The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an energy-efficient visible light communication (VLC) receiver SoC that utilizes ambient light rejection and post-equalization techniques for emerging LiFi applications. Based on ordinary phosphorescent white LEDs, a 24-Mb/s IEEE 802.15.7-compliant LiFi link is demonstrated over 1.6 m with a BER below 10−9.
This paper studies the application of non-orthogonal multiple access (NOMA) to a cooperative multicast system (termed CM-NOMA). In particular, the multicast subscribers are served as secondary users underlaying a primary user. To enhance the secondary user fairness and compensate for the primary user, a two-stage cooperative strategy is proposed by selecting a certain secondary user to perform NOMA...
This work studies secrecy enhancement for socially enabled communications in cellular device-to-device (D2D) underlay through resource allocation. By analyzing the impact of social characteristics of those involved D2D users (DUs), proper selection of transmitters and friendly jammer nodes with appropriate power and spectrum allocation can facilitate secrecy transmission. First, we select D2D transmitter...
In typical logging while drilling propagation-resistivity tools, formation properties are measured at different operating frequencies. The conductivity and permittivity of the formation are obtained from the inversion of the measured amplitude attenuation and phase shift between a pair of receiver antennas. This paper describes a simple method for computing formation resistivity and permittivity from...
Device-to-device (D2D) communication brings significant benefits to improve resource utilization and users' throughput as an underlay to cellular networks. This paper first proposes an efficient admission policy based D2D clustering scheme to increase the system rate. By analyzing the interplay between the D2D clusters and the arrival user who intends to join a D2D cluster, we present two attraction...
While modern datacenters are increasingly adopting virtual machines (VMs) to provide elastic cloud services, they still rely on traditional TCP for congestion control. In virtualized datacenters, TCP endpoints are separated by a virtualization layer and subject to the intervention of the hypervisor's scheduling. Most previous attempts focused on tuning the hypervisor layer to try to improve the VMs'...
Aiming at the deficiencies in the traditional electronic signature system and biological information characteristics randomizing signature system, we propose an electronic signature system with credible fusion verification, which was equipped with not only the function of identifying the traditional electronic signature, but also the function of concealing the biological information characteristics...
This paper presents a multiple-symbol differential spatial division multiple access (MS-DSDMA) system conceived for low-complexity and high-bandwidth-efficiency applications operating in time-varying fading channels, where no channel estimation is required. A low-complexity adaptive multiple-symbol differential interference suppression (MS-DIS) scheme is proposed, which is based on the maximum signal-to-interference-plus-noise...
Realization of end-to-end Quality of Service (QoS) provisioning in a scheme plays a very important role in improving stability and quality of communication. Although simple data switching is possible between heterogeneous networks supporting different QoS signalling, end-to-end QoS provisioning can not be completed due to different rules in executing resource reservation. In this paper, a dual-stack...
Cooperative spectrum sensing is investigated for the purpose of detecting the primary user accurately in cognitive radio systems. As the report channel between cognitive users and fusion center experiences fading or shadowing, a cluster based cooperative sensing method is proposed to improve the sensing performance. However, when the number of the cognitive users in each cluster increases, the bandwidth...
In this paper, we introduce an extension of Stream Control transmission Protocol (SCTP) aiming for improving the efficiency of delay-sensitive transmission of multimedia data such MPEG-4 traffic. Briefly, our SCTP extension exploits one-way delay between SCTP endpoints, which allows the SCTP extension to retransmit lost packets selectively depending on whether the lost packets would still arrive before...
With the development of computer network, the intelligent degree of communication individuals was significantly increased, the requirement of automatic processing on communication message was also significantly increased, but the content of communication message itself hasnpsilat meaning, communication individuals canpsilat understand the content of communication, so resource canpsilat be used adequately,...
In this paper, the effects of the antenna shapes on the indoor MIMO channel capacity are analyzed based on a rigorous numerical model. Based on network theory, we first give the rigorous MIMO channel transfer function using the admittance matrices of the transmitter and receiver, and the admittance matrix between them. Consequently, we use the multilevel Green's function interpolation method (MLGFIM)...
This paper describes a modulation scheme for TH- UWB systems using pulse position modulated (PPM). For this scheme, a set of overlapped and orthogonal signals are transmitted simultaneously in the same time slot resulting in a composite pulse. And the signals have been discussed analytically for AWGN and multi-path channels. The proposed scheme can achieve an excellent BER performance by using one...
Based on an extrinsic information transfer (EXIT) chart assisted receiver design, a low-complexity near-maximum a posteriori (MAP) detector is constructed for high-throughput MIMO systems. A high throughput is achieved by invoking high-order modulation schemes and/or multiple transmit antennas, while employing a novel sphere detector (SD) termed as a center-shifting SD scheme, which updates the SD's...
A construction of authentication codes with arbitration from subspaces of singular pseudo-symplectic geometry over finite field of characteristic 2 is given, the parameters of the code are computed. Assuming that the encoding rules of the transmitter and the receiver are chosen according to a uniform probability distribution, the probabilities of success for different type of deceptions are also computed.
Stream control transmission protocol (SCTP) is a transport layer protocol for the next-generation Internet. In this paper, we investigate optimally condition for MPEG 4 video communication with SCTP in 802.11 wireless access media. We focus on the multi-streaming feature and the partial reliability extension in SCTP and compare performance of MPEG4 video quality under the policy w th/without differentiated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.