The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Physical Layer Security (PLS) technology has been proved to be an effective way to reduce information leakage in wireless communication networks. This paper discusses the problem of secure transmission for Amplify-and-Forward (AF) cooperative network which contains both an external eavesdropper and some untrusted relays at the same time, where each relay acts as a helper of transmitting information...
In order to improve anti-jamming performance of GNSS receivers, the Automatic Gain Control (AGC) system is commonly utilized. AGC is able to scale the analog input voltage to an optimal level of the ADC. Few studies have investigated how AGC impacts the signal processing of GNSS receivers in pulsed interference conditions. This paper studies the performance of GNSS receivers with AGC in the presence...
Steganography is being used to communicate confidential pieces of information across covert channels as it is less prone to attacks than conventional cryptography methods. It is increasingly used for images or audio files. Least Significant Bit modification is most popular method for steganography through audio files. However, it is open to steganalysis. In this paper, a novel Secured LSB Modification...
In cognitive radio network (CRN) three types of spectrum sensing techniques are widely used: matched filter detection, cyclostationary detection, and energy detection. Matched filter detection technique provides maximum SNR at receiving end but the detector need to be matched with the input signal i.e. impulse response of the system need to be made as the delayed version of mirror image of input signal...
This paper addresses the problem of phase noise mitigation in communications links utilizing DFT-S-OFDM waveforms. The paper discusses use of two different pilot configurations to do the compensation of the common phase error part of the phase noise. The pilot configurations are inserting pilots as logical symbols before the DFT spreading and inserting frequency domain pilots as subcarriers as in...
Reachability traditionally thinks about the controllability Grammian of a system, i.e. the actuation vectors as they pass through the plant dynamics. This perspective depends on fully knowing the future plant dynamics even as we apply controls in the present, since the ability to plan is important for control.
This paper derives an iterative algorithm for identifying a fractional Hammerstein non-linear system. Such system consists of a static non-linear block followed by a linear dynamic part. The proposed approach uses the hierarchical identification principle based on Levenberg-Marquardt algorithm and is able to estimate the parameters of both the linear part and the nonlinear part as well as the fractional...
Current mobile communication infrastructure may fail in cases where low coverage areas suddenly become overcrowded by mobile devices or in natural disasters. In this paper, we propose the use of flexible aerial relay (FAR) nodes for communication recovery and device-to-device (D2D) relaying, as an energy efficient and cost-effective way to resolve these issues rapidly. We discuss the technical characteristics...
To date, the achievable ergodic secrecy sum rate has been studied for multiuser MIMO downlink systems with single-antenna receivers only. In this paper, we study multiuser MIMO downlink systems with multiple-antenna receivers and an external single-antenna eavesdropper to be kept ignorant of the transmitted messages. We adopt the block diagonalization technique at the transmitter to remove inter-user...
This paper presents a computationally efficient beamforming approach to combat wiretapping in a relay-based multiple-input multiple output (MIMO) communication system which is part of a cognitive radio (CR) network. The system operates in two stages, that is, multiple-access (MA) followed by broadcasting (BC) using physical layer network coding (PNC). The beamforming design is based on minimizing...
Maintaining both reliable and secret communication involves different objectives: ensuring sufficient throughput for reliable communication and ensuring the secrecy of the associated communication. The optimal solution for one of these objectives might not be optimal or even suitable for another objective and thus a question arises as to what is the appropriate criteria for fairly balancing these...
Side Channel Analysis is a powerful attack to recover the secret key by exploiting an extra source of information such as timing, power consumption and electromagnetic leakage. Pre-processing scheme is used to improve the attack performance in the restricted traces. One of the pre-processing schemes is Singular Spectrum Analysis, which makes the original trace can be split into main signal and noise...
Zero-delay transmission of a Gaussian source over an additive white Gaussian noise (AWGN) channel with a 1-bit analog-to-digital converter (ADC) front end is investigated in the presence of correlated side information at the receiver. The design of the optimal encoder is considered for the mean squared error (MSE) distortion criterion under an average power constraint on the channel input. A necessary...
This paper considers the minimum mean p-th error (MMPE) estimation problem: estimating a random vector in the presence of additive white Gaussian noise (AWGN) in order to minimize an Lp norm of the estimation error. The MMPE generalizes the classical minimum mean square error (MMSE) estimation problem. This paper derives basic properties of the optimal MMPE estimator and MMPE functional. Optimal estimators...
Selection cooperation is an effective solution for cooperative communications and the automatic repeat request (ARQ) protocol can provide additional diversity gain for wireless networks. In this work, considering a large network where direct transmissions only exist in the neighbors of each node, we investigate an improved diffusion selection cooperation protocol integrated with ARQ, and taking into...
In today's world of fast communication, to insure, the security and integrity of information is a big challenge. Data hiding also known as Steganography is one of the fields that deal in methods related information security and hide secret information and message other information. This paper elucidates the effect of data hiding in different number of least significant bits in the primary colors of...
Classically encoding a group of symbols to be transmitted over a communication channel through baseband modulation can be done in various ways-namely Pulse Amplitude Modulation (PAM), Pulse Width Modulation (PWM), Pulse position modulation (PPM) etc. What we will be proposing in this paper is another encoding technique- mapping a symbol to a wave shape and transmitting that along a baseband channel...
Heterogeneous cellular networks have received considerable attention in the literature owing to increased data demands of cellular network users. Recently, Poisson Point processes (PPPs) are vastly used for modeling and analyzing cellular networks because of their accuracy and tractability. However, results in this area suffer from a big drawback. They considered a saturated load model in their analysis...
In this article his find optimal two-dimensional codes, optimization is to achieve the greatest value of the metric INF that is defined as INF = M/N, where M is the number of bits of information and N is the length of the word coded, with the condition that correct the greater the number of bits of erroneous burst. The results obtained allow us to infer that the two-dimensional codes have a very good...
In mobile communication systems, deterioration in intelligibility of the voiced content of the signal is a commonly observed phenomenon. In order to counter the undesirable effect of background noises on the speech signal, a methodology must be developed such that there is no loss in intelligibility of the speech signal. This work focuses on developing an approach to attain enhancement of speech critical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.