The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Though the performance of belief propagation (BP) decoder for polar codes is comparable with the successive cancellation (SC) decoder, it has significant performance gap when compared with the improved SC decoders, such as SC list (SCL) decoding. In this paper, we propose an improved BP decoding for polar codes with good performance by adapting their parity-check matrices. The decoding process is...
Acquiring clear images is a crucial precondition in many image-related applications, such as wireless sensor network, industrial inspection, and machine vision. In this paper, a multi-scale image adaptive enhancement algorithm for image sensors in wireless sensor networks based on non-subsampled shearlet transform is presented. The images are decomposed into different scales of coefficients. Then...
This paper considers multi-input multi-output (MIMO) multicell networks, where the base stations (BSs) are full-duplex transceivers, while uplink and downlink users are equipped with multiple antennas and operate in a half-duplex mode. The problem of interest is to design linear precoders for BSs and users to optimize the network’s energy efficiency. Given that the energy efficiency objective is not...
Optical beamforming is a technique to focus light-emitting diode (LED) light on a desired target and has been used to improve the performance of visible light communications (VLC). In this article, we propose and demonstrate a VLC technology based on time-division multiple access (TDMA) optical beamforming to accommodate multiple target devices. It focuses LED light on each different target device...
This paper addresses the self-interference (SI) cancellation at baseband for full-duplex MIMO communication systems in consideration of practical transmitter imperfections. In particular, we develop a subspace-based algorithm to jointly estimate the SI and intended channels and the nonlinear distortions. By exploiting the covariance and pseudo-covariance of the received signal, we can increase the...
In Named Data Networking (NDN) architecture, packets carry data names rather than source or destination addresses. To realize this paradigm, each NDN router maintains three data structures CS, PIT, FIB in the forwarding plane. Designing a quick enough forwarding plane with high capacity is a major challenge within the overall NDN research area. In this paper, we present a novel implementation of FIB...
An effective decoherence method called the fourth-order cumulants-based improved Toeplitz matrices reconstruction (FOC-ITMR) is addressed for two-dimensional (2-D) direction-of-arrival (DOA) estimation of coherent signals. To avoid the loss of the array’s physical aperture, the FOC-ITMR method fully utilizes the information of received data from the whole two parallel uniform linear arrays (ULAs)...
In this paper, we propose a low-complexity lattice reduction (LR) algorithm for multiple-input multiple-output (MIMO) detectors with tree searching. Whereas conventional approaches are based exclusively on channel characteristics, we focus on joint optimisation by employing an early termination criterion in the context of MIMO detection. In this regard, incremental LR (ILR) was previously proposed...
Ranging code is the core component of the signal transmission scheme in any global navigation satellite system (GNSS); its performance directly influences on the technical indexes of positioning accuracy, compatibility, interoperability, anti-interference, security, synchronization realization, and so on. Therefore, research on ranging codes could provide theoretical support for the improvement of...
Cellular-based cooperative communication is a promising technique that allows cooperation among mobile devices not only to increase data throughput but also to improve localization services. For a certain number of cooperative nodes, the geometry plays a significant role in enhancing the accuracy of target. In this paper, a simple solution to the deployment of cooperative nodes aiming at the lowest...
In multi-user beamforming systems, the inter-user interference are controlled by spatial filtering. Since the implementation of digital beamforming is difficult due to high hardware cost of large array system, the analog beamforming system with one phase shifter at each antenna element is considered with antenna selection scheme. However, the beamwidth is not sufficiently narrow to perfectly remove...
In this letter, a surround suppression variational Retinex enhancement algorithm (SSVR) is proposed for non-uniform illumination images. Instead of a gradient module, a surround suppression mechanism is used to provide spatial information in order to constrain the total variation regularization strength of the illumination and reflectance. The proposed strategy preserves the boundary areas in the...
In this paper, we consider a multi-user full-duplex (FD) massive multiple-input multiple-output (MIMO) system. The FD base station (BS) is equipped with large-scale antenna arrays, while each FD user is equipped with two antennas (one for transmission and the other one for reception). We assume that the channel state information (CSI) is imperfect, and no instantaneous CSI of loop interference (LI)...
Full-duplex (FD) wireless communication is evolving into a practical technique, and many studies are being conducting in this area, especially regarding the physical layer. However, to exploit FD benefit successfully, efficient medium access control (MAC) protocols are crucial as well as physical layer advances. Numerous FD-MAC protocols have been proposed, but these MAC protocols cannot address all...
The scheduling algorithm is a fundamental design problem to allocate resources amongst different entities in distributive wireless sensor networks (WSNs). These sensor nodes have limited power and non-replenishable energy resources. In WSNs, the duty cycling mechanism is commonly used to save energy due to idle listening. On the other hand, a fixed duty cycling mechanism increases transmission latency...
Puncturing is one of the methods of increasing the code rate, and the original code before puncturing is called the mother code. Any (N,K) convolutional code is obtainable by puncturing some (n,1) mother codes. The objective of a blind recognition of a channel code is to obtain its generator from the intercepted noisy bit stream. The process of the blind recognition of punctured convolutional codes...
We consider a cognitive wireless network in which users adopt a spectrum sharing strategy based on cooperation constraints. The majority of cognitive radio schemes bifurcate the role of players as either cooperative or non-cooperative. In this work, however, we modify this strategy to one in which players are hybrid, i.e., both cooperative and non-cooperative. Using a Stackelberg game strategy, we...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.