The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Imaging with random sensing functions may afford novel measurement geometries that circumvent constraints of conventional point-by-point imaging architectures. Here we demonstrate imaging of axial reflectivity profiles using random temporal-spatial encoding created by modal interference in a multimode fiber.
In this paper we consider transmit beamforming schemes for downlink control channel. In particular, we propose exploiting information on user location for selecting both the serving transmission/reception point (TRP) and transmit beam used for control channel transmissions. Moreover, a suppressed zero-forcing (SZF) scheme based on vertically and horizontally polarized transmit beams is proposed with...
4G Long Term Evolution (LTE) mobile system adopts Adaptive Modulation and Coding (AMC) as a link adaption mechanism that is based on the User Equipment (UE) periodically reporting channel condition summarised through Channel Quality Indicator (CQI) which, in turn, is based on Signal-to-Interference-plus-Noise Ratio (SINR) and Reference Signal Received Power (RSRP). Although CQI has a predominant role...
This paper presents pilot symbol aided channel estimation in Filter Bank Multicarrier (FBMC). FBMC has been employed widespread in communication applications because of its good spectral behaviors. Unlike Orthogonal Frequency Division Multiplexing, FBMC structure avoids imaginary interference. So that auxiliary symbols are employed and decrease peak to power ratio and improve achievable capacity....
We define a multiaccess communication scheme that effectively eliminates interference and resolves collisions in many-to-one and many-to-many communication scenarios. Each transmitter is uniquely identified by a coding vector. Using these vectors, all signals issued from a specific transmitter will be aligned along a unique dimension at all receivers hearing this transmission. This dimension is characteristic...
The RTCA DO-260B document has stimulated since a few years ago the adoption of novel algorithms to improve the ability of receivers to detect and decode ADS-B signals, with particular emphasis on preamble detection, declaration of bit state and confidence level, detection and correction of errors. Motivated by an industry-driven project, this paper reports on performance analysis of a set of enhanced...
As in-line interference between geostationary(GEO) and Non-Geostationary(NGEO) systems is becoming more and more serious. We propose an efficient utilisation of the adaptive modulation and coding (AMC) scheme for spectral coexistence of GEO and NGEO satellites to mitigate in-line interference. Results of Simulation show that the proposed scheme can improve the performance of the NGEO system in comparison...
In this paper, we propose, design, and evaluate the use of transmitters mapping with a symbols encoding techniques to mitigate inter-symbol interference (ISI) and improve the overall VLC system performance while using a very simple receiver (single element wide field of view, (FOV)) with an OOK modulation scheme. The proposed technique with the laser diodes transmitters are able to provide data rates...
Superior spectral properties of Filter Bank Multi-Carrier (FBMC) techniques make them an interesting choice for future wireless systems. In order to directly apply well known pilot-symbol aided channel estimation in FBMC, however, the intrinsic imaginary interference has to be canceled. Such cancellation method is usually designed for a doubly-flat channel. In this paper, we investigate the effects...
Interference forwarding by a relay enhances the interference level and enables the cancellation of the interference. If the interfering source to relay link is not strong, then the relay can decode a part of the interference and forward it to the destination, and the destination can cancel only that part of the interference. It is known as partial decode-and-forward (PDF) and partial interference...
We investigate the overlay coding scheme as the capacity achieving multi user detection (MUD) technique, i.e., transmitting over non-orthogonal channels, in forward link in multi-beam satellite systems with dense frequency reuse. The classic overlay coding scheme, uses the strongest co- channel interference (CCI) as extra source of information. The data intended for the target user is shared between...
Anti-jamming is an important capability for satellite communication (SATCOM) systems, when critical communication links may need to be maintained in hostile environments with smart jammers trying to disrupt the communications. The protection of SATCOM links from intended radio frequency interference (RFI) is a complex task. Anti-jamming (AJ) can be done in multiple domains: space, time, frequency,...
In this paper, we investigate the physical-layer network coding (PNC) scheme based on successive interference cancellation (SIC) in multi-way relay channels (MWRC). We consider a scenario where all users simultaneously transmit signals to the relay in the up-link stage while the relay broadcasts a coded message in the down-link stage. In order to extract the network codes from superimposed signals...
We present fully abstract encodings of the call-byname λ-calculus into HOcore, a minimal higher-order process calculus with no name restriction. We consider several equivalences on the λ-calculus side—normal-form bisimilarity, applicative bisimilarity, and contextual equivalence—that we internalize into abstract machines in order to prove full abstraction.
This paper discusses the contemporary problem of providing multiple-access (MAC) to a massive number of uncoordinated users. First, we define a random-access code for Ka-user Gaussian MAC to be a collection of norm-constrained vectors such that the noisy sum of any Ka of them can be decoded with a given (suitably defined) probability of error. An achievability bound for such codes is proposed and...
A general inner bound is given for the discrete memoryless broadcast channel with an arbitrary number of users and general message sets, a setting that accounts for the most general form of concurrent groupcasting, with up to exponentially many messages intended for any set of subsets of receivers. Achievability is based on superposition coding and rate-splitting, where each receiver jointly decodes...
This paper investigates the Gaussian state-dependent Z-interference channel (Z-IC), in which two receivers are corrupted respectively by two correlated states that are noncausally known to transmitters and unknown to receivers. Three interference regimes are studied, and the capacity region or sum capacity boundary is characterized either fully or partially under various channel parameters. The impact...
In distributed storage, erasure codes are widely used to provide data reliability, where every codeword symbol corresponds to one storage node. The network traffic cost during the repair of node failures, called repair bandwidth, is an important metric in code design. In particular, minimum storage regenerating (MSR) codes are maximum distance separable (MDS) codes that have optimal repair bandwidth...
In the fifth generation wireless networks, the heterogeneous deployment of ultra-dense small cells such as femtocells is seen as a major solution to cope with the exponential traffic growth and to improve coverage especially in indoor environments. However, the unplanned and ultra-dense deployment of femtocells in the coverage area of conventional macrocells introduces new challenges such as cross-tier...
In this work, it is studied the performance of a scheduling algorithm where the Mobile Terminals (MTs) may be turned off if they cause a level of interference greater than a given threshold. This approach, which is referred to as Interference Aware Muting (IAM), may be regarded as an interference-aware scheme that is aimed to reduce the level of interference. The performance of IAM is studied in terms...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.