The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A Baseband Digital Predistorter design is proposed in this paper for a UHF 8 MHz Power Amplifier (PA) for DVB-T transmitter. A Memory Polynomial (MP) model is considered for the PA characterization and its coefficients are estimated based on Least Square Estimation (LSE) algorithm. The Indirect Learning Architecture (ILA) approach is used to estimate the coefficients of the predistorter. Simulation...
The Internet of Things (IoT) is an important part of the information technology of the future. Technically, IoT is expected to enable people-thing and thing-thing interconnections by combining communication technologies and networks. Our Lab has been actively promoting research on 5G & IoT, in which the NB-IoT new radio interface issue is of great interest. New 5G tests put forward a lot of requirements...
Wireless Sensor Networks are deployed in different fields of application to gather data on the monitored environment. The Wireless Body Sensor Network (WBSN) is a wireless sensor network designed to monitor a human body vital and environment parameters. The design and development of such WBSN systems for health monitoring have been motivated by costly healthcare and propelled by the development of...
In this paper, there is an attempt to introduce a new strategy for the Tone Reservation (TR) technique based on Preconditioned Conjugate Gradient (PCG) algorithm to reduce the Peak-to-Average Power Ratio (PAPR) in multi-carrier modulations. This strategy allows to limit the non-linear distortions that appear in multi-carrier signal Orthogonal Frequency Division Multiplexing (OFDM) and to measure signal...
Implantable Medical Devices (IMDs) are a growing industry regarding personal health care and monitoring. In addition, they provide patients with efficient treatments. In general, these devices use wireless communication technologies that may require synchronization with the medical team. Even though wireless technology offers satisfaction to the patient's daily life, it is still prone to security...
Fundamental differences between underwater acoustic propagation and terrestrial radio propagation impose the design of new networking protocols. In this paper, a multichannel MAC protocol, MC-UWMAC, especially designed for underwater acoustic sensor networks, is proposed and evaluated. MC-UWMAC is a low power MAC protocol operating on multichannel using a single slotted control channel and multiple...
This paper aims at presenting an experimented low power Internet of Things architecture, that could be integrated to underwater monitoring systems like Autonomous Underwater Vehicles for wireless underwater sensing. The proposed hardware architecture of the sensor nodes is based on an ultra-low-power Flash Micro-controller that takes measurements from water sensors, and synchronizes the network by...
Nowadays, Compressive Sensing (CS), is one of the emerging fields of research in signal processing. It aims at reconstructing a signal from a significantly reduced number of measurements. This is done by exploiting the sparsity property of the original signal. Since its start in 2006, CS has been applied in several domains such as wireless channel estimation, cognitive radio, and other domains. In...
Wireless capsule endoscopy (WCE) is a contemporary method that can view the entire intestine. Because of its advantages, it has been widely used. However, physicians demand an automatic way to shorten the time required to analyze the produced images (over 55,000 images in one examination for one patient). In this paper a recognition system for CE imaging has been developed to automatically detect...
Beam-steering antennas are the ideal solution for a variety of system applications, it is most commonly achieved through using phased arrays, where phase shifters are used to control the relative of the main-beam. In this paper, a low-cost directive beam-steering phased array (DBS-PA) antenna using switched line phase shifters is demonstrated. The proposed DBS-PA antenna has four micro-strip patch...
One of the considerable use cases for network functions virtualization (NFV) is the IP multimedia subsystem (IMS). With the emergence of software defined network (SDN) and NFV, the mobile network operators (MNOs) that are deploying the IMS look to make a gain from these leading technologies to mitigate hardware costs and reduce time to market. With the use especially of the NFV approach, the MNO looks...
The main concept behind 5G mobile network is to expand the idea of small cell network (SCN) to create a cooperative network able to cache data in active nodes inside radio access and Core network. Caching technique is a workaround to deal with bottleneck in the Back-haul, as the capacity of the wireless links could not support the increasing demand for rich multimedia. In this perspective multiple...
Radio Frequency Identification (RFID) is one of the basic requirements for the realization of Internet of Things (IoT). It is an automatic identification technology, without contact, aiming to identify the tag signal, in order to collect and send data instructions to the controller. Nevertheless, security is a very crucial issue for these RFID tags, since they suffer from a large number of threats...
Countering network threats, particularly intrusions, is a challenging area of research in the field of information security. Intruders use sophisticated mechanisms to hide the attack payload and break the detection techniques. To overcome that, various unsupervised learning approaches from the field of machine learning and pattern recognition have been employed. The most popularly used method is Principal...
Question Classification is a very important component in question answering system. In this paper, we present a rule-based method to classify Arabic questions. We have used two taxonomies: Arabic taxonomy and Li & Roth taxonomy. We have conducted several experiments using TREC and CLEF questions. The obtained results show the importance of our method.
Recently, the problem of the intrusion detection has been largely studied by the computer and networks security communities. Then, the Intrusion Detection System (IDS) becomes a interest topic in research and in particular in machine learning and data mining. In order to improve the classification accuracy and to reduce high false alarm rate from the classical data base like KDD99 or others. In this...
The vertical handover is an important issue in the world of internet. In fact, the use of internet is becoming wider with the diversity of possible offered services, going from emailing, Data and video transfers, to IoT. The number of internet users has reached multimillions of people these last two decades, in addition, they are willing to connect wirelessly anytime and anywhere, to the best available...
In this paper we are interested to the decoding of blocks turbo codes constructed from Reed Solomon (RS) codes. We have modified the iterative algorithm proposed by Chase in order to exploit the a priori information provided by a correlated source. Indeed, some sources such as images have a strong correlation. A simple iterative decoding algorithm does not take this feature into account. The choice...
In biomedical signal processing, Power Line Interference (50Hz) is one of the most and commonly types of electrical noises that often corrupt the quality of a biomedical data. In this paper, we present a simple tool for ECG signal enhancement approach based on Power Line Interference (PLI) reduction algorithm in Undecimated Wavelet Transform and Interval Thresholding. In our scheme, we use the Undecimated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.