The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Classically encoding a group of symbols to be transmitted over a communication channel through baseband modulation can be done in various ways-namely Pulse Amplitude Modulation (PAM), Pulse Width Modulation (PWM), Pulse position modulation (PPM) etc. What we will be proposing in this paper is another encoding technique- mapping a symbol to a wave shape and transmitting that along a baseband channel...
This paper presents a mixed integer linear programming (MILP) model for the daily planning of home health care (HHC) services provided by the crew of HHC firms. The model takes into account the time window of patients, compatibility requirements, workload limits of staff and distance of patients. The quantitative values of these parameters along with the similarity or difference within the values...
Convergecast, the process of data collection from set of sensor nodes and forwards to the sink node over a tree based topology is a fundamental traffic pattern in Wireless Sensor Networks(WSN). Time Division Multiple Acess(TDMA) protocol is considered for scheduling, where time is divided into slots. The main aim of this paper is to reduce the number of time slots (scheduling length) using different...
The Wireless sensor networks (WSN) is functional in various environments namely surveillance of forest, earth quake monitoring, medical applications etc. This paper tackles with the problem of WSNs with detection of the target with dynamic considerations and random deployment of node. The proposed work explains initial environments of Energy Efficient Distributed Receiver Based Routing Protocol (EEDR)...
This paper describes a novel technique for radar imaging of space objects. The approach is founded on using a small satellite near the target of interest as the receive end of a high-power ground-based radar transmitter for imaging. The small satellite is equipped with an open loop receiver for sampling and processing the observed wideband signal and a GPS receiver for orbit determination. It also...
Dynamic Index coding as a generalization of the traditional index coding problem, deals with transmission of some dynamic data flows in the presence of side information. For a dynamic index coding system, the set of average flow rates for which the system can be stable is named Code-Constraint Capacity region. In this paper, we identify the code-constraint capacity region for a dynamic index coding...
One of the foremost challenges in modulation scheme for molecular communication is positivity of the transmission signal (only a positive concentration of molecules can be released in the environment). This restriction makes handling of the InterSymbol Interference (ISI) a challenge for molecular communication. In this paper, a novel modulation is proposed which introduces use of negative signals...
The two-user discrete memoryless cognitive multiple-access channel with confidential messages (DM-CMAC-CM) has been studied in the literature with a result for the secrecy capacity region. In this paper, we study a more general and practical model (three-user DM-CMAC-CM), although similar generalizations have been intractable in some studied cases, and obtain a capacity-equivocation and secrecy capacity...
The two-user discrete memoryless cognitive multiple-access channel with confidential messages (DM-CMAC-CM) has been studied in the literature with a result for the secrecy capacity region. In this paper, we study a more general and practical model (three-user DM-CMAC-CM), although similar generalizations have been intractable in some studied cases, and obtain a capacity-equivocation and secrecy capacity...
In this paper, we propose a multilevel lattice construction, employing binary Reed-Muller codes, for the Rayleigh block fading channel. The construction is performed on a binary two-dimensional lattice partition chain, and Reed-Muller codes are chosen according to capacity rule. The lattice construction based on number-theoretical concepts is explained, and the system's performance is shown for various...
The process of distributing information in a secured way is called Secured Communication. Secured information involves Encryption procedure at the sender side and Decryption process at the receiver side of the communication system. Many Ciphers have been developed to provide data guard. The effectiveness of the Ciphers that are being used depends mainly on their throughput and memory constraint. The...
Transferring confidential data is a real challenge and is the need of the hour. Steganography deals with concealing secret message in the image whereas cryptography is about altering the message into a distorted form, so that it is prevented from unauthorized access. Combining both the steganographic and cryptographic techniques will yield a secure and sophisticated system for exchanging the secret...
This paper analyses a multi-output half-wave semi-synchronous rectifier (SSR) by using a uniform field transmitter. The presented multi-output half-wave rectifier topology is achieved by replacing half-wave rectifier lower diode with a synchronous switch and regulation by a phase-shifted PWM signal. The front end transmitter is intended to generate uniform magnetic fields over the coil area. To confirm...
We consider the problem of distance, or range, estimation by measuring the phase of a sinusoidal signal transmitted between two locations. The distance can only be unambiguously measured if it is contained in an interval of length less than the wavelength of the signal. To increase the length of this interval, multiple phase measurements at different wavelengths can be used. The identifiable range...
In this paper, a faster-than-Nyquist (FTN) based spatial modulation-multi-input multi-output (SM-MIMO) scheme is proposed to improve the channel capacity. The maximum throughput of the proposed scheme is up to twice that of the SM-MIMO scheme. It is also robust in the correlated channel environments. The proposed scheme is suitable to transmit high quality multimedia contents for UHDTV.
In this paper we consider a diffusion based molecular communication network. The information is encoded in the concentration of the signalling molecules at the transmitter end. At receiver end these signalling molecules react with a set of chemical reactions referred as a receiver molecular circuit to produce output molecules. In this work we employ a reversible conversion (RC) type receiver molecular...
Multipath-induced dispersion is one of the major concerns for complex indoor environments affecting the positioning accuracy. This paper investigates the impact of multipath reflections numerically on the VLC positioning systems. Power distribution is first calculated, then the positioning accuracy in terms of root mean square (RMS) error is analyzed.
The problem of optimal likelihood based modulation classification (MC) for optimal detection in 2×2 multiuser MIMO (MU-MIMO) receivers is considered. The optimal Log-MAP classifier is computationally exhaustive, and its sub-optimal Max-Log-MAP version poses remarkable degradation in performance. Between these two extremes, we propose four computationally efficient methods for MC, by taking special...
Today's Information Technology grows rapidly with new technologies and need more security for the data transmission over the internet. Steganography is one of the solutions to ensure the data secure over the internet. An audio steganography is a method to transfer concealed information by changing the cover audio file without degrading the quality of the original file. The cover medium before steganography...
We study the impact of signal reflections in enclosed wireless networks of wearable devices operating at mmWave frequencies. Given the radical blockage by obstacles and people (including the user's own body) at these frequencies, surface reflections are expected to be very important contributors to the collection of an adequate amount of desired signal power. At the same time, they are also expected...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.