The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Interference alignment (IA) is a prospective method to manage interference between users in multi-user networks. On the other hand, jamming can be an effective way to combat adversarial eavesdropping for legitimate networks. In this paper, a beneficial jamming scheme is proposed for interference alignment networks. In the scheme, the jammer utilizes its precoding vector to constrain the jamming signal...
In this paper, we propose a systematic design approach of polar codes for multicolor visible light communication (VLC). Owing to the mixed ratio of multicolor light intensities and the interference between different colors, the channel polarization over a multicolor VLC system is markedly different from that over a uniform channel. Our scheme quantifies these different color channels and constructs...
Increased demand for wireless services has spurred research into spectrum co-existence between radar and communication systems. The effect of an unaltered radar interference on an uncoded communication receiver has been investigated for constellations used in commercial systems. However, the constellation design — possible for a cognitive transmitter-receiver pair — that maximizes the transmission...
To identify the attended speaker from single-trial EEG recordings in an acoustic scenario with two competing speakers, an auditory attention decoding (AAD) method has recently been proposed. The AAD method requires the clean speech signals of both the attended and the unattended speaker as reference signals for decoding. However, in practice only the binaural signals, containing several undesired...
New multiple access techniques aim to increase the spectral efficiency by overloading the system, i.e., with those techniques the number of users served is greater than the number of system radio channels. Multicarrier-code division multiple access (MC-CDMA) allows the system to be overloaded when multiuser-maximum-likelihood-detector (MU-MLD) is used. Nevertheless, an overloaded system may be affected...
Plane wave methods for ultrafast ultrasound imaging suffer from a low signal to noise ratio (SNR) and a limited field of view at greater imaging depths. Imaging using multiple focused coded beams in parallel is one strategy for high speed imaging that may improve on these limitations. However, the SNR and resolution of this strategy are degraded by the interference between the beams transmitted in...
We define a multiaccess communication scheme that effectively eliminates interference and resolves collisions in many-to-one and many-to-many communication scenarios. Each transmitter is uniquely identified by a coding vector. Using these vectors, all signals issued from a specific transmitter will be aligned along a unique dimension at all receivers hearing this transmission. This dimension is characteristic...
The RTCA DO-260B document has stimulated since a few years ago the adoption of novel algorithms to improve the ability of receivers to detect and decode ADS-B signals, with particular emphasis on preamble detection, declaration of bit state and confidence level, detection and correction of errors. Motivated by an industry-driven project, this paper reports on performance analysis of a set of enhanced...
This work deals with a joint design of radio access and fronthaul links for the uplink of cloud radio access network (C-RAN) equipped with wireless fronthaul link. A conventional uplink system based on per-cell decode-and-forward (DF) relaying, in which the message sent by each user equipment (UE) is decoded by the closest remote radio head (RRH) and forwarded to a baseband processing unit (BBU) via...
In this paper, minimum MSE based interference alignment (IA) algorithm is developed for the interfering broadcast channel (IBC), which models the multi-cell downlink system, underlying cognitive radio, device-to-device and other scenarios. The IA precoders and decoders are computed to minimize the MSE. Cascade design is used for IA precoder design, where the first component precoder is obtained by...
Wireless powered communications is a promising technology for next-generation low-powered sensor networks such as the Internet of Things. This paper deals with backscatter communications in sensor networks, an ideal technology for low-powered battery-less devices. However, in contrast to conventional communications, backscattering suffers from collisions due to multiple concurrent transmissions and...
In dense wireless networks (large number of users) and under high traffic loads, inter-user interference constitutes a factor limiting network's performance. Successive Interference Cancellation (SIC) has successfully counteracted this problem. Nonetheless, the aggregate Packet Error Rate (PER) when SIC is employed heavily depends on the users' symbol energies. We show that in a wireless (satellite)...
This paper proposes a technique to improve the robustness of spread spectrum (SS) audio watermarking for acoustic propagation. The appropriate embedding areas should be selected to achieve good perceptibility and high robustness. In order to improve the redundancy and robustness, the cross spread spectrum (CSS) scheme based on highly correlated cross frames is proposed which could decrease the variance...
Graph-based random access protocols have emerged as an efficient solution to tackle the medium sharing problem for machine type communications. Their remarkable performance is well-understood for scenarios in which devices communicate with a one-hop receiver devoted to collecting packets. Many practical applications, however, foresee the receiver to also act as sender towards a second-hop terminal...
A reliable feedback channel is vital to report decoding acknowledgments in retransmission mechanisms such as the hybrid automatic repeat request (HARQ). While the feedback bits are known to be costly for the wireless link, a feedback message more informative than the conventional single-bit feedback can increase resource utilization efficiency. Considering the practical limitations for increasing...
In this paper, we consider a scenario of hybrid device-to-device (D2D) & cellular uplink transmissions, where K pairs of D2D user equipments (UEs) are considered. In each D2D pair, one UE intends to communicate with the other UE and access to the base station (BS) at the same time. To deal with the complicated interferences among D2D and cellular uplink transmissions, the power threshold based...
Non-Orthogonal Multiple Access (NOMA) has been suggested as one of the technologies to be implemented in the fifth generation - 5G - mobile networks. NOMA helps increasing the capacity by offering a more effective use of the available resources, but it also intentionally introduces interference in the transmitted signal. This means that higher signal-to-interference-plus-noise ratio (SINR) values...
Interference forwarding by a relay enhances the interference level and enables the cancellation of the interference. If the interfering source to relay link is not strong, then the relay can decode a part of the interference and forward it to the destination, and the destination can cancel only that part of the interference. It is known as partial decode-and-forward (PDF) and partial interference...
In this paper, we propose a new method for nonorthogonal multiuser downlink transmission, referred to as multiple-input multiple-output lattice partition multiple access (MIMO-LPMA). The new method is based on the combination of user selection, zero forcing beamforming, and LPMA, and it uses N base station antennas to deliver information to N clusters of M users each. The method thus accommodates...
Interference alignment (IA) networks seem secure, due to the fact that signals from the legitimate network may act as interference to disrupt the external eavesdropping. However, when some users inside the network are cooperating to eavesdrop one certain user, it will not be secure any longer. Thus, we concentrate on the eavesdropping attacks in this paper, and propose a novel collusive eavesdropping...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.