%PDF-1.4 % 4 0 obj << /S /GoTo /D (chapter.1) >> endobj 7 0 obj (Introduction) endobj 8 0 obj << /S /GoTo /D (chapter.2) >> endobj 11 0 obj (OFDM based Overlay Systems) endobj 12 0 obj << /S /GoTo /D (section.2.1) >> endobj 15 0 obj (The Principle of OFDM) endobj 16 0 obj << /S /GoTo /D (section.2.2) >> endobj 19 0 obj (OFDM for Overlay Systems) endobj 20 0 obj << /S /GoTo /D (subsection.2.2.1) >> endobj 23 0 obj (Principle) endobj 24 0 obj << /S /GoTo /D (subsection.2.2.2) >> endobj 27 0 obj (Design Challenges) endobj 28 0 obj << /S /GoTo /D (section.2.3) >> endobj 31 0 obj (Considered Overlay Scenarios) endobj 32 0 obj << /S /GoTo /D (subsection.2.3.1) >> endobj 35 0 obj (Overlay System in the VHF-Band) endobj 36 0 obj << /S /GoTo /D (subsection.2.3.2) >> endobj 39 0 obj (Inlay System in the L-Band) endobj 40 0 obj << /S /GoTo /D (chapter.3) >> endobj 43 0 obj (Suppression of Out-of-Band Radiation) endobj 44 0 obj << /S /GoTo /D (section.3.1) >> endobj 47 0 obj (Conventional Techniques) endobj 48 0 obj << /S /GoTo /D (subsection.3.1.1) >> endobj 51 0 obj (Windowing) endobj 52 0 obj << /S /GoTo /D (subsection.3.1.2) >> endobj 55 0 obj (Guard Bands) endobj 56 0 obj << /S /GoTo /D (section.3.2) >> endobj 59 0 obj (Advanced Techniques) endobj 60 0 obj << /S /GoTo /D (subsection.3.2.1) >> endobj 63 0 obj (OFDM Tx Spectrum) endobj 64 0 obj << /S /GoTo /D (subsection.3.2.2) >> endobj 67 0 obj (Subcarrier Weighting) endobj 68 0 obj << /S /GoTo /D (subsection.3.2.3) >> endobj 71 0 obj (Multiple-Choice Sequences) endobj 72 0 obj << /S /GoTo /D (subsection.3.2.4) >> endobj 75 0 obj (Cancellation Carriers) endobj 76 0 obj << /S /GoTo /D (section.3.3) >> endobj 79 0 obj (Combination of Different Techniques) endobj 80 0 obj << /S /GoTo /D (subsection.3.3.1) >> endobj 83 0 obj (Combination of Advanced Techniques with Tx Windowing) endobj 84 0 obj << /S /GoTo /D (subsection.3.3.2) >> endobj 87 0 obj (Combination of Advanced Techniques) endobj 88 0 obj << /S /GoTo /D (section.3.4) >> endobj 91 0 obj (Performance Evaluation) endobj 92 0 obj << /S /GoTo /D (subsection.3.4.1) >> endobj 95 0 obj (Simulated Scenario) endobj 96 0 obj << /S /GoTo /D (subsection.3.4.2) >> endobj 99 0 obj (Subcarrier Weighting) endobj 100 0 obj << /S /GoTo /D (subsection.3.4.3) >> endobj 103 0 obj (Multiple-Choice Sequences) endobj 104 0 obj << /S /GoTo /D (subsection.3.4.4) >> endobj 107 0 obj (Cancellation Carriers) endobj 108 0 obj << /S /GoTo /D (subsection.3.4.5) >> endobj 111 0 obj (Combination of Advanced Techniques) endobj 112 0 obj << /S /GoTo /D (subsection.3.4.6) >> endobj 115 0 obj (Comparison of Different Techniques) endobj 116 0 obj << /S /GoTo /D (chapter.4) >> endobj 119 0 obj (Mitigation of Narrow-Band Interference) endobj 120 0 obj << /S /GoTo /D (section.4.1) >> endobj 123 0 obj (Origin of Leakage Effect) endobj 124 0 obj << /S /GoTo /D (subsection.4.1.1) >> endobj 127 0 obj (Complex Exponential Sequence) endobj 128 0 obj << /S /GoTo /D (subsection.4.1.2) >> endobj 131 0 obj (DSB-AM Signal with Sidebands) endobj 132 0 obj << /S /GoTo /D (section.4.2) >> endobj 135 0 obj (NBI Mitigation in the Time Domain) endobj 136 0 obj << /S /GoTo /D (subsection.4.2.1) >> endobj 139 0 obj (Principle of Rx Windowing) endobj 140 0 obj << /S /GoTo /D (subsection.4.2.2) >> endobj 143 0 obj (Impact on the Desired OFDM Signal) endobj 144 0 obj << /S /GoTo /D (subsection.4.2.3) >> endobj 147 0 obj (Different Window Types) endobj 148 0 obj << /S /GoTo /D (section.4.3) >> endobj 151 0 obj (NBI Mitigation in the Frequency Domain) endobj 152 0 obj << /S /GoTo /D (subsection.4.3.1) >> endobj 155 0 obj (Subtraction) endobj 156 0 obj << /S /GoTo /D (subsection.4.3.2) >> endobj 159 0 obj (Leakage Compensation) endobj 160 0 obj << /S /GoTo /D (section.4.4) >> endobj 163 0 obj (Estimation of NBI) endobj 164 0 obj << /S /GoTo /D (subsection.4.4.1) >> endobj 167 0 obj (Available A Priori Knowledge and Means of Observation) endobj 168 0 obj << /S /GoTo /D (subsection.4.4.2) >> endobj 171 0 obj (Detection of Active Interferers) endobj 172 0 obj << /S /GoTo /D (subsection.4.4.3) >> endobj 175 0 obj (Estimation of Carrier Signal) endobj 176 0 obj << /S /GoTo /D (subsection.4.4.4) >> endobj 179 0 obj (Estimation based on PSD) endobj 180 0 obj << /S /GoTo /D (subsection.4.4.5) >> endobj 183 0 obj (Comparison of Different NBI Estimation and Mitigation Techniques) endobj 184 0 obj << /S /GoTo /D (section.4.5) >> endobj 187 0 obj (Combination of Time and Frequency Domain Techniques) endobj 188 0 obj << /S /GoTo /D (subsection.4.5.1) >> endobj 191 0 obj (Principle) endobj 192 0 obj << /S /GoTo /D (subsection.4.5.2) >> endobj 195 0 obj (Adaptation of Estimation Algorithms) endobj 196 0 obj << /S /GoTo /D (subsection.4.5.3) >> endobj 199 0 obj (Comparison of Different Combinations) endobj 200 0 obj << /S /GoTo /D (section.4.6) >> endobj 203 0 obj (Performance Evaluation) endobj 204 0 obj << /S /GoTo /D (subsection.4.6.1) >> endobj 207 0 obj (Considered Interference Scenario) endobj 208 0 obj << /S /GoTo /D (subsection.4.6.2) >> endobj 211 0 obj (Simulation Parameters) endobj 212 0 obj << /S /GoTo /D (subsection.4.6.3) >> endobj 215 0 obj (Simulation Results) endobj 216 0 obj << /S /GoTo /D (chapter.5) >> endobj 219 0 obj (Mitigation of Pulsed Interference) endobj 220 0 obj << /S /GoTo /D (section.5.1) >> endobj 223 0 obj (Characterisation of Interference) endobj 224 0 obj << /S /GoTo /D (subsection.5.1.1) >> endobj 227 0 obj (Sources of Interference) endobj 228 0 obj << /S /GoTo /D (subsection.5.1.2) >> endobj 231 0 obj (Description of Interference Signal) endobj 232 0 obj << /S /GoTo /D (subsection.5.1.3) >> endobj 235 0 obj (Modelling of Interference) endobj 236 0 obj << /S /GoTo /D (section.5.2) >> endobj 239 0 obj (Mitigation by Appropriate Signal Processing) endobj 240 0 obj << /S /GoTo /D (subsection.5.2.1) >> endobj 243 0 obj (Over-sampling) endobj 244 0 obj << /S /GoTo /D (subsection.5.2.2) >> endobj 247 0 obj (Anti-Aliasing Filtering) endobj 248 0 obj << /S /GoTo /D (section.5.3) >> endobj 251 0 obj (Mitigation by Clipping and Pulse Blanking) endobj 252 0 obj << /S /GoTo /D (subsection.5.3.1) >> endobj 255 0 obj (Clipping) endobj 256 0 obj << /S /GoTo /D (subsection.5.3.2) >> endobj 259 0 obj (Pulse Blanking) endobj 260 0 obj << /S /GoTo /D (section.5.4) >> endobj 263 0 obj (Compensation of Pulse