The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper explores the possibilities of Layered Division Multiplexing (LDM), a non-orthogonal multiplexing technique, for its application in Narrow Band Power Line Communications (NB-PLC). Both theoretical calculations and simulation results are included based on PoweRline Intelligent Metering Evolution (PRIME) in CENELEC A-band. However, improvements presented in the paper can be directly applied...
The article describes the authors' experience in results processing of quality characteristics measurements of signal of Digital Radio Mondiale standard (robustness mode E) during field trials in the experimental broadcasting area, organized in Saint-Petersburg.
This work presents a model of the G3-PLC physical (PHY) layer tailored for network simulations. It allows simulating frequency selective channels with non-stationary colored noise. Collisions with other frames are modeled taking into account the length and the power of the interfering frames. Frame errors are estimated using the effective signal-to-interference-and-noise ratio mapping (ESM) function...
In this paper, the impact of an uncorrected sampling frequency offset (SFO) on the frame error rate (FER) of a PRIME 1.4 system is studied. It is also discussed the need of new algorithms to estimate and correct that SFO or to adopt more simpler strategies that mitigate somehow this problem, like applying in the receiver a shift to the fast-Fourier transform window towards the cyclic prefix part of...
LSB techniques generally embed data in the same LSB position of consecutive samples which helps intruders to extract secret information easily. This paper solve this problem by introducing a robust audio steganography technique where data is embedded in multiple layers of LSB chosen randomly and in non-consecutive samples. The choice of random LSB layers and non-consecutive pixels for embedding increases...
Steganography is being used to communicate confidential pieces of information across covert channels as it is less prone to attacks than conventional cryptography methods. It is increasingly used for images or audio files. Least Significant Bit modification is most popular method for steganography through audio files. However, it is open to steganalysis. In this paper, a novel Secured LSB Modification...
Most of the turbo decoding stopping criteria assume perfect channel reliability available at the receiver since they require a threshold based on signal-to-noise ratio (SNR) information. However, operational environments can vary according to frame sizes, code structures and channel reliability requirements, further aggravating the difficulty in threshold determination and convergence or non-convergence...
We consider the robust PCA problem of recovering a low-rank matrix corrupted by Gaussian noise and large elementlevel outliers. Motivated by the sparse estimation literature, we consider outlier rejection schemes that apply hard or soft thresholding, respectively, to the elements of the data matrix to efficiently estimate the sparse component and then apply an SVD on the residual matrix to estimate...
Single Input Multiple Output (SIMO) Blind Channel Identification (BCI) using Subspace-based Methods, notably the Cross-Relations (CR) and Noise-Subspace (SS) Methods, are sensitive to selection of the channel order. Previous work on model order selection shows that at low SNR, accurate selection is not always possible, and in some cases, there is difficulty obtaining good estimates using any order...
This paper considers the physical-layer secrecy design for full-duplex (FD) bidirectional communications in the presence of an eavesdropper (Eve). The goal of this work is to maximize the sum secrecy rate (SSR) of the bidirectional transmissions via appropriately designing the transmit covariance matrices at the legitimate nodes. To this end, we propose an alternating difference-of-concave (ADC) approach...
This paper studies a robust beamforming optimization problem of minimizing total transmit power in a distributed manner in the presence of imperfect channel state information (CSI) in multicell interference networks. Due to the fact that worst- case is a rare occurrence in practical network, this problem is constrained to satisfying a set of signal-to-interference-plus-noise-ratio (SINR) requirements...
This paper addresses the problem of maximizing the weighted signal-to-interference-plus-noise-ratio (SINR) targets at user terminals in a distributed manner in multicell interference networks. The optimization is constrained to strict individual base station (BS) transmit power limitations in the presence of imperfect channel state information (CSI). This problem is numerically intractable due to...
In this paper, we study resource allocation for secondary users (SUs) in underlay full-duplex cognitive networks, where the channel state information of the links between SUs and primary users (PUs) is uncertain. To protect the transmission of the PUs from interference generated by the SUs, we utilize robust optimization theory to characterize the channel uncertainty and formulate a resource allocation...
Robust adaptive beamforming (RAB) has became a popular research topic, with various RAB techniques being proposed in the past decades. However, because the sample covariance matrix rather than the interference-plus-noise co-variance matrix is used to calculate the weight vector, the performance of the previously developed RAB techniques is not optimal. In this paper, a novel RAB algorithm, which uses...
The existing adaptive beamforming techniques developed for underwater sensor array usually suffer from significant performance degradation due to the mismatch between the presumed and actual steering vectors. In this paper, a novel convex optimization based robust adaptive beamforming algorithm is proposed. First, the steering vector corresponding to the desired signal is estimated by solving a convex...
Consensus-based algorithms are a welcome approach to establish cooperative communication systems. In this work, it has been utilized to present a hardware architecture for distributed data detection in a receiver with several sensor nodes on an easily scalable regular network. Additionally, it is capable to detect the transmitted message even if a single sensor node fails to operate. On top of that,...
In this paper, we introduce a procedure for the null broadening algorithm design with respect to the perturbation of the interference location. This method is based on maximizing the array output signal-to-interference-plus-noise-ratio (SINR) subject to quadratic constraints. The design problem can be cast as a fractional quadratically constrained quadratic programming (QCQP) problem that can be solved...
Voice activity detector (VAD) is used to detect the presence or absence of human voice in a signal. A robust VAD algorithm is essential to distinguish human voice in a noisy acoustic signal. There were many recent works in development of robust VAD which focus on unsupervised features extraction such as temporal variation, signal-to-noise ratio in [1] and etc. However, these methods are typically...
With the advancement and use of low cost cameras, video-based remote vital-monitoring technologies have drawn more and more attention. However, many of the previously proposed techniques rely on the assumption that the video is acquired under well-controlled conditions. There has been no study reported around how various acquisition factors and/or noise will affect the estimation accuracy. In this...
Methods based on pattern recognition such as support vector machine or neural network, can overcome the deficiency of traditional sound source localization algorithms which have an insufficient robust ability in the harsh environment of small SNR and severe reverberation. Among those methods, Naive-Bayes classifier has a high accuracy to locate sound source with a small amount of calculation and strong...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.