The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Efficient and robust wireless video delivery is an enabling technology for various applications. The existing wireless video transmission scheme has the cliff effect and it cann't gracefully adapt to channel variations. In this paper, we introduce a pseudo-analog wireless video transmission improvements and design in the hardware. Comparing with the traditional transmission, the linear processing...
This paper considers the layered transmission between the source and the destination over two relays using super-position coding (SC). In this two-hop decode-and-forward (DF) relaying system, because of the network topology, the receiver continuously decodes only the base layer of the direct transmission from the source; the enhancement layer is decoded with a delay based on the transmission from...
Interference forwarding by a relay enhances the interference level and enables the cancellation of the interference. If the interfering source to relay link is not strong, then the relay can decode a part of the interference and forward it to the destination, and the destination can cancel only that part of the interference. It is known as partial decode-and-forward (PDF) and partial interference...
A cache-aided K-user Gaussian broadcast channel (BC) is considered. The transmitter has a library of N equal-rate files, from which each user demands one. The impact of the equal-capacity receiver cache memories on the minimum required transmit power to satisfy all user demands is studied. Decentralized caching with uniformly random demands is considered, and both the minimum average power (averaged...
Robust linear analog block coding of a correlated Gaussian source over a Rayleigh fading channel, without encoderside channel-state information (CSI) is investigated. The encoder which minimizes the minimum mean square error, averaged over an ensemble of decoders whose channel gains are drawn from an exponential distribution is derived. This encoder does not require CSI. It is compared with a CSI-adaptive,...
This paper considers a K-user Gaussian broadcast channel (BC) where receivers are equipped with cache memories. Lower and upper bounds are established on the capacity-memory tradeoff, i.e., the largest rate achievable for given cache-memories. The lower bound is based on a joint cache-channel coding scheme which generalizes the recently proposed piggyback coding to Gaussian BCs with unequal cache...
We propose a linear transceiver scheme for the symmetric two-user broadcast channel with additive Gaussian noise and quantized feedback. The quantized feedback link is modeled as an information bottleneck subject to a rate constraint. We introduce a superposition scheme that splits the transmit power between an Ozarow-like linear-feedback code and a conventional code that ignores the feedback. The...
The rapid penetration of cloud and distributed computing technology is accelerating the need for one-to-many file transfers for sharing and duplicating data and applications among distributed data centers in an efficient manner. The purpose of our work is to develop a scheme to transfer a largesized file from a single sender to multiple receivers over an OpenFlow-based network as quickly as possible...
We consider the broadcast channel with confidential messages (BCCM) over N parallel Gaussian channels. The transmitter aims at maximizing the sum-rate. The system has two combating jammers, each aiming to enhance the secure rate to one receiver only, while hurting the other receiver by sending Gaussian jamming signals. We cast the problem as an extensive-form game and derive the optimal jamming policy...
In this paper, we consider the problem of sending a bivariate correlated Gaussian source through a two-user Gaussian orthogonal multiple-access channel (MAC), where each encoder observes a noisy version of one of the source components, and the receiver aims at reconstructing each source component. The estimation quality is measured by mean-squared error (MSE) distortion criterion. Different components...
To enable robust multiview video streaming over current wireless broadcast infrastructures, this paper proposes a joint source and channel coding optimization framework for video streaming based upon multiview video coding technique. It utilizes random linear coding (RLC) with ladder-shaped global coding coefficient matrix (GCM) for unequal erasure protection. An accurate expression of the decoding...
In this paper, we consider video communication over fading channel, where the perfect instantaneous channel state information (CSI) is available at both sender and receiver. Most of existing coding schemes are inefficient in this communication scenario. The reason is that for digital coding scheme, it has high coding efficiency but unavoidably leads to the cliff effect; while for analog scheme, it...
The development of wireless technologies makes telemedicine more and more popular. However, due to the broadcast and openness nature of radio propagation, it makes the image transmitted over wireless channel much easier to be eavesdropped. Moreover, delay requirements is another concern in most application scenarios. To deal with the security issue, a secure scheme for wireless image transmissions...
The Han-Kobayashi (HK) encoding scheme is simplified for the one-sided Gaussian interference channel and a class of mixed interference channels, with Gaussian codebooks. The simplified region significantly decreases the computational complexity of the HK region. It also provides better insight into how to use the HK scheme for these channels. It shows that time-sharing with power allocation over two...
We propose a linear transceiver scheme for the symmetric two-user multiple access channel with additive white Gaussian noise and quantized feedback. The quantized feedback link is modeled as an information bottleneck subject to a rate constraint. We introduce a superposition scheme that splits the transmit power of each user between an Ozarow-like code (designed for perfect rate-limited feedback)...
New insights into the role of artificial noise in securing communication in a Gaussian multi-antenna fading wiretap channel are presented. An appropriate secrecy-outage-based optimization framework is developed for the Multiple-Input Single-Output Single-Eavesdropper (MISOSE) case to measure the performance of artificial noise. It is assumed that only the legitimate receiver's instantaneous channel...
The study of index coding with side information has attracted much attention in communication and computer societies. In this paper, we focus on exploiting the side information to improve multicast transmission efficiency in wireless systems. In the problem, receivers are divided into several multicast groups, and receivers of the same group request the same packet every time. All the intended receivers...
Wireless video multicast has become one of the key technologies to wireless applications. But the main challenge of wireless video multicast, i.e. the “cliff effect”, remains to be solved. SoftCast is a novel video coding and transmission scheme which allocates power to different coefficient chunks and transmits analog signals directly without quantization and entropy coding. It can solve the “cliff...
This paper proposes a new underlay cooperative cognitive radio system, where a paid cooperation between the primary and the secondary systems is allowed. We consider both decoding strategy at the secondary receiver and the power efficiency optimization problem, in order to maximize the rate of the cognitive system. The secondary user has to communicate to the receiver in the presence of primary transmission,...
Orthogonal Frequency Division Multiple Access (OFDMA) as well as other orthogonal multiple access techniques fail to achieve the system capacity limit in the uplink due to the exclusivity in resource allocation. This issue is more prominent when fairness among the users is considered in the system. Current Non-Orthogonal Multiple Access (NOMA) techniques introduce redundancy by coding/spreading to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.