The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a close-to-capacity dirty-paper coding framework which employs multi-level low density parity-check (LDPC) and trellis coded quantization. The proposed coding framework is robust in the sense that it performs close to capacity in the high as well as the low rate regimes. This is in contrast to existing practical DPC schemes which perform well at one of these regimes, but never both. In...
Because the trustworthy network is able to mitigate various secure problems, it has attracted researchers' attention worldwide. However, it's hard to wipe any malicious node off. A node may obtain fake trustworthy by mixing malicious transactions with tremendous honest ones. In order to eliminate such a fault, the improved method employs normalized transactions and linear increase of trustworthy....
We consider the greedy scheduling based on the physical model in wireless networks with successive interference cancellation (SIC). There are two major stages in a scheduling scheme, link selection (to decide which link is scheduled next) and time slot selection (to deciding which slot is allocated to a given link). Most available schemes take a first-fit policy in the latter and strive to achieve...
Successive interference cancellation (SIC) is an effective way of multipacket reception to combat interference. We consider the problem of maximizing the number of successful transmissions based on the physical model in wireless networks with SIC at the physical layer. We propose weighted simultaneity graph to characterize the sequential detection nature of SIC and the accumulative effect of multiple...
In this paper we consider the design of multi-stream demodulators for multiple-input multiple-output (MIMO) systems. Our proposed MIMO demodulator is based on the stack tree-search strategy and provides soft-outputs in the form of exact max-log log-likelihood ratios (max-log LLRs). We prove that our proposed demodulator is optimally efficient in that it visits the least number of nodes among all optimal...
Successive interference cancellation (SIC) is an effective way of multipacket reception to combat interference. We study link scheduling under SINR (Signal to Interference Noise Ratio) model in ad hoc networks with SIC at physical layer. The facts that interference is accumulated and the links decoded sequentially by SIC are correlated pose key technical challenges. We propose conflict set graph (CSG)...
This paper studies the performance limits of two-way relay channel (TWRC) at finite signal-to-noise ratio (SNR) in Rayleigh fading environment. A two-phase decode-and-forward (DF) protocol is considered. We first derive closed-form expressions for both outage probability and diversity-multiplexing tradeoff (DMT). Our results are general and suitable for any time sharing and any rate allocation in...
We present a novel partial decoding method at the relay, called pairwise check decoding (PCD), for two-way relay fading channels. The proposed PCD method forms a so-called check-relationship table for the superimposed Low-Density Parity-Check (LDPC)-coded packet pair during the multiple access phase. Meanwhile, it incorporates adaptive network coding by using closest-neighbor clustering mapping (CNCM)...
We consider the joint channel and network code design for a half-duplex 4-node multiple-access relay system with two sources, one relay, and one destination. The relay combines the information from both sources and transmits it to the destination together with both sources. We consider two network coding schemes for information combining at the relay, namely, the superposition coding (SC) and the...
We present a new physical layer network coding (PLNC) scheme, called superimposed XOR, for two-way relay channels. The new scheme specifically takes into account the channel as well as information asymmetry in the broadcast phase of two-way relaying. It is based upon both bitwise XOR and symbol-level superposition coding. We first derive its achievable rate regions when integrated with two known time...
We introduce simple yet efficient ARQ protocols in conjunction with two types of anti-jamming coding techniques - rateless coding and piecewise coding - for cognitive radios. For piecewise coding, we propose to employ systematic codes to facilitate efficient selected retransmissions and design short codes to maximize secondary user throughput. For rateless coding, we consider a protocol that transmits...
Sybil attack is a network threat introduced by one or more malicious nodes to declare numerous illegal identifies to confuse or even collapse the network applications. A new detection mechanism, called CRSD, is proposed for static wireless sensor networks, which takes use of the received signal strength (RSS) to infer the distance between two identities and further determines the positions relation...
The CSMA/CA protocols are designed under the assumption that all participant nodes would abide to the protocol rules. This is of particular importance in distributed protocols such as the IEEE 802.11 distributed coordinating function (DCF), in which nodes control their own backoff parameters. In this work, we propose a method to detect selfish misbehaving terminals that may deliberately modify its...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.