The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automatic blind modulation classification (MC) is deployed, as the intermediate step between signal detection and demodulation, to identify modulation schemes automatically. Modulation classification is still a challenging task, especially in a non-cooperative environment, owing to the lack of prior information on the transmitted signal at the receiver. The proposed MC scheme based on multi-sensor...
A novel preamble design is proposed for orthogonal frequency division multiplexing systems, which exploits the variable distance between a pair of training sequences for the transmission parameter signalling. Compared to the existing P1-symbol based preamble for the second generation digital terrestrial television broadcasting standard, the proposed design maintains the high performance and robustness...
This paper proposes an inter-cell co-channel interference (CCI) mitigation method with the mixed deployment of evolved NodeBs (eNBs) and relay nodes (RNs) for Long Term Evolution (LTE)-Advanced systems studied in the 3rd Generation Partnership Project (3GPP). Supporting RNs for LTE-Advanced can increase coverage in areas without service, and also improve system capacity. Although RNs can improve system...
A covert channel is a communication channel that bypasses the access controls of the system, and it is a threat to the system's security. In this paper, we propose a new covert timing channel which exploits the algorithmic complexity vulnerabilities in the name lookup algorithm of the kernel. This covert channel has a high capacity and it is practically exploitable. In our experiments, the data rate...
Presence information (PI) represents the updated status, context and willingness of communication partners in Voice over IP systems. For instance, the action that Alice switches her status (e.g., from ``idle" to ``busy") will trigger PI messages to notify her buddies this change. In a centralized presence service system, presence communications are managed by a presence server based on users'...
In this paper, we derive for the first time analytical expressions for the Cramer-Rao lower bounds (CRLBs) of timing recovery estimators from binary phase shift keying (BPSK) and square quadrature amplitude modulation (QAM) transmissions. The bounds are derived in the presence of additive white Gaussian noise AWGN). Moreover the carrier phase and frequency are considered as unknown nuisance parameters...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.