The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we develop a discrete and distributed optimization framework that maximizes the overall spectral efficiency of heterogeneous networks while ensuring a minimum fairness among users. We split the problem into two subproblems: the first one is handled by the users and consists in a transmission by each user of a minimum rate requirement to the base stations and the second is the resource...
In this paper, we present a new robust scheme for use in asynchronous cooperative networks over frequency-selective channels through using three and four relay nodes. Based on extended orthogonal space-time block coding (EO-STBC), we have presented a direct quantized feedback approach that can achieve full cooperative diversity and array gain with unity code rate over each hop. In this scheme, we...
Opportunistic interference management (OIM) is an approach that can asymptotically achieve dirty paper coding (DPC) capacity in the downlink of wireless cellular networks with minimum feedback requirement. With K antennas at the base station and M mobile users in the cell, the proposed technique requires only K integer numbers related to channel state information (CSI). This multiplexing gain of K...
In this paper, we investigate the performance and the design of Joint Source-Channel Decoding (JSCD) schemes involving structured Low-Density Parity-Check (LDPC) codes such as protograph based codes. We first present the asymptotic analysis of such iterative receivers based on multi-dimensional EXIT charts. Since a protograph can be interpreted as different encoding schemes, the information mapping...
Alamouti code with differential encoding has been recently proposed for OFDM systems. It allows full-rate and full-diversity communication and can be decoded with a linear complexity when using two transmit and one receive antennas. However, these advantages assume no interbloc interference (IBI) and no intersymbol interference (ISI) which occur only if the Guard Interval (GI) size is larger than...
Network Coding over wireless networks can provide considerable throughput increase with respect to traditional cooperative relaying strategies at no loss of diversity gain. In this paper, a novel cooperation protocol is developed based on adaptive complex-field wireless network coding. Sources transmit new information symbols linearly combined with symbols previously-estimated from other sources,...
For a downlink scenario with two base stations and one receiving mobile, where the base stations are connected by a noiseless finite-capacity backbone, we determine the optimal cooperation and coding strategy. The performance is not influenced by the degree of channel state information at the mobile, but it increases with increasing channel state information at the base stations. If the link capacities...
In previous works on two-relay two-hop asynchronous cooperative networks we showed that, based on outage probability derivation, sending the same information frame by the two relays with a relative delay ensures a diversity order of two. In this paper, we propose a new practical asynchronous distributed coding scheme. This code performs a combination of the symbols with constellation rotation and...
Matrix embedding has been used to improve the embedding efficiency of steganography, which is an efficient method to enhance the concealment security. The privacy security of matrix embedding has also been studied under the condition of known-stego-object attack. However, with the development of steganalysis, the attacker could obtain the estimated cover by the cover restoration technique. Consequently,...
This paper presents one-bit cell supporting input voltage to synthesize triangular-like DC transfer characteristic and digital output of Gray-code algorithmic analog-to-digital converter. The proposed one-bit cell is based on the use of operational conveyors in connection with resistors, diodes, and voltage comparator. An N-bit resolution can be simply realized by cascading the N proposed one-bit...
An information hiding method on escape sequences of Huffman coding which can embed a great deal of secret information into AAC files is proposed based on the research of AAC coding standard. The proposed algorithm first unpacks the cover AAC file to search for the escape sequences, and then modifies least significant bit (LSB) of the escape sequences with the approach of matrix encoding, to improve...
Video streaming is challenging in wireless networks due to the high loss rate and limited bandwidth. In video sequences, different part has different importance for reconstruction. Based on H.264 error resilient tool of datapartitioning, we apply UEP (Unequal Error Protection) to different data partitions. RS (Reed Solomon) coding is used for data partition A, whereas simple repeat-packet coding for...
With the rapid development of video streaming era, multipath video streaming comes as a promising solution. However, dividing the video into different sub-streams is still considered as an important challenge for researchers. In this paper, we propose an approach for generating multiple complementary descriptions of the video flow, then to couple these descriptions with the path diversity provided...
In this paper, we present a class of LT codes with a novel degree distribution that is distinct from the degree distribution previously described by Luby. We show that with high probability the total size of the packets needed for decoding of these new LT codes is close to the original size of the file. Furthermore, the encoding and decoding complexity of LT codes with this new degree distribution...
In this paper, we present a fast biological data mining algorithm named IRTM based on embedded frequent subtree. We also advance a string encoding method for representing the trees, a scope-list for extending all substrings and some pruning rules which can further reduce the computational time and space cost. Experimental results show that IRTM algorithm can achieve significantly performance improvement...
A robust software watermarking scheme under which the watermark can resist against various attacks including collusion attacks is proposed based on obfuscated interpretation. The obfuscated interpretation technique can not only hide the functionality of a given program, but also provide an alternative simple way to modify the code. Thus in the proposed scheme translation rules defined in obfuscated...
The mobile robot which accomplishes a work in explored region does not know location information of surroundings. Traditionally, simultaneous localization and mapping(SLAM) algorithms solve the localization and mapping problem in explored regions. Among the several SLAM algorithms, the EKF (Extended Kalman Filter) based SLAM is the scheme most widely used. The EKF is the optimal sensor fusion method...
Regional comprehensive corridor takes on the characteristics of heavy transport demand and supply, and consists of many travel modes; meanwhile, competition is severe among different trip modes. In order to avoid vicious competition so that transportation market is disturbed, multi-objective and nonlinear programming model is built up, which is based on the maximization of unity of traveler. The objective...
Note that network coding allows immediate nodes to mix information from different data flows. On the basis of this observation, we prove that under suitable conditions, communicators can communicate with perfect secrecy over wiretap networks. Our method of secure communication over wiretap networks without keys is fundamentally distinct from cryptographic means. Furthermore, a linear network code...
The need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for watermarking, and provide desirable properties of a watermarking system for relational data. Proving ownership rights on outsourced relational databases is a crucial issue in today's Internet-based application environments and in many content distribution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.