The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We study the impact of signal reflections in enclosed wireless networks of wearable devices operating at mmWave frequencies. Given the radical blockage by obstacles and people (including the user's own body) at these frequencies, surface reflections are expected to be very important contributors to the collection of an adequate amount of desired signal power. At the same time, they are also expected...
Exploring simultaneous transmission and reception at the same carrier frequency, in-band full duplex (IBFD) has great potential to double the spectral efficiency of wireless communications. However, IBFD also creates a major problem, that is, strong self-interference, which must be suppressed to the receiver noise floor to make it work. Thus, this paper first gives estimates of self-interference strength,...
This paper considers an optimal artificial noise (AN)-aided transmit design for multi-user MISO systems in the eyes of service integration. Specifically, we combine two sorts of services, and serve them simultaneously: one multicast message intended for all receivers and one confidential message intended for only one receiver. The confidential message is kept perfectly secure from all the unauthorized...
Device-to-device (D2D) communications can enhance the overall system capacity by reusing cellular spectrum, which at the same time leads to severe interference to cellular connections and vice versa. In practice, even when two wireless connections share the same spectrum, the interference between them may not always exist if there is no conflict at packet-level transmissions. Thus, in this paper,...
In wireless ad hoc networks, misbehavior of nodes in computation of backoff value is one of the problems that affects the performance at MAC layer. To overcome this problem, this paper proposes a solution in which Contention Window subrange is specified by the receiver to the sender through CTS/ ACK packet. The advantage of sending the Contention Window subrange is, it is easier to detect the misbehaving...
In many applications such as localization, there is a need to determine the unknown time shift D between a signal, and its time shifted version. Aligning one against the other until the two match will find D. When working with compressive sensing (CS) measurements, only linearly transformed samples of the signal and its time-shifted version are available. These CS samples conceal the explicit time...
In this paper, diffusion-based molecular communication with ligand receptor receivers is studied. Information messages are assumed to be encoded via variations of the concentration of molecules. The randomness in the ligand reception process induces uncertainty in the communication; limiting the rate of information decoding. We model the ligand receptor receiver by a set of finite-state Markov channels...
A source coding problem over a noiseless broadcast channel where the source is preinformed about the contents of the cache of all receivers, is an index coding problem. Furthermore, if each message is requested by one receiver, then we call this an index coding problem with a unicast message setting. This problem can be represented by a directed graph. In this paper, we first define a structure (we...
Scatter radio is a promising enabling technology for ultra-low power consumption and low monetary cost, largescale wireless sensor networks. The two most prominent scatter radio architectures, namely the monostatic and the bistatic, are compared. Comparison metrics include bit error probability under maximum-likelihood detection for the single-user case and outage probability for the multi-user case...
Error and erasure exponents for the asymmetric broadcast channel are analyzed. The focus of the error analysis is on the main receiver where, nominally, both messages are to be decoded. A two-step decoding algorithm is proposed and analyzed. This receiver first attempts to decode both messages, failing which, it attempts to decode only the message representing the coarser information, i.e., the cloud...
The question of under what condition some side information for index coding can be removed without affecting the capacity region is studied, which was originally posed by Tahmasbi, Shahrasbi, and Gohari. To answer this question, the notion of unicycle for the side information graph is introduced and it is shown that any edge that belongs to a unicycle is critical, namely, it cannot be removed without...
The duality between the capacity regions of Gaussian broadcast channels and Gaussian multiple access channels has been well established. However, there have been limited results for the discrete case. In this work, we show that we can express the capacity regions of a class of broadcast channels using the rate regions of a finite number of multiple access channels.
In Wireless Sensor Networks, sensor nodes have limited resources such as processing power, memory and energy. Energy is an important factor to determine the lifetime of the network. Most part of the energy of a node is consumed in transmitting and receiving the data. Data transmission should be energy efficient to maximize the network's lifetime. Different architectures are used to transmit the data...
In this paper, we have proposed a tamper localization approach for histogram bin shifting based reversible watermarking algorithm, where original image can be obtained from the watermarked image without any distortion. The tamper localization approach finds out the tampered region of the image, which is used for the selective rejection of the cover image. General application of reversible watermarking...
Aerial telecommunication platforms will be a part of the future communication networks. In this paper, we address the issue of optimizing the location of Aerial Base Stations (ABS) in Low Altitude Platforms (LAP) to minimize the power consumption. We propose a dynamic algorithm which attempts to maximize the received power at ABS by moving it between multiple points within its coverage area. Furthermore,...
In this manuscript we consider several cells with heterogeneous characteristics, macro and small, working under the same spectrum. These cells serve a set of users, which are split between the two cell types. Under a frequency reuse of one, the users allocated to different cells generate harmful interference between them. We apply interference alignment (IA) at both macro and small-cell users to tackle...
The assessment of emergent global behaviors of self-organizing applications is an important task to accomplish before employing such systems in real scenarios, yet their intrinsic complexity make this activity still challenging. In this paper we present a logic language used to verify graph-based global properties of self-organizing systems at run-time. The logic language extends a chemical-based...
We present in this paper a survey of the existing capacitive data telemetry systems for biomedical implants. Other existing techniques such as RF, inductive and optic links as well as energy providers are briefly discussed. In addition, the bidirectional full duplex capacitive communication technique using load shift keying is introduced. This technique has been used in other biomedical systems such...
In this paper, the pessimistic multi letter common randomness assisted secrecy capacity for the Arbitrarily Varying Wiretap Channel (AVWC) under input and state constraints is derived.
In this paper, we propose a new rateless code based on overlapped generations. This proposed scheme works very well especially in a broadcast scenario, where channels with different characteristics are involved in the system. In the proposed scheme, we allow the adjacent generations to overlap. Our main focus is on the design of rateless codes to make any receiver able to recover all the source file...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.