Blanking Impact) endobj 264 0 obj << /S /GoTo /D (subsection.5.4.1) >> endobj 267 0 obj (Impact of Pulse Blanking) endobj 268 0 obj << /S /GoTo /D (subsection.5.4.2) >> endobj 271 0 obj (Reduction of ICI) endobj 272 0 obj << /S /GoTo /D (subsection.5.4.3) >> endobj 275 0 obj (Reconsideration of Threshold for Pulse Blanking) endobj 276 0 obj << /S /GoTo /D (section.5.5) >> endobj 279 0 obj (Performance Evaluation) endobj 280 0 obj << /S /GoTo /D (subsection.5.5.1) >> endobj 283 0 obj (Considered Interference Scenario) endobj 284 0 obj << /S /GoTo /D (subsection.5.5.2) >> endobj 287 0 obj (Simulation Parameters) endobj 288 0 obj << /S /GoTo /D (subsection.5.5.3) >> endobj 291 0 obj (Simulation Results) endobj 292 0 obj << /S /GoTo /D (chapter.6) >> endobj 295 0 obj (Conclusions) endobj 296 0 obj << /S /GoTo /D (section.6.1) >> endobj 299 0 obj (Suppression of Out-of-Band Radiation) endobj 300 0 obj << /S /GoTo /D (section.6.2) >> endobj 303 0 obj (Mitigation of Narrow-Band Interference) endobj 304 0 obj << /S /GoTo /D (section.6.3) >> endobj 307 0 obj (Mitigation of Pulsed Interference) endobj 308 0 obj << /S /GoTo /D (section.6.4) >> endobj 311 0 obj (Conclusions and Outlook) endobj 312 0 obj << /S /GoTo /D (appendix.A) >> endobj 315 0 obj (Derivation of Subcarrier Spectrum) endobj 316 0 obj << /S /GoTo /D (section.A.1) >> endobj 319 0 obj (Subcarrier Spectrum after Rectangular Tx Windowing) endobj 320 0 obj << /S /GoTo /D (section.A.2) >> endobj 323 0 obj (Subcarrier Spectrum after Tx Windowing) endobj 324 0 obj << /S /GoTo /D (appendix.B) >> endobj 327 0 obj (Derivation of Leakage Effect) endobj 328 0 obj << /S /GoTo /D (appendix.C) >> endobj 331 0 obj (Derivation of MMSE Approach for NBI Mitigation) endobj 332 0 obj << /S /GoTo /D (appendix*.39) >> endobj 335 0 obj (Abbreviations and Definitions) endobj 336 0 obj << /S /GoTo /D (table.C.3) >> endobj 339 0 obj (Bibliography) endobj 340 0 obj << /S /GoTo /D (appendix*.45) >> endobj 343 0 obj (Frderung) endobj 344 0 obj << /S /GoTo /D (appendix*.46) >> endobj 347 0 obj (Curriculum Vitae) endobj 348 0 obj << /S /GoTo /D [349 0 R /Fit ] >> endobj 352 0 obj << /Length 63 /Filter /FlateDecode >> stream x3PHW0Pp2@ Br.W!\ Db5Tp B I endstream endobj 349 0 obj << /Type /Page /Contents 352 0 R /Resources 351 0 R /MediaBox [0 0 419.528 595.276] /Parent 354 0 R >> endobj 350 0 obj << /Type /XObject /Subtype /Form /FormType 1 /PTEX.FileName (Z:/Diss/thesis/sonstiges/bilder/title_SB.pdf) /PTEX.PageNumber 1 /PTEX.InfoDict 355 0 R /BBox [0 0 304 513] /Resources << /ProcSet [ /PDF /Text ] /ExtGState << /R7 356 0 R >>/Font << /R10 357 0 R/R12 358 0 R/R8 359 0 R>> >> /Length 2139 /Filter /FlateDecode >> stream xYn5Sx7 ^1h4EtH ; wcs_w#!\ EnN\vWBI-?w~7UF}a/o0HBibuv2j"R1$ޭn>zw8?9~=sl/V|y)0H5g+M]=~Pw863gVNYY#X%IAN&b$QL$~ZdΩ(xF~E&𫶘Y*(K:gf L4s~t^ GZZῤ`[b$zd Am</Ty9YbVy$e*x!HdR3һWDdb?I xrR ظ@˰HUb!\&i Rbyp&uTj u1vyrֹ?I x⧾gR0qweWwRud? &CBex$N 8VO {5)A:h7% `X lElVIpĮevU~2 *ĬbY*[0ēe)xYrђA: ;p.lgzQ~nEƶcQ$GoL,:$_ ph#}OP搇\} WOi" B&JӤDCܬBcf41>rtSa"VmxE{}HHKU6Q[*c7}!id?5ASqMqO%k[RVfI4=Z^2}n Q!vPϗK7+UmSw:)J30OT괨qܮ.U 7c\"#ii2龮5<.x͡HWWDG"M"GCJgP5K|jP&K?# -M ;@b,s7W7,{\vD/ՐPRDF5dXEۤprO+XHvy*g%2^R %?Jj{8}ڳK j 4# ࡎ!iFX