The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes a localization method for an IR-UWB (Impulse Radio Ultra Wideband) two-way ranging system developed for precise time-of-arrival measurements. The ranging system provides a time resolution of 275 ps, which allows precise indoor distance estimation with the accuracy of 4 cm. In this work, a two-way ranging algorithm has been extended into a localization algorithm without the need...
Modern digital systems become more complex with increasing multi-clocking techniques for better performance. Multiple asynchronous clock domains have been using for different I/O interface in today's modern system on chip (SoC). Each system needs to communicate with one or other system/peripherals continuously. These multiple asynchronous clock domains are facing meta-stability, data losses and other...
We present a novel class of adaptive algorithms for the blind separation of non-Gaussian mutually independent source signals that can be modeled as independent identically distributed (i.i.d.) discrete random processes. The signals are assumed to be transmitted through a mxp narrow-band (instantaneous linear mixture) channel. The original algorithm, called the Multi-User Kur-tosis (MUK) algorithm...
Interleave division multiple access (IDMA) is a Non-Orthogonal Multiple Access (NOMA) technique regarded as an enabling technology for next generation wireless systems. IDMA can improve the system efficiency by supporting multiple access for a large number of stations. For high spectral efficiency transmission in IDMA, previous works proposed systems in the context of Superposition Coded Modulation...
In cognitive radio (CR), white space devices (WSDs) need to have the knowledge of spectrum occupancy in TV white space (TVWS) before dynamic access. There are two common schemes proposed to achieve this: 1) geo-location database and 2) spectrum sensing. In geo-location database, calculating digital terrestrial television (DTT) location probability and maximum permitted power in each channel in an...
A secure audio steganography technique is introduced in this paper. Here modulo operator is used for hiding target string. The embedding as well as extracting process is of two steps which provides more robustness in this method. During preprocessing the hexadecimal equivalent of target string is calculated by taking four bits at a time. That increases capacity of cover media. Modulo operator is used...
This work exploits the benefits of adaptive downtilt and vertical sectorization schemes for Long Term Evolution Advanced (LTE-A) networks equipped with active antenna systems (AAS). We highlight how the additional control in the elevation domain (via AAS) enables use of adaptive downtilt and vertical sectorization techniques, thereby improving system spectrum efficiency. Our results, based on a full...
Programming Wireless Sensor Networks (WSNs) is a complex task for which existing approaches adopt rigid architectures that are only suitable for specific application fields. In previous papers we introduced a programming methodology and a lightweight middleware based on high-level programming and executable code exchange for distributed processing on WSNs. In this paper, we show how high-level programming...
Compressive sensing (CS) based techniques have been demonstrated to be suitable for UWB based applications to reduce the sampling rate required at the receiver. However, current CS based UWB positioning techniques require high-rate mixing operations to generate the PN sequence to achieve random mixing. This paper proposed a modified CS based implementation that employs relatively low-rate random pre-mixing...
In this paper, we have proposed an extended version of MPTCP with heterogeneous communication links to solve the out-of-order packet problem. We have confirmed that the proposed method can improve the end-to-end throughput performance up to 72.7% when RTTs of subflows are different. In addition, we have also confirmed that the proposed method does not affect the end-to-end throughput performance in...
Some unique attributes of P2P networks such as cost efficiency and scalability, contributed for the widespread adaptation of these networks. Since P2P applications are mostly used in file-sharing, preserving anonymity of users has become a very important subject for researchers. As a result, a lot of methods are suggested for P2P networks to preserve anonymity of users. Most of these methods, by relying...
E-commerce is gaining popularity day by day. Key attractions causing increased adoption of E-commerce are high availability, ubiquitous, reduced cost & time and efficiency. In today's changing world, technology is growing rapidly. One such growth can be cloud based solution for E-commerce. Software as a Service (SaaS) is one of the model of cloud computing. The proposed system is based on the...
High-latency anonymous communication systems prevent passive eavesdroppers from inferring communicating partners with certainty. However, disclosure attacks allow an adversary to recover users’ behavioral profiles when communications are persistent. Understanding how the system parameters affect the privacy of the users against such attacks is crucial. Earlier work in the area analyzes the performance...
We consider a confidential communication system in which a source sends a confidential information to the destination in the presence of an eavesdropper. Multiple relays are used to provide cooperative diversity to the destination. The destination and the eavesdropper are equipped with multiple antennas while each relay and source are equipped with single antenna. We are interested to protect the...
Wireless sensors are key to machine-to-machine communications and serve as the basis for realizing the Internet of Things. Spectral and energy efficiencies are key parameters that determine the usefulness of a sensor. In this paper, we consider the scenario where both information and power are sent through the same wireless medium to sensors. Each sensor independently decides to switch between information...
Recently several information theoretic communications investigations have focused on developing efficient ways to disrupt various wireless communications protocols. These include targeted jamming waveforms that intentionally target algorithms in the low layer PHY and MAC layer, which are more susceptible to certain observations than traditional jamming waveforms. In this effort we seek to demonstrate...
Modern Data Centers (DCs) host hundreds of thousands of servers running diverse applications and services. The variety of these applications mandates distinct requirements such as latency and throughput. The state-of-the-art TCP protocol fails to meet these requirements, rendering the design of efficient DC transport protocols an urgent need. Since UDP is the most popular protocol besides TCP, it...
Cooperative techniques in wireless mobile networks typically leverage short-range communication technologies, e.g., WiFi, to allow data exchange between devices forming a mobile cloud. These mobile clouds have been considered as a key to reduce the cost of multicast services for the network operators as well as a means to deliver a better quality to the users. In fact, LTE-A includes Device-to-Device...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.