The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Underwater acoustic sensor networks are characterized by limited transmit power and bandwidth, and a harsh communication environment. Different techniques for reliable communication in underwater networks have been studied in the literature at different layers of the network protocol stack. Among these, the use of fountain codes as a way for improving the quality of the communication over a highly...
One Dimensional (1D) Double Weight (DW) code families are one of the coding schemes reported for Spectral Amplitude Coding — Optical Code Division Multiple Access systems. Modified Double Weight code and Enhanced Double Weight code are two algorithms which increase the scope of DW code for even and odd weights respectively. By using above mentioned codes, two Dimensional (2D) codes are generated....
A power- and area-efficient Low Voltage Differential Signaling (LVDS) AC coupled receiver for short links is presented. The receiver accommodates the wide LVDS common-mode range without requiring large, board-mounted AC coupling capacitors or a slow, rail-to-rail input stage. Instead, a small, on-chip coupling capacitance generates a pseudo return-to-zero (RZ) pulse that is latched into the receiver...
Encryption is often not sufficient to secure communication, since it does not hide that communication takes place or who is communicating with whom. Covert channels hide the very existence of communication enabling individuals to communicate secretly. Previous work proposed a covert channel hidden inside multi-player first person shooter online game traffic (FPSCC). FPSCC has a low bit rate, but it...
To satisfy the requirements of complex distributed power electronic system (PES) communication, this paper has proposed a single optic-fiber link data communication protocol based on the Manchester code due to an vacancy in the commonly-adopted protocols, analyzed the encoding and decoding principle of Manchester code, defined the formats of command frame and data frame, calculated the communication...
In this paper we propose a scheme that unconditional secure transmission is used to implement information reconciliation in key generation. Unconditional secure transmission achieved by associating MIMO beamforming with security code can be safe and reliable. Theoretically, the reconciliation and privacy amplification phase can take advantage of the unconditional communication security to reconciling...
We consider a communication problem in which a transmitter encodes a source into several streams that are subject to modification by an omniscient adversary while en route. We design encodings with a distortion guarantee that degrades gradually as the number of streams that the adversary alters increases. Notably, we find that a mixture of highly redundant coding and uncoded transmission outperforms...
Efficient and robust wireless video delivery is an enabling technology for various applications. The existing wireless video transmission scheme has the cliff effect and it cann't gracefully adapt to channel variations. In this paper, we introduce a pseudo-analog wireless video transmission improvements and design in the hardware. Comparing with the traditional transmission, the linear processing...
NarrowBand Waveforms (NBWF) are often used in VHF or UHF tactical communications. For these kinds of waveforms, low latency and robust data rates result in short codeword lengths that are challenging in terms of channel coding. Usually, serially concatenated convolutional code and continuous phase modulation (CC-CPM) schemes are considered in the context of NBWF. When evaluating the achievable rates,...
This paper addresses the problem of single-cell point-to-multipoint communications. We consider a base station that needs to transmit a common information to a group of users. We propose a layered Wyner-Ziv coding (WZC) scheme based on nested lattice quantization. In our scheme, we use the base layer generated by a standard coder as the decoders side information. Then, WZC is performed for quality...
This paper considers the layered transmission between the source and the destination over two relays using super-position coding (SC). In this two-hop decode-and-forward (DF) relaying system, because of the network topology, the receiver continuously decodes only the base layer of the direct transmission from the source; the enhancement layer is decoded with a delay based on the transmission from...
The Gaussian fading channel is studied, in which the channel from the transmitter to the receiver is corrupted by a multiplicative fading coefficient H and an additive Gaussian random noise. It is assumed that the channel is experiencing block fading, and the transmitter does not know the channel state information (CSI). The receiver is assumed to have full knowledge of the CSI. If the channel state...
We investigate the problem of index coding, where a sender transmits distinct packets over a shared link to multiple users with side information. The aim is to find an encoding scheme (linear combinations) to minimize the number of transmitted packets, while providing each user with sufficient amount of data for the recovery of the desired parts. It has been shown that finding the optimal linear index...
We define a multiaccess communication scheme that effectively eliminates interference and resolves collisions in many-to-one and many-to-many communication scenarios. Each transmitter is uniquely identified by a coding vector. Using these vectors, all signals issued from a specific transmitter will be aligned along a unique dimension at all receivers hearing this transmission. This dimension is characteristic...
The broadband high speed digital signals may affect nearby wireless communication devices and cause significant electromagnetic interference (EMI) problem. Common solutions, such as shielding or layout improvement, usually focus on the coupling path control. This paper presents a new coding method compatible with 8b/10b to reduce EMI at the source. The coding uses the control-symbol K29.7 in 8b/10b...
The RTCA DO-260B document has stimulated since a few years ago the adoption of novel algorithms to improve the ability of receivers to detect and decode ADS-B signals, with particular emphasis on preamble detection, declaration of bit state and confidence level, detection and correction of errors. Motivated by an industry-driven project, this paper reports on performance analysis of a set of enhanced...
We investigate secure communication over a channel under two different classes of attacks at the same time: a passive eavesdropper and an active jammer. This scenario is perfectly modeled by the concept of arbitrarily varying wiretap channels (AVWCs). It has been shown that uncorrelated codes are not always capable of overcoming the various jamming attacks. On the other hand, correlated random codes...
As a specific example of network coding, the butterfly network often represents the networks with bottlenecks. In this paper, we propose a typical butterfly quantum network coding scheme based on remote state preparation of arbitrary two-qubit states with the assistance of GHZ channels. Firstly, in a butterfly network, each source node simultaneously performs two appropriate projective measurements...
We propose the use of differential code shift keying (DCSK) for a symbol rate adaptive low-complexity DSP algorithm by eliminating adaptive-equalizer (AEQ) with limited influence on circuit size. As a proof of concept, a 300km transmission using DCSK format was demonstrated without using AEQ.
In this paper, we propose, design, and evaluate the use of transmitters mapping with a symbols encoding techniques to mitigate inter-symbol interference (ISI) and improve the overall VLC system performance while using a very simple receiver (single element wide field of view, (FOV)) with an OOK modulation scheme. The proposed technique with the laser diodes transmitters are able to provide data rates...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.