark plans with minimal measure of assets utilized. Moreover, an iterative calculation dependent on the quest technique is utilized to track down the best incentive for the uplink power sharing coefficient.