The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An adaptive delay-tolerant distributed space-time coding (DSTC) scheme equipped with a feedback channel is proposed for two-hop cooperative multiple-input multiple-output (MIMO) networks. A maximum likelihood receiver and adjustable code matrices subject to a power constraint with a decode-and-forward cooperation strategy are considered with different DSTC antenna configurations. In the proposed delay-tolerant...
The pilot contamination caused by sharing the non-orthogonal pilots among users is considered to be a bottleneck of the massive multi-input multi-output (MIMO) systems. This paper proposes a pilot scheduling scheme based on the degradation to address this problem. Through computing the degradation of the users, the proposed scheduling assigns the optimal pilot sequence to the user who suffers from...
Licensed-assisted access (LAA) is a new operation mode of carrier aggregation for the Long Term Evolution Advanced systems to transmit data on both licensed and unlicensed spectrum. To deal with the issue of co-existence with WiFi systems, LAA is required to perform listen-before-talk, which can significantly impact its resource utilization. In this paper, the concept called multi-subframe scheduling...
This paper evaluates the performance of the vehicle-to-infrastructure (V2I) fair access with a finite retry limit through constructing an analytical model. Firstly, the process of the distributed coordination function (DCF) mechanism with a finite retry limit is described through developing a 2-D Markov chain; based on the Markov chain, the transmission probability with the access parameters including...
Unlikeonline shopping, it is difficult for the physical store to collect customer shopping data during the process of shopping and conduct in-depth data mining. The existing methods to solve this problem only considered how to collect and analyze the data, but they have not paid attention to the large computation amount, bulk data amount, and long time delay, in which they can not feedback user data...
New algorithms and architectures for the current industrial wireless sensor networks shall be explored to ensure the efficiency, robustness, and consistence in variable application environments which concern different issues, such as the smart grid, water supply, and gas monitoring. Object detection automatic in remote sensing images has always been a hot topic. Using the conventional deep convolution...
In order to improve the energy efficiency of cognitive wireless sensor network, this paper introduces threshold-sensitive energy efficient sensor network (TEEN) routing protocol into cognitive wireless sensor network. To make routing and spectrum more stable, this paper presents advanced threshold-sensitive energy efficient sensor network (A-TEEN), which is the optimization of TEEN. A-TEEN optimized...
In mobile ad hoc networks (MANETs), the reliability of nodes, quality of data and access control cannot be achieved successfully for various network functionalities through traditional cryptographic security, which makes MANET vulnerable to illegitimate node behaviour changes. These node misbehaviours, referred as soft security threats, need to be detected and prevented in order to protect against...
Biorthogonal Fourier transform (BFT), consistent with the matched signal transform (MST), has been introduced to demodulate the M-ray chirp-rate signal which possesses good orthogonality in the BFT domain. Here, we analyze the characteristics of BFT detection in a further step, including the resolution capability of the multichirp-rate signal, the property of pulse compression, the closed-form bit-error...
In this paper, a polar-coded space-time transmit diversity (STTD) scheme is proposed in order to improve the performance of multiple-input multiple-output (MIMO) system. In Rician fading MIMO channels, the corresponding polar-coded STTD system can be equivalent to a single transmission channel for each polar code bit. Density evolutions for the polar-coded STTD systems are proposed based on the analyses...
In this paper, adaptive transmission in a cognitive relay network where a secondary transmitter acts as cooperative relay for a primary transmitter while in return gets the opportunity to send its own data is considered. An opportunistic half-duplex (HD)/full-duplex (FD) relaying mode selection criterion which can utilize the advantages of both HD and FD is proposed. The key idea is that the cooperative...
Ultra-wideband (UWB) impulse radar plays an important role in contactless vital sign (VS) detection. The VS can be extracted remotely by acquiring the oscillations in the human chest. Unfortunately, it is usually challenging to identify VS due to the low signal-to-noise ratio (SNR) only based on the traditional fast Fourier transform (FFT) especially in complicated conditions. To extract VS accurately,...
Finding the minimum connected dominating set (MCDS) is a key problem in wireless sensor networks, which is crucial for efficient routing and broadcasting. However, the MCDS problem is NP-hard. In this paper, a new approximation algorithm with approximation ratio H(Δ)+3 in time O(n2) is proposed to approach the MCDS problem. The key idea is to divide the sensors in CDS into core sensors and supporting...
In this paper, we evaluate two-way relay communication systems in cognitive radio environments. The proposed model includes two subsystems: a primary system and a secondary system. The primary system consists of a primary transmitter and a primary receiver while the secondary includes two terminals exchanging their data via an intermediate relay node. Each network node is equipped with a single antenna...
In wireless sensor networks, sensor nodes are usually powered by battery and thus have very limited energy. Saving energy is an important goal in designing a WSN. It is known that clustering is an effective method to prolong network lifetime. Due to the development of big data, there are more sensor nodes and data needed to process. So how to cluster sensor nodes cooperatively and achieve an optimal...
In this paper, we propose to learn deep features from body and parts (DFBP) in camera networks which combine the advantages of part-based and body-based features. Specifically, we utilize subregion pairs to train the part-based feature learning model and predict whether they belong to positive subregion pairs. Meanwhile, we utilize holistic pedestrian images to train body-based feature learning model...
Spatial spectrum estimation technology has always been the focused research project in an array signal processing of High Frequency Surface Wave Radar (HFSWR). This paper takes the polarization sensitive array for the model and combines with time-frequency analysis method for DOA estimation of HFSWR echo signals, which can make full use of the spatial, time-frequency, and polarized domain information...
In this paper, we consider the beam-domain hybrid time-switching (TS) and power-splitting (PS) simultaneous wireless information and power transfer (SWIPT) protocol design in full-duplex (FD) massive multiple-input multiple-output (MIMO) system, where the FD base station (BS) simultaneously serves a set of downlink half-duplex (HD) users (cellular users) and a set of fixed uplink HD users (fixed sensor...
Combinatorial auctions are employed into many applications such as spectrum auctions held by the Federal Communications Commission (FCC). A crucial problem in such auctions is the lack of secure and efficiency mechanism to protect the privacy of the bidding prices and to ensure data security. To solve the problem, we propose an approach to represent the price as a polynomial’s degree based on verifiable...
Real-time positioning of a specific object in the big data environment can improve the monitoring and management capacity for network data. For the real-time positioning of the specific object, it is necessary to quickly search the network data representing a specific object and match its pattern strings and compare the corresponding Internet protocol (IP) address of the matched network data with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.