The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, we introduce a novel multiple access scheme which is based on the joint design of the system signature matrix at the transmitter and the successive interference cancelation (SIC) based detector at the receiver. The symbols of the different users are judiciously spread in the frequency (space) domain, which can be effectively exploited by the SIC based technique, such as the iterative...
In the paper, we study the problem of secure connectivity in general Multiple input and Multiple output (MIMO) stochastic networks, where legitimate users and eavesdroppers are equipped with multi antennas, and designed to distribute on a two- dimensional plane according to two independent Poisson point process(PPP)s. The non-colluding and colluding eavesdroppers scenarios are considered. Transmit-receive...
In this work, a transmission scheme that combines multi-layer multi-rate (MLMR) coding with quasi-orthogonal space-time block coding (QO-STBC) is proposed. Firstly, the proposed QO-STBC codewords set unequal diversity orders for different transmitted spatial data layers. Then, different spatial data layers are protected by different-rate channel codes with the aim of achieving the same post-decoding...
In this paper we propose a novel network coded LDPC code design for a multiple-access relay channel (MARC). We first investigate the achievable rate region for the MARC. Then we propose a novel physical layer network coded (PNC) LDPC code structure, named PNC-LDPC code. Next, an iterative detection-and-decoding receiver is designed to deal with the multi-user interference at the destination. Based...
In ground-penetrating radar (GPR) surveys, the GPR data are always contaminated by high-amplitude clutter noise which consists of the director transmitter to receiver signal (also called crosstalk) and antenna ringdown. The crosstalk and antenna ringdown overlay severely the shallow reflection signals. The commonly used approach to filter out the clutter noise is to subtract the mean trace which can...
This paper mainly introduces several packet loss processing technology used for VoIP network voice calls application, to reduce the phonetic distortion caused by the package loss based on VoIP network, putting forward a scheme based on improved interlace technology and media-related forward error correction technology combining Lagrangian interpolation compensation algorithm, which can reduce the...
This paper revisits the interference channels under strong interference and very strong interference, for both discrete memoryless and Gaussian channels. In particular, it is shown that for the classical definitions, while the conditions of strong interference for discrete and Gaussian cases coincide with each other, those of very strong interference are not consistent with each other in terms of...
Capacity regions and separability results are obtained for several classes of parallel discrete memoryless interference channels with strong interference. In addition, a new class of discrete memoryless interference channels under very strong interference is defined which does not belong to any existing classes.
The method of engineering setting-out, the mechanism of Real Time Kinematic (RTK) and the procedure of real engineering measurement and setting-out are introduced. The method of GPS-RTK application in real time engineering measure is presented according to the setting-out of engineering measurement and position. The procedure of GPS-RTK engineering setting-out is also given. The advantage and superiority...
In this paper we study a generalization of Csiszar and Korner's broadcast channel with confidential messages. Specifically, we consider a two-user broadcast channel with one common message and two confidential messages, one for each receiver. We establish outer bounds to the rate equivocation region of this channel. Our proposed outer bounds, together with a recently proposed achievable region, help...
We consider in this paper a variation of Csiszar and Korner's model of broadcast channels with confidential messages. The transmitter sends both a confidential message and a non-confidential message (herein termed as public message) to receiver 1. While receiver 2 should be kept ignorant from the confidential message, we do not impose the requirement that the public message needs to be perfectly recovered...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.