The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Conference proceedings front matter may contain various advertisements, welcome messages, committee or program information, and other miscellaneous conference information. This may in some cases also include the cover art, table of contents, copyright statements, title-page or half title-pages, blank pages, venue maps or other general information relating to the conference that was part of the original...
The perfect Gaussian integer sequences have been recently used in orthogonal frequency division multiplexing (OFDM) systems and code division multiple access (CDMA) systems. This paper proposes a new construction method, called monomial o-polynomials, to generate the perfect Gaussian integer sequences. The resulting sequences have odd periods and high energy efficiency. Furthermore, the number of...
Exploiting full-duplex (FD) technology on base stations (BSs) is a promising solution to enhancing the system performance. Motivated by this, we revisit a full-duplex base station (FD-BS) aided OFDMA system, which consists of one BS, several uplink/downlink users and multiple subcarriers. A joint 3-dimensional (3D) mapping scheme among subcarriers, down-link users (DUEs), uplink users (UUEs) is considered...
In this paper, a full-duplex (FD) amplify-and-forward (AF) transmitter cooperative communication scheme is proposed for multiple access channel (MAC). In particular, two FD transmitters simultaneously transmit information to a common receiver and help each other's transmissions with the AF relaying scheme. By considering the accumulation of the residual self-interference and additive noise (RIAN)...
Decentralized coded caching is applicable in scenarios where the server does not have enough knowledge about the entire cache network to perform centralized coordination during prefetching, such as when the server is uninformed of the number of active users and their identities in a wireless or mobile environment. Most of known decentralized strategies use random uncoded prefetching followed by coded...
We consider the problem of group secret key generation through a multi-hop network modeled by a pair-wise independent network and propose a low complexity scheme which can guarantee strong secrecy. We assume that the legitimate transmitter only has the knowledge of the maximum number of precoded keys known to any helpers, where the precoded keys are the output of a precoder at the transmitter to be...
As an important communication medium, audios are easily modified or tampered during transmission; thus the authenticity of audios is of high importance. This paper mainly introduces a method to detect audio post-processing based on audio features; the Support Vector Machine (SVM) is applied for classification during the detection. In the proposed method, the Mel Frequency Cepstral Coefficient (MFCC)...
This paper employs wireless edge caching at relay nodes and proposes a cooperative hybrid caching placement scheme. The trade-off between the conventional caching schemes of most popular content (MPC) and largest content diversity (LCD) is investigated considering two degrees of flexibility. Specifically, we consider two design variables i.e., the number of relays employing the MPC scheme as well...
This paper considers an energy-efficient transmit design in a multiple-input single-output (MISO) wiretap channel. In particular, a transmitter sends one confidential message to a legitimate receiver, which must be kept perfectly secure from multiple external eavesdroppers. Assuming partial eavesdroppers' channel state information (ECSI) at the transmitter, we aim to design the transmit beamformer...
We study the optimum scheduling of a pushing-based information delivery system, where information is sent from a server to mobile users by using server-initiated pushing actions. Information arrives at the server at random. The server adopts a “hold-then-serve” strategy, where new information is temporarily stored in queue for a later one-time transmission. Based on the current queue status, at any...
In a networked control system (NCS) where plants and controllers are connected through communication networks, it is important to decrease the number of times of communications under preserving of control performances such as optimality and stability. From this viewpoint, event-triggered control has been studied so far. In event-triggered control, the measured signal is sent to the controller only...
To realize a consensus problem based on wireless communications, it is necessary to consider several constraints caused by the natures of wireless communications such as communication error, coverage, capacity, multi-user interference, half-duplex and so on. This work focuses on half-duplex constraint and multi-user interference for a consensus problem and proposes a new Slotted-ALOHA that changes...
We propose a novel parallel essentially cyclic asynchronous algorithm for the minimization of the sum of a smooth (nonconvex) function and a convex (nonsmooth) regularizer. The framework hinges on Successive Convex Approximation (SCA) techniques and on a new global model that describes many asynchronous environments in a more faithful and exhaustive way with respect to state-of-the-art models. A key...
This paper considers a diffusion-based molecular communication link where both the transmitter and receiver are molecular circuits. We define the input (resp. output) signal as the number of signalling molecules (output molecules) at the transmitter (receiver) over time. For a given receiver circuit, an open research problem is to find the transmitter circuit that maximises the mutual information...
Generalized frequency division multiplexing (GFDM) is proposed as a candidate waveform to tackle new challenges posed on the physical layer for the fifth generation of wireless communication systems. In this paper, we propose a highly efficient algorithm for GFDM data detection on the basis of orthogonal approximate message passing (OAMP). We further combine with the conjugate gradient method and...
In this paper, a novel SSIM-based NLM algorithm is proposed. We replace the exponential weighted kernel function with a cosine coefficient weighted Gaussian kernel function and incorporate the structural similarity (SSIM) index, which is the state-of-the-art image quality assessment measure, into the NLM image denoising model. Experimental results indicate that the proposed SSIM-based optimal NLM...
To reduce the average file delivery time under limited backhaul bandwidth, a fractional dynamic caching scheme, that coordinates the utilization of the backhaul and the cache storage, is proposed in this paper. In our scheme, only parts of the files are pre-fetched and stored in the static storage segment of small base stations (SBSs), while the remaining parts of the files will be fetched into the...
The shared computational resources provided by the mobile cloud computing paradigm offer the opportunity for mobile devices to reduce the energy expended, or the latency incurred, in performing significant computational tasks. To maximize their impact, cloud computing systems must jointly optimize the allocation of the computational and radio resources. We consider a scenario in which two mobile users...
Irregular low-density parity-check (LDPC) codes are among the best codes currently known. Unfortunately, the performance of existing codes may deteriorate substantially