The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Accurate Speech endpoint detection is important for speaker recognition, speech recognition, coding, and transmission and so on. In this paper, a fusion feature is proposed for speech endpoint detection, which utilized zero-crossing rate, Lempel and Ziv complexity (LZC), C0 complexity and fluctuation complexity to represent the speech signal. In order to classify speech signal and background signal,...
Polar codes are a family of capacity-achieving error-correcting codes, and they have been selected as part of the next generation wireless communication standard. Each polar code bit-channel is assigned a reliability value, used to determine which bits transmit information and which parity. Relative reliabilities need to be known by both encoders and decoders: in case of multi-mode systems, where...
Low-density parity-check (LDPC) coded massive multiple-input and multiple-output (MIMO) scheme is getting increasingly popular and sophisticated in today's wireless communication systems, since it can highly improve the spectral efficiency, data rates, and error performance. In this paper, a novel iterative detection and decoding (IDD) method for LDPC-coded massive MIMO systems is proposed. Based...
Polar codes are a new candidates channel coding techniques for the 5th generation of wireless communication. It is due to their explicit construction with very low encoding and decoding complexity and also they are the first ever provably capacity achieving codes of symmetric binary discrete memoryless (SB-DMS) channel. The capacity-achieving performance of such codes is based on a new concept called...
This paper proposes a modified bit flipping algorithm and its weighted variants based on reliability derived from intrinsic information. Compared to other existing algorithms where extrinsic information based reliability was used in the flipping function, here intrinsic information based reliability is also equally considered. This algorithm only uses additions and subtractions to modify reliability...
Multiuser Detection (MUD) and Channel Estimation techniques in Space-Division Multiple Access aided Orthogonal Frequency Division Multiplexing (SDMA-OFDM) systems recently received intensive interest in receiver design technologies. The maximum likelihood (ML) MUD that provides optimal performance has the cost of a dramatically increased computational complexity. The minimum mean-squared error (MMSE)...
In this work, we show that polar belief propagation (BP) decoding exhibits an error floor behavior which is caused by clipping of the log-likelihood ratios (LLR). The error floor becomes more pronounced for clipping to smaller LLR-values. We introduce a single-value measure quantifying a “relative error floor”, showing, by exhaustive simulations for different lengths, that the error floor is mainly...
Although the base station processing and the majority of the protocols of the wireless systems are standardized by 3GPP, the receiver architecture and implementation remain vendor-dependent. The receiver design should fulfill computational efficiency requirements, and be evaluated in practical simulators or emulators that are compliant with real-world wireless standards. In this paper, we provide...
In discrete multitone (DMT) modulation systems, the channel duration can be longer than the cyclic prefix, yielding both inter-block and inter-carrier interference. In order to avoid these effects, time-domain equalization (TEQ) techniques are usually employed before DMT demodulation. This letter introduces a modification of the iterative minimum delay spread (MDS) method proposed by Lopez-Valcarce...
In this work, we propose a beam selection scheme that exploits the geometric sparsity of the multi-user (MU) massive multiple input and multiple output (MIMO) channel, using its beamspace representation. Assuming knowledge of the beamspace channel, the beamspace precoder consists in selecting and weighting the beams steered to the users, in order to maximize the signal-to-interference-and-noise ratio...
We experimentally demonstrate transmission of 20×50-Gb/s WDM PAM-4 channels over an 80-km uncompensated fiber link, based on reduced complexity DSP and hardware. BER values below pre-FEC limit of 3.8×10·3 are reported, validating the proposed architecture for low-cost, high-capacity short-reach connectivity.
In order to improve the error resistance and security of JPEG2000 standard, a joint source channel and security arithmetic coding/decoding scheme for EBCOT in JPEG2000 is proposed. Based on error resistant arithmetic coding, this scheme inserts multiple forbidden symbols and generates secure two-way decodable bitstream controlled by chaotic maps, improving the security of the scheme. Meanwhile, at...
Low power wide area network (LPWAN) receivers must first decide about the presence of a transmission in order to retrieve the information that was being sent by wireless sensor nodes. This is exacerbated by the use of modern coding techniques that are able operate at very low signal to noise ratio (SNR), and inaccuracies originating from the transmitter hardware. Several, mostly low complexity methods...
The classical stereophonic acoustic echo cancellation (SAEC) scheme requires the identification of four echo paths using the same number of adaptive algorithms. The SAEC setup can be reinterpreted by employing the widely linear (WL) model, which recasts the two-input/two-output system with real random variables as a single-input/single-output system with complex random variables. The WL model improves...
In contrast to the more prominent discrete-variable quantum key distribution (DV-QKD), which requires specialized hardware like single-photon detectors, the continuous-variable version (CV-QKD) promises low-cost and high-performance implementations by leveraging mature telecommunication technology. In this paper we demonstrate a simplified CV-QKD architecture based on analog frontends and digitizers...
The paper considers periodogram maximization-based frequency estimation of a single complex sinusoid. We propose to improve the accuracy of recently proposed methods based on three discrete Fourier transform (DFT) samples around the DFT maximum. For that purpose, a three-point parabolic interpolation of the periodogram peak is used. The proposed method requires the calculation of only two additional...
This paper proposes a modified IMWBF decoding algorithm for low-density parity-check (LDPC) codes. In the proposed modification, the magnitude of the received signal is updated when the number of the unsatisfied parity-check equations participated by this received signal is larger than a predetermined threshold. Through this modification, the outlier, defined as the undesired large-magnitude received...
Imperfect reconstructed filter bank multiple access (FBMA) for uplink transmission has been proposed recently which gets rid of real orthogonality in current filter bank multicarrier schemes. While it eases the filter design task and achieves better bit error rate (BER) performance than orthogonal frequency division multiple access (OFDMA), it still suffers from high peak-to-average power ratio (PAPR)...
In this paper, we investigate the relay selection (RS) problem in power splitting (PS) based energy- harvesting (EH) half-duplex (HD) relay networks, where the relays are wirelessly powered by harvesting a portion of the received RF signal power. We expand the relay selection problem in PSEH-HD relay networks to allow multiple relays to cooperate simultaneously. Furthermore, the optimal PS factor...
The adjacent cell interference (ACI) issue faced when applying multiple user superposition transmission (MUST) scheme to uplink transmission in cellular networks is considered in this article. To dealing with ACI we proposed a novel MUST scheme called interference fusion multiple access (IFMA). In our scheme transmission rate of superimposed ACI is reduced via compute-and-forward framework. As a result...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.