The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The full potential of multiple-input multiple-output (MIMO) wireless technology can be achieved through iterative MIMO decoding with soft information. In iterative MIMO decoder, the complexity can be major obstacle for practical implementation. The soft interference cancellation-minimum mean squared error (SIC-MMSE) approach for detection is considered as a feasible approach due to its complexity-performance...
RaptorQ is the most advanced raptor code and has an overhead-failure curve close to the random fountain code over the GF(256) finite field. Theoretically, it is possible to encode and decode with linear time complexity by an inactivation decoding algorithm, which is a hybrid algorithm of belief propagation and Gaussian elimination. However, achieving linear time complexity in a real-world implementation...
This paper presents a solution for establishing communication with Icecast and Shoutcast audio broadcasting servers. Web radio station is implemented, which means that is possible to broadcast an audio content from the local computer through Shoutcast and Icecast servers. Also, audio player is implemented for both local files, as well as web radio using FFmpeg libraries for audio package manipulation...
This paper investigates the energy harvesting fading multiple-access channels, where the transmitters harvest random amounts of energy from the environment and the data transmissions are subject to statistical quality of service (QoS) constraints in the form of limitations on the buffer overflow probability. With the assumption that the channel state information (CSI) and harvested energy in all time...
In this paper, we study the tradeoff of efficiency and delay of Slepian-Wolf distributed source coding (DSC). In the considered network, Machine-Type Communications (MTC) devices transmit correlated data to one base station, the data sources follow a multi-variate Gaussian distribution. To reduce the consumption of communication resources by massive MTC devices, Slepian-Wolf coding is adopted to eliminate...
Interference alignment (IA) is a prospective method to manage interference between users in multi-user networks. On the other hand, jamming can be an effective way to combat adversarial eavesdropping for legitimate networks. In this paper, a beneficial jamming scheme is proposed for interference alignment networks. In the scheme, the jammer utilizes its precoding vector to constrain the jamming signal...
In recent years, numbers of non-orthogonal multiple access (NOMA) schemes have been proposed to support the great amounts of wireless connections. However, complex multi-user detection is needed in case that the user power differentiation is not available and simple successive interference cancellation cannot directly apply, which usually incurs unaffordable computational complexity. In this paper,...
Sparse-code multiple-access (SCMA) is a novel multiplexing method to increase the capacity of wireless communication systems. By giving users non-orthogonal codebook with few non-zero entries, the SCMA approach can highly improve the spectral efficiency, compared with traditional orthogonal ones such as CDMA, with tolerable detection complexity. Therefore, it has been considered as an option for 5G...
Massive machine type communication (mMTC) is one of the three significant scenarios in 5G, which is characterized by massive connection and low energy consumption. To meet these requirements, the contention based grant-free sparse code multiple access (SCMA) transmission which can support a large number of devices and reduce the cost of signaling overhead caused by massive connection is proposed....
In this paper, we propose a systematic design approach of polar codes for multicolor visible light communication (VLC). Owing to the mixed ratio of multicolor light intensities and the interference between different colors, the channel polarization over a multicolor VLC system is markedly different from that over a uniform channel. Our scheme quantifies these different color channels and constructs...
This paper presents the joint design of network coding and backpressure algorithm for cognitive radio networks and its implementation with software-defined radios (SDRs) in a high fidelity network emulation testbed. The backpressure algorithm is known to provide throughput optimal solutions to joint routing and scheduling for dynamic packet traffic. This solution applies to cognitive radio networks...
We propose an underlay decode-and-forward cognitive (UDFC) scheme under joint effects of hardware impairments at secondary users and interference constraints at multi primary receivers. In this scheme, the transmit powers of a source node and relays are constrained by interference thresholds of primary receivers in which the best relay is selected has the highest decoding capacity from the source...
In this paper, compact memory strategies for partially parallel Quasi-cyclic LDPC (QC-LDPC) decoder architecture are proposed. By compacting several adjacent rows hard decisions and extrinsic messages into one memory entry, which not only reduces the number of memory banks for hard decisions, but also facilitates multiple data accesses per clock cycle, the throughput of the decoder is increased. We...
On the basis of general pivot method for paraphrase extraction which might introduce much noise in extracted paraphrases, this paper proposes a syntactic knowledge-enhanced method to extract higher-quality paraphrases to further improve the quality of statistical machine translation. Firstly, the syntactic knowledge is acquired and added to paraphrase extraction algorithm as constraints to obtain...
Current approaches to video forecasting attempt to generate videos directly in pixel space using Generative Adversarial Networks (GANs) or Variational Autoencoders (VAEs). However, since these approaches try to model all the structure and scene dynamics at once, in unconstrained settings they often generate uninterpretable results. Our insight is that forecasting needs to be done first at a higher...
To compress large datasets of high-dimensional descriptors, modern quantization schemes learn multiple codebooks and then represent individual descriptors as combinations of codewords. Once the codebooks are learned, these schemes encode descriptors independently. In contrast to that, we present a new coding scheme that arranges dataset descriptors into a set of arborescence graphs, and then encodes...
Mobile phone front-end and baseband modules are hard to obtain on the market for end customers. Thus, software defined radios are widely used in research and development, enabling many opportunities for digital signal processing. In this publication a novel option to receive GSM signals is suggested by using an ultra-low power Sub-GHz transceiver in a legacy mode. The device outputs raw demodulated...
We study the secure storage of the output of a data source on a public database. We consider a rather large class of data sources. In order to prevent unauthorized users from learning the output of the data source we make use of the output of a biometric source or a physical unclonable function (PUF). As we regard the output of the PUF source as a resource, we are interested in the smallest possible...
Virtual reality applications make use of 360-degree panoramic or omnidirectional video with high resolution and high frame rate in order to create the immersive experience to the user. The user views only a portion of the captured 360-degree scene at each time instant, hence streaming the whole omnidirectional video in highest quality is not efficient. In order to alleviate the problem of bandwidth...
We consider polar coded BPSK receiver performance improvement based on the concepts of channel log-likelihood ratio (LLR) approximation and the maximum achievable transmission rate on fading channel. Based on symmetry condition of random variables, uniform scaling factors are applied to correct soft messages at the absence of channel state information (CSI) at the receiver side. The searching method...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.