The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper considers interactive transmissions in the presence of omniscient Byzantine attacks. Unlike prior papers, it is assumed that the number of transmissions, the number of erroneous transmissions therein, and the direction of each transmission are predetermined. Besides, the size of the alphabet in each transmission is unequal and predefined. Using these transmissions, two nodes communicate...
Through exploiting the human perception of spatial sound, a new approach for compression coding of multi-channel audio signal based on ITU-T G.719 codec is put forward in this paper. Multi-channel input signals are converted to a down-mixed signal plus spatial perceptual parameters by use of down-mix and up-mix step-by-step techniques in frequency domain. The algorithm can significantly reduce the...
High Efficiency Video Coding (HEVC) is the next-generation video coding standard currently under development, which has demonstrated substantial bit savings (rate reduction by approximately half) compared to H.264/AVC. This paper presents the multiple sign bits hiding scheme that was adopted into the committee draft of HEVC at the 8th JCT-VC meeting. In HEVC, the quantized transform coefficients are...
Since the dynamic range of state metrics is limited due to the finitude of their quantization, it is needed to take an anti-overflow operation in the implementation of Turbo decoder. In traditional methods, plenty of calculations should be done for the anti-overflow protection in a single cycle, which greatly restricts the actual running clock frequency, thus to bring a strong impact on the final...
In this paper, we utilize sender-based Forward Error Correction (FEC) techniques to enhance the robustness of packet loss recovery for AVS Mobile speech and audio (AVS-M) codec. Two FEC schemes are proposed which take the advantage of the codec's structure characteristics and do not introduce extra delay. The objective and subjective listening tests results show that the two methods achieve higher...
In this paper, a quantization scheme based on hard-decision partition and adaptive reconstruction levels is proposed for High Efficiency Video Coding (HEVC), the video coding standard currently under development, which has demonstrated approximately 40% bit saving compared to H.264/AVC. For each video frame, the residual signal after motion estimation is transformed and then quantized by a hard-decision...
In this paper we propose a novel algorithm to predict the performance of interleaver division multiple access (IDMA) systems, which is called mutual information evolution algorithm (MIEA). The proposed MIEA is a semi-analytical technique, which is based on but a little different from the traditional extrinsic information transfer (EXIT) chart especially when used for the successive interference cancellation...
Low-density parity-check (LDPC) codes are widely used in many radio systems due to its superior performance and Software Defined Radio (SDR) is an emerging paradigm of the wireless communication system design due to its good flexibility and adaptability. However, LDPC decoding is computationally intensive and the implementation of it on software in a parallel way is quite challenging due to the characteristics...
In this paper, we study the end-to-end distortions when transmitting two Gaussian signals in a three-node, half-duplex, and two-way relaying network, where two users communicate in both directions with the help of one relay, and can transmit at different rates. We focus on the two-phase Multiple-Access Broadcast (MABC) cooperation protocol with decode-and-forward (DF), amplify-and-forward (AF), or...
Available spectrum resources are becoming scarcer, while additional services are being integrated into wireless devices. Cognitive radio and multiple-antenna (MIMO) techniques can be combined to provide a solution to this dilemma. Given the currently available frequency bands and a set of bit-rate constrained services to be transmitted, the antennas can be partitioned among frequency bands and the...
Low-density parity-check (LDPC) codes are one of the most effective error controlling methods, which now are widely used in multiple communication systems, for example, DVB-S2, 802.16e, etc. In these communication standards, the adopted LDPC codes are all quasi-cyclic low-density parity-check (QC-LDPC) codes. The parity-check matrices of QC-LDPC codes consist of arrays of circulants, in which each...
Interference cancellation (IC) is an effective and easy implemented technology in the multi-user system. Previous studies demonstrate the principles of IC and IC process which show a great improvement in the system capacity with IC. However, no research has focused on the IC system's capacity domain by giving an accurate formula. This article carries on the theoretical analysis of CDMA reverse link...
In this paper we evaluate the use of parallel interleavers for user separation in coded IDMA systems. The parallel interleavers have previously been evaluated for uncoded systems, and we here present extended results for the coded case. The new results are important for real systems, as they will most likely use performance enhancing channel coding. The parallel interleavers are designed to remove...
In this paper, we consider the transmission of a Gaussian signal over a slow fading channel. The channel state information is assumed to be only known at the receiver. The source is layer-coded and transmitted using the broadcast strategy. We are interested in the optimization problem of minimizing the expected end-to-end distortion of the reconstructed signal at the receiver. An efficient iterative...
Turbo codes are widely used in many radio systems due to its superior performance and Software Radio (SR) is an emerging paradigm of the wireless communication system design due to its good flexibility and adaptability. However, since turbo decoding is computationally intensive, the SR implementation of turbo decoding is always challenging. In this paper, an efficient software implementation of the...
In this paper, we consider the transmission of a Gaussian signal in a multi-relay cooperative system, where each relay is half-duplex and employs the decode-and-forward relaying protocol. We focus on the analysis of the distortion exponent, which characterizes the high signal-to-noise ratio (SNR) behavior of the end-to-end distortion. Specifically, we investigate the layered source coding with progressive...
Based on decode-and-forward strategy, we investigate the achievable outage probability of opportunistic relaying, in which there is a single source-destination transmission pair with the help of one of multiple relays. In two-hop scenario, based on adaptive decode-and forward strategy, the achievable diversity-multiplexing tradeoff with the knowledge of channel state amplitudes is analyzed. We show...
We consider a source-destination pair assisted by multiple decode-and-forward relays without channel state information at transmitter (CSIT). We investigate three schemes exploiting spatial diversity including multiple-relay cooperation (MR-Coop), conventional multiple-relay relaying (MR-Relay), and multiple-input-single-output (MISO). The total power is equally allocated to transmission partners...
Cooperative communication is an efficient technology to combat fading in wireless networks. In this paper, we propose an opportunistic cooperation algorithm with decode- and-forward strategy under a total power constraint. The relay selection and power allocation are jointly optimized to maximize the minimum of the weighted channel strengths between the links of source-relay and relay-destination...
A method of rapid secret sharing scheme based on STAR codes is proposed. Due to the characteristic of array codes such as STAR codes, the computation in secret sharing scheme need only XOR operation on GF(2), which is distinguished with the modulation and other complex operation on GF(q) in the traditional schemes. Thus, it's more rapid and suitable for large capacity secret sharing, and also appropriate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.