The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a novel low power duobinary voltage mode transmitter in 90-nm CMOS process for wireline communication. As a matter of fact, voltage mode transmitters potentially save much more power than current mode transmitters. By adding a medium level, a half supply voltage, to conventional NRZ voltage mode transmitters, duobinary coding can simply be achieved. Post-layout simulation demonstrates...
Efficient resource utilization with a satisfying quality of service is the key to high capacity in flexible optical networks. In our work, this is achieved by supporting the resource allocation with the Gaussian noise model, which estimates the nonlinear physical-layer impairments. The study includes variable launch power, modulation formats, error-correcting code rates, and various new network features...
Superior spectral properties of Filter Bank Multi-Carrier (FBMC) techniques make them an interesting choice for future wireless systems. In order to directly apply well known pilot-symbol aided channel estimation in FBMC, however, the intrinsic imaginary interference has to be canceled. Such cancellation method is usually designed for a doubly-flat channel. In this paper, we investigate the effects...
In this paper, we address the need for motivating applications, such as mission critical industrial control and medical applications, to operate under the Ultra-Reliable Communication (URC) mode in the future 5th Generation (5G) cellular wireless networks, while also under strict Quality of Service (QoS) constraints such as ultra-low latency. Reliability has been shown to improve by using Hybrid Automatic...
We study the problem of constructing good spacetime codes for broadcasting K independent messages over a MIMO network to L users, where each user demands all the messages and already has a subset of messages as side information. As a first attempt, we consider the 2 × 2 case and propose golden-coded index coding by partitioning the golden codes into K subcodes, one for each message. The proposed scheme...
A concatenated coding scheme using a polarization transformation followed by outer sub-codes is analyzed. Achievable error exponents and upper bounds on the error rate are derived. The first bound is obtained using outer codes which are typical linear codes from the ensemble of parity check matrices whose elements are chosen independently and uniformly. As a byproduct of this bound, it determines...
In a Fog Radio Access Network (F-RAN) architecture, edge nodes (ENs), such as base stations, are equipped with limited-capacity caches, as well as with fronthaul links that can support given transmission rates from a cloud processor. Existing information-theoretic analyses of content delivery in F-RANs have focused on offline caching with separate content placement and delivery phases. In contrast,...
Owing to their capacity-achieving performance and low encoding and decoding complexity, polar codes have drawn much research interests recently. Successive cancellation decoding (SCD) and belief propagation decoding (BPD) are two common approaches for decoding polar codes. SCD is sequential in nature while BPD can run in parallel. Thus BPD is more attractive for low latency applications. However BPD...
In this work, it is studied the performance of a scheduling algorithm where the Mobile Terminals (MTs) may be turned off if they cause a level of interference greater than a given threshold. This approach, which is referred to as Interference Aware Muting (IAM), may be regarded as an interference-aware scheme that is aimed to reduce the level of interference. The performance of IAM is studied in terms...
Relay selection is a simple yet effective means to improve the reliability and coverage of wireless cooperative networks. However, it suffers from inefficient use of the available bandwidth resources. This paper introduces the use of content caching at relays in order to tackle this problem and improve the performance of relay selection. Three cache placement schemes are considered: one based on the...
This paper investigates the asymptotic performance of bit-interleaved coded modulation (BICM) with iterative multiuser detection and decoding in uplink sparse code multiple access (SCMA) systems. The extrinsic information transfer (EXIT) characteristics analysis of the joint multiuser detector for SCMA is provided, and shows that the average detection reliability for multiple users converges to the...
We address the problem of energy efficient power and bandwidth allocation for hybrid automatic repeat request (HARQ) in multiuser ad hoc networks with statistical channel state information (CSI) and practical modulation and coding schemes (MCS) under quality of service (QoS) constraints. Using an upper-bound of the packet error rate, we propose an algorithm to maximize the sum of the energy efficiency...
We consider a multiple access relay channel (MARC) network consisting of two sources, one relay, and one common destination applying compute-and-forward (CF) strategy. We show that the direct application of CF to the MARC network results in poor error performance bounded by (p + 1)−1, the probability of rank deficiency of the coefficient matrix over Fp. To solve this problem, we propose two practical...
As the analytic tools become more powerful, and more data are generated on a daily basis, the issue of data privacy arises. This leads to the study of the design of privacy-preserving machine learning algorithms. Given two objectives, namely, utility maximization and privacy-loss minimization, this work is based on two previously non-intersecting regimes — Compressive Privacy and multi-kernel method...
Polar code has become a major milestone in information theory field in recent times. Researchers are still observing more efficient encoding and decoding structures. In this study, a new WIB based structure is proposed which reduces the computational complexity of WIB introduced as an early termination method for BP polar decoder in literature. Both proposed and WIB methods are implemented with VHDL...
There is a growing concern regarding the design of decentralized control systems. Witsenhausen's counterexample is a well-known problem which has remained open in this context, and emphasizes the necessity of communication between blocks in a distributed control system. In this paper, we study an infinite vector model of this problem and a new bound for the cost function is derived. It is shown that...
In polarization optical time domain reflectometry (POTDR) system, the performance of polarimetric measurement is largely constrained by the low signal to noise ratio (SNR) due to the weak Rayleigh backscattering and the degradation of the degree of polarization (DOP) of signal light. It will be indispensable to improve the SNR without sacrificing the DOP of backscattered signal for a sufficient dynamic...
In order to solve the problem of frequency-hopping signal detection, an improved algorithm based on power spectrum elimination and pulse detection is proposed. Firstly, judge the signal type and estimate the width of signal with the hopping frequency by STFT and pulse detection. Then, eliminate the frequency-fixed signal interfere by suppressing the signal. Finally, judge the threshold to realize...
Polar codes are applied to bit-interleaved coded modulation system with iterative decoding (BIPCM-ID) system. To optimize the iterative decoding performance, conventional polar coding construction is modified by extrinsic information transfer (EXIT) chart methodology. Simulation results show that BIPCM-ID system based on the proposed technique can outperforms BIPCM over 16-ary quadrature-amplitude...
Aiming at the common radar signal, a fast recognition algorithm of intra-pulse modulation with low SNR is proposed. Firstly, the signal is filtered by FFT, and the instantaneous frequency is calculated by phase difference. Then, characters are extracted by peak detection, least squares linear estimation and second order phase difference. Finally, the combined parameters are used to realize rapid recognition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.