The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a smooth way to include Network Coding in the Constrained Application Protocol (CoAP) for large resource transmissions. Devices in the Internet of Things usually communicate using short messages with little data. In some cases, for example, requesting firmware updates, bigger resources need to be transferred. CoAP's recently finalized blockwise transfer scheme can handle large...
Direct Current (DC) line balanced SpaceWire is attractive for a number of reasons. Firstly, a DC line balanced interface provides the ability to isolate the physical layer with either a transformer or capacitor to achieve higher common mode voltage rejection and/or the complete galvanic isolation in the case of a transformer. Secondly, it provides the possibility to reduce the number of conductors...
In this short paper, we propose a hybrid TCP PEP combined XOR coding with TCP Hybla on split PEP in satellite communication. To evaluate performance of the proposed protocol we set up a test bed of satellite communication network. As a result of performance evaluation of the proposed Hybrid TCP on split PEP, the file transmission speed improved more than 40% in high error rate environment. Therefore,...
Media-based Modulation (MBM), introduced by Khandani, is based on bearing part of information in the variations of transmission media. However, MBM combined with forward error correction (FEC) codes is limited to hard decision decoding in the literature, which causes a performance loss. In this paper, a novel scheme is proposed, called polar coded MBM (PCMBM), to provide a higher coding gain and better...
For physical-layer authentication, the authentication tags are often sent concurrently with messages without much bandwidth expansion. In this paper, we present a channel coding approach for physical-layer authentication. The generation of authentication tags can be formulated as an encoding process for an ensemble of codes, where the shared key between Alice and Bob is considered as the input and...
In this paper, we propose an in-band full duplex (IBFD) cellular operation with reconfigurable uplink (UL) antennas at base station (BS). For handling mobile station (MS)-to-MS interference in an IBFD cellular system, a repetition coding of UL MSs is considered. While the repetition coding of UL MSs is applied, downlink (DL) MSs can cancel MS-to-MS interference by using one silent symbol to measure...
Machine-to-machine communications (M2M) provide a promising solution for accurately collecting real-time status information of primary equipment in substations. However, the system quality of service (QoS) might be severely degraded by the high-amplitude impulsive noise produced by primary equipment. In this paper, we firstly propose a multi-antenna M2M communications based architecture for substation...
In wireless networks, determining the error bit positions within a packet at the receiver can improve the wireless retransmission efficiency in wireless communications. In this paper, we propose an Error Position Estimating Coding (EPEC) scheme based on Error Estimating Coding (EEC). Specifically, we divide data bits into several groups and indicate the group number individually to implement error...
Delay-insensitive (DI) codes are usually prone to transient faults occurring during an ongoing transmission. For most DI code words even a single transient can turn an incomplete transmission into a complete code word, which is different from the originally sent one. In this paper we therefore propose a novel two-step data encoding scheme that combines DI and error detecting codes. Our solution exploits...
Track circuits represent a viable solution for safety data transmission for train traffic, but they are more “demanding” in terms of maintenance. Equipment reliability and functioning stability had been improved by using new transmission technologies and data coding, but nonetheless, the transmission channel confines the audio band frequency and implicitly, the disturbance issues on this range remain...
Wireless communication technologies became the key integral part of modern systems, experiencing an explosive development during the last two decades and penetrating to enormous number of application areas, based especially on the concept of cellular phones. More recently, short-distance wireless communication has also been discussed as a way to connect embedded electronic systems in industrial applications,...
Today's internetworking globe is full of busy roads for transferring data. Challenges on sending or receiving various kinds of hidden data, messages or information especially using this public networks. Hackers took place to leak this surreptitious data. That's the reason behind the need of a cover media where the furtive message has been hiding our information securely. Steganography, one of the...
Orthogonal frequency coding is often used for surface acoustic wave (SAW) based systems. This paper presents the theoretical analysis of orthogonal frequency coding technique used with on-off keying in communications systems. The interference encountered in multiuser environment is formulated and a code selection criterion for minimizing the interference is proposed. The analytical expression for...
We consider a communication scenario in which the channel undergoes two different classes of attacks at the same time: a passive eavesdropper and an active jammer. This scenario is modeled by the concept of arbitrarily varying wiretap channels (AVWCs), in which the channel varies from one channel use to the other in an unknown and arbitrary manner. It has been shown that uncorrelated codes fail to...
Two polar coding schemes are proposed for the degraded broadcast channel under different reliability and secrecy requirements. In these settings, the transmitter wishes to send multiple messages to a set of legitimate receivers keeping them masked from a set of eavesdroppers, and individual channels are assumed to gradually degrade in such a way that each legitimate receiver has a better channel than...
Underwater acoustic sensor networks (UASNs) are widely used in many application. However, the underwater acoustic channel poses many challenges for reliable data transmission protocol design. In this paper, we propose a new data transmission protocol based on Fountain codes and Selective-repeat ARQ scheme (FSR-ARQ). The new approach utilizes the packet error correction ability of rateless code and...
In this paper, a cross-layered cooperative scheme is proposed in an interference channel with cooperation between transmitters leading to significant improvements in the cell-edge throughput. Considering the problem of resource allocation in a cooperative scenario, the two-step scheme was proposed: In PHY layer, a dirty paper coding based transmit scheme with private information sharing is proposed...
High-speed serial data communication is now very popular for connecting various resources in high-performance computing systems. In such high-speed serial links, a line coding is important to control the run length (RL) and the running disparity (RD), because a large run length causes insufficient transitions on data-links that make it difficult to perform reliable clock and data recovery (CDR), and...
Wireless communication technologies have experienced an explosive development during the last two decades, based on the concept of cellular phones. More recently, short-distance wireless communication has also been discussed as a way to connect embedded electronic systems in industrial applications. Such systems have to work under stringent real-time constraints. For industrial in-door environments,...
This paper shows that the slope at each corner point of the capacity region of the general broadcast channel coincides with that of the randomized time division (hence the Marton) inner bound and the Nair-El Gamal (as well as the Körner-Marton) outer bound. We then show that the optimal superposition coding inner bound by Bandemer, El Gamal, and Kim can be simplified to the convex closure of the union...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.