The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider polar coded BPSK receiver performance improvement based on the concepts of channel log-likelihood ratio (LLR) approximation and the maximum achievable transmission rate on fading channel. Based on symmetry condition of random variables, uniform scaling factors are applied to correct soft messages at the absence of channel state information (CSI) at the receiver side. The searching method...
Although the base station processing and the majority of the protocols of the wireless systems are standardized by 3GPP, the receiver architecture and implementation remain vendor-dependent. The receiver design should fulfill computational efficiency requirements, and be evaluated in practical simulators or emulators that are compliant with real-world wireless standards. In this paper, we provide...
In addition to high data rate, millimeter-wave technology has great potential to provide extremely high localization accuracy. In this paper, we outline the benefits of this technology for positioning and their main applications, which are no longer confined to services only but also to improve communication. We shall focus on the trade-off between data communication and positioning looking the reconfiguration...
Ground-based fixed receiver bistatic synthetic aperture radar (SAR) is a technology increasingly used in urban monitoring, complementing and enriching the traditional monostatic SAR, but the acquisition geometry is more complex than in the monostatic case. Hence, in the design and configuration of real bistatic SAR systems simulations are needed. In this regard we have presented in [1] a simulator...
Many wireless networks provide a large number of available channels for data transmissions. Due to the multi-path environment, channels have different channel qualities. There- fore, selecting a good channel from the multiple channels can improve the communication effectiveness. The Packet Reception Rate (PRR) has been utilized to represent the channel quality. In order to know which channel has good...
Soft-input soft-output (SISO) sphere decoding is applied to multiple-input multi-output (MIMO) systems to offer good bit error rate (BER) performance but at high complexity. To reduce this computational complexity, we propose a novel hybrid enumeration strategy for such decoding that dynamically determines the candidate list; moreover, this strategy uses a new node enumeration based on concentric...
Differential spatial modulation (DSM) is a novel attractive alternative technique for coherent spatial modulation (CSM) without channel state information (CSI) at the receiver. In this paper, iterative detection is firstly employed to improve the performance of DSM schemes. With the Hamming distance of two matrices reduced to the sum of simple elements, a lowcomplexity iterative detection scheme for...
Stringent mobile usage characteristics force wireless networks to undergo a paradigm shift from conventional connection-centric to content-centric deployment. With respect to 5G, caching and heterogenous networks (HetNet) are key technologies that will facilitate the evolution of highly content-centric networks by facilitating unified quality of service in terms of low-latency communication. In this...
Two channels are said to be equivalent if they are degraded from each other. The space of equivalent channels with input alphabet X and output alphabet Y can be naturally endowed with the quotient of the Euclidean topology by the equivalence relation. We show that this topology is compact, path-connected and metrizable. A topology on the space of equivalent channels with fixed input alphabet X and...
We consider subspace codes obtained by lifting L-interleaved [n, k] Gabidulin codes. When used in networks with random linear coding, these codes are able to correct with high probability γ packet insertions and δ packet deletions provided that γ/L + δ ≤ n − k. We propose to use these subspace codes in the so called fountain mode. In this case we do not need to correct deletions and are able to correct...
This paper studies the maximum secrecy rate for a semi-deterministic wiretap channel, in which the channel between the transmitter and the legitimate receiver is deterministic, while that between the transmitter and the eavesdropper is a discrete memoryless channel. For a given decoding error probability and information leakage (measured by the total variation distance), the optimal second-order secrecy...
We study the state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes all other instances of CSI availability as special cases, and calls for an efficient utilization of the state sequence both for reliability and security purposes. A lower bound on the secrecy-capacity, that improves upon the previously best known result by Chen...
The shuffle transfer pattern is widely adopted in today's cluster computing applications and the completion time of each group of transmissions directly affects application performance. Because of the restriction on the number of concurrent threads and the TCP Incast problem, the randomized data fetching strategy is widely employed in this kind of communication in practice. In this paper, to assess...
As more knowledge is vastly added to the devices fuelling the Internet of Things (IoT) energy efficiency and real-time data processing are great challenges that must be tackled. In this paper, we introduce ADMin, a low-cost IoT framework that reduces on device energy consumption and the volume of data disseminated across the network. This is achieved by efficiently adapting the rate at which IoT devices...
In spectrum sharing networks with relay cooperation, primary users can benefit from the assistance of secondary users while secondary users accessing the primary bandwidth to transmit their signals. Reasonable relay selection strategy can improve the performances of both primary and secondary users in terms of higher transmission data rate and lower outage probability, and at the same time, frequent...
In this paper, we consider the design of multi-resolution non-coherent multiple-input multiple-output (MIMO) systems that enable Unequal Error Protection (UEP). A method for designing multi-layer non-coherent Grassmannian constellations is introduced. Specifically, the proposed method yields multi-layer constellations that are amenable to a natural set partitioning strategy. The resulting subsets...
Adopting the concept of simultaneous wireless information and power transfer (SWIPT), applied over an integrated architecture of receiver, we propose a solution for an improved information decoder. Our research concludes to an enhanced performance with dual objective of pursuing a lower symbol error rate, while at the same time achieving the highest energy harvested in the battery. Information is...
In this paper, we develop and analyze a novel performance metric, called interference efficiency (IE), that shows the number of transmitted bits per unit of interference energy imposed on the primary users (PUs) in an underlay cognitive radio network (CRN). Specifically, we develop a framework to maximize the IE of a CRN with multiple secondary users (SUs) while satisfying target constraints on the...
In this paper, we study the performance of two cross-layer optimized dynamic routing techniques for radio interference mitigation across multiple coexisting wireless body area networks (BANs), based on real-life measurements. At the network layer, the best route is selected according to channel state information from the physical layer, associated with low duty cycle TDMA at the MAC layer. The routing...
Archived GPS ephemeris data for years 2000–2016 is investigated by cleansing and precision measures. The goal of this work was twofold: (1) to reveal and remove incorrect ephemeris data so that the cleansed data is as close to the real broadcasted data as possible, and (2) to analyse the quality of the cleansed data by comparing ephemeris based satellite locations to true locations. Our findings show...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.