The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present an iterative algorithm which jointly estimates the PA characteristics and the channel impulse response for communication systems. The proposed approach is motivated by the fact that the nonlinearly amplified communication signal carries more bandwidth, referred to as spectral regrowth, and therefore allows better probing of the channel. In contrast to existing conventional...
False data injection (FDI) attack is one of the severe attacks that threatens the smart grid's efficiency and reliability. Power grid's status is monitored by many measurement units spread all over the grid; these units periodically send their measurements to the grid's control center (CC), which utilizes them to make the right decisions for the grid. FDI attack inserts fake measurements among the...
In this paper, we propose an efficient identification algorithm for RFID systems based on EPC C1 Gen2 RFID standard1. Specifically, the proposed anti-collision algorithm is based on the observation of sub-frame during an identification process, and makes effective use of idle and collision statistics to accurately estimate the tag backlog and determine the proper frame size for the next inventory...
We present an SDN-based orchestration system that enables automated and coordinated arrangement of both computing and network resources in virtualized DC environments. The orchestrator is validated through a set of simulations, as well as through experiments carried out in a real laboratory. Results show that the proposed orchestration system improves the service requests acceptance rate and the utilization...
Receiver sensitivity is one of the most important parameters in determining the overall performance of a communication system. Industry has been using exhaustive search in a specified range to identify the achieved receiver sensitivity for wireless devices. Such an exhaustive search scheme is neither efficient in terms of measurement time, nor accurate due to the fixed stepsize. In this paper, we...
Because of the wide field of view (FOV) to monitor vessel movements, satellite-based automatic identification system (S-AIS) has been promoted in recent years. However, synchronization is a tough work in S-AIS receiver because of the large Doppler shift and serious signal collision resulting from simultaneous transmission in the FOV of a satellite. In this paper, we propose a pipelined synchronization...
Database-aided user association, where users are associated with data base stations (BSs) based on a database which stores their geographical location with signal-to-noise-ratio tagging, will play a vital role in the futuristic cellular architecture with separated control and data planes. However, such approach can lead to inaccurate user-data BS association, as a result of the inaccuracies in the...
As a promising technique to meet the drastically growing demand for both high throughput and uniform coverage in the fifth generation (5G) wireless networks, massive multiple-input multiple-output (MIMO) systems have attracted significant attention in recent years. However, in massive MIMO systems, as the density of mobile users (MUs) increases, conventional uplink training methods will incur prohibitively...
The fundamental limits of localization accuracy can be characterized by the information-theoretic bounds on position estimation. Tight bounds can be used not only as performance benchmarks for practical localization systems, but also criterion for assessing the effects of various sources of information (e.g., map awareness and ranging measurements) on localization performance, thus providing guidelines...
Two algorithms for the problem of joint angles and delays of arrival (JADE) of multiple paths are presented. The algorithms are based on a generalisation of the Matrix Pencil algorithm to the two dimensional case, i.e. 2D Matrix Pencils. Matrix pencil algorithms offer estimation of signal parameters, i.e. angles of arrival (AoA) or times of arrival (ToA), of multiple sources using a single snapshot...
Follow me cloud (FMC) is one of the solutions to the limitations of the service quality and type of functionality due to the inherent constraints of mobility management. In this paper, we address the tradeoff between the overhead and Quality of Experience (QoE) by proposing a mobility-based services migration prediction (MSMP). The aim of MSMP is to plan, for a given service, the sequence of data...
In a cooperative network, users share information with each other to achieve a common target. Due to the concerns of privacy and cost, users may be reluctant to share genuine information with each other, which incurs the information trustworthiness problem. Most of the existing research attempts have proposed various mechanisms targeting to enhance the information credibility in various scenarios...
In this article, we consider multiuser detection that copes with multiple access interference caused in star-topology machine-to-machine (M2M) communications. We assume that the transmitted signals are discrete-valued (e.g. binary signals taking values of ±1), which is taken into account as prior information in detection. We formulate the detection problem as the maximum a posteriori (MAP) estimation,...
This paper proposes novel two carrier frequency offset (CFO) estimation schemes to introduce inexpensive oscillators and operate under mobile multipath environments in wide area Wi-SUN systems based on IEEE 802.15.4g. One of the proposed schemes using a moving average low-pass filter (LPF) can compensate CFO within ±20 ppm at 920 MHz completely with simple configuration under condition of mobile and...
In this paper, we propose a complete data-aided (DA) synchronization algorithm for minimum-shift keying (MSK) transmission, which addresses features of the transmit-only Wireless Sensor Network (WSN). To provide reliable packet detection even under a packet overlapping scenario, our frame synchronization metric is based on a pseudo-random (PN) sequence preamble and keeps a constant low false alarm...
To reduce the huge consumption of traditional sensing, a multi-centers estimation based sensing scheme is proposed in this paper. Firstly, all potential channels are clustered into highly related groups with some channels selected as detecting channels (DCs) using an unsupervised algorithm. In each group, the states of other channels (estimated channels, ECs) are estimated according to their correlations...
The knowledge of CSI at the BS (CSIT) is required to achieve the high spectrum efficiency promised by massive MIMO. In Frequency-Division Duplex (FDD) Massive MIMO systems, the CSIT is obtained via downlink channel estimation and uplink channel feedback, However, the acquisition of CSIT is a very challenging problem in practical FDD massive MIMO systems with a large number of antennas. Recently, compressive...
Acquisition of accurate channel state information (CSI) at the base station (CSIT) is a major challenge of deploying frequency-division duplexing (FDD) massive MIMO systems. Although compressive sensing (CS) based CSIT estimation approaches have been proposed to reduce the pilot training overhead for massive MIMO systems, the existing schemes cannot properly dimension the minimum required pilot symbols...
We consider the problem of estimating the intensity map of a spatially random phenomenon over a geographical area observed by a sensor network. The spatial phenomenon of interest is modeled using a Gaussian random field specified by its nonlinear mean and covariance functions. Our proposed algorithm includes two stages: a novel greedy sparse recovery algorithm to estimate the parameters of the mean...
In this paper, we investigate the problem of indoor positioning using visible light systems. The directional detector array we use is comprised of a number of receiving elements, each consisting of an aperture and a photo diode, which are arranged to offer good angular diversity, and can be implemented within a compact receiver structure [1]. The receiving elements receive the light from a number...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.