The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The security of Internet of Things (IoT) has already become a thorny problem because of opening deployment and limited resources. Thus, as the essential part of intrusion detection anomaly mining gets more and more attention. However, complexity of algorithm is the vital issue due to the specialty of IoT. Meanwhile, traditional methods with Euclidean distance may cause misjudgment at some extent....
Lower limb motor function is important for activities of daily living. Since gait movements of elderly subjects differ from those of young people, gait measurement is considered to be effective for evaluating lower limb motor function. In this paper, focusing on foot movements during gait, a method of evaluating 3-dimentional movements of the foot during walking was examined. Gait movements were measured...
A space time code based partial rank affine projection (PRAP) algorithm is proposed. The proposed algorithm uses an input signal where the input signal matrix Xk becomes an orthogonal matrix. For this input signal, matrix (XkTXk) becomes a diagonal matrix whose inverse can be easily computed. Thus, the proposed algorithm saves a significant amount of computations. Due to this feature the proposed...
Long-time cycle wireless monitoring of patients with health concerns is highly required. The quality of care, ability of fall detection and prevention is tremendously increased through enabling continous remote human movement monitoring. The aim of this paper is twofold. Firstly, to propose a real-time energy-aware wireless fall detection system based on emerging compresive sensing (CS). Secondly,...
This paper presents a blind multi-user detection technique for multi-antenna quadrature amplitude modulation (QAM) receivers with Inphase/Quadrature phase (I/Q) imbalances. The estimation of multiple users in the presence of I/Q imbalances is performed by Blind Source Separation (BSS) methods. While the complex-valued signal model for multi-antenna QAM receivers does not lend itself to BSS due to...
We consider a multiuser scenario with a center node for data fusion, where simultaneously transmitting is required in real time and with low probability of interception. We established a novel multiple access scheme, named matrix division multiple access (MDMA), based on OFDM technology. Precoded with different matrices, the signal from different end nodes can be distinguished due to the signal space...
This paper constructs a redundant dictionary using neural spike signals and uses a compressed sensing method to compress and reconstruct neural signals, which are cut into several segments of same length. By analyzing neural signals with different signal to noise ratios (SNRs), different types of spikes and different spike widths, we verify the performance of the method. Results show that, when the...
In this paper, we propose a threshold-based one-bit soft forwarding (TOB-SF) protocol for a multi-source relaying uplink system with network coding. In the TOB-SF protocol, the relay calculates the log-likelihood ratio (LLR) value of each network coded symbol, compares this LLR value with a pre-optimized threshold, and determines whether to transmit or keep silent. We first derive the bit error rate...
The downlink performance of a dual-cell relay enhanced wireless network is investigated. A single relay is shared by the two base stations in the system. The relay is assumed to be placed in a region covered by both base stations. The relay station is operating in the decode-and-forward mode. Closed-form approximations which follow the exact results extremely closely are derived for the outage probability...
Secret key generation algorithms based on radio channel measurements have been proposed to support private communications. This paper presents methods for calculating upper bounds on the secret key generation rate for realistic channel measurement techniques. Bounds are shown for secret key generation using non-simultaneous channel measurements from each communicating party. Since short measurement...
Cloud radio access network (Cloud-RAN) is a promising network architecture to meet the explosive growth of the mobile data traffic. In this architecture, as all the baseband signal processing is shifted to a single baseband unit (BBU) pool, interference management can be efficiently achieved through coordinated beamforming, which, however, often requires full channel state information (CSI). In practice,...
Consider K-hop cascaded directed relay networks with time-division duplex (TDD), where the source, the relays, and the destination form a directed chain, and each node only receives the transmissions from its upstream node in the chain. We quantitatively investigate the effect of TDD constraint, which obviously prohibits the use of some network states and reduces the whole transmission rate. Firstly...
In this paper, we consider a decentralized wireless communication system with wireless energy transfer capability. We aim to minimize the total number of packets waiting at wireless nodes for the whole system. We first formulated the optimization problem as a decentralized partially observable Markov decision process (DEC-POMDP). To solve an optimization problem with constraints, we applied the Lagrangian...
This paper considers a multi-input multi-output (MIMO) wireless relay network, where the source S communicates wirelessly to the destination D via the help of a nonregenerative relay R. Previous studies are almost exclusively based on the assumptions of equal time-duration phases for S-R and R-D transmission and equal number of multiple antennas for every node, and the results concerning arbitrary...
Cooperative content offloading is a promising technology to lessen heavy burden of wireless networks and improve the quality of downloading services. Since few users are voluntary in providing free assistance, auction-based incentive mechanisms are designed to encourage participation. In existing auction-based incentive mechanisms, each provider only acts as a service seller. However, a provider could...
This paper considers downlink multicast transmit beamforming for secure layered transmission systems with wireless simultaneous information and power transfer. We study the power allocation algorithm design for minimizing the total transmit power in the presence of passive eavesdroppers and energy harvesting receivers. The algorithm design is formulated as a non-convex optimization problem. Our problem...
This paper addresses robust beamforming (BF) design for the uplink transmission of wireless networks, where the base station (BS) equipped with a very large number of antennas communicates with multiple users on the same frequency band simultaneously. Based on the assumption that the wireless channels undergo correlated Rayleigh fading, we first formulate an optimization problem to maximize the output...
There is an increasing demand for broadcasting information of common interest to a large number of users. The unreliable nature of wireless links and the difficulty of acknowledging the correct reception of every broadcast packet by every user when the number of users becomes large are two major challenges for wireless network broadcasting. In this paper we investigate the problem that a base station...
A multi-pair two-way relay system sharing with a single relay with large numbers of antennas is considered. In this paper, we investigate the ergodic achievable rates when maximum ratio combining/maximum ratio transmission is used at the relay station. The analytical results for the achievable rates are derived and the asymptotic analysis is conducted when the number of antennas, N, grows to infinity...
Compared with standard cyclic prefix OFDM (CP-OFDM), time domain synchronous OFDM (TDS-OFDM) can achieve a higher spectrum efficiency by using the known training sequence instead of CP as the guard interval. However, TDS-OFDM suffers from reduced energy efficiency and performance loss due to the existing mutual inferences. In this paper, based on the newly emerging theory of structured compressive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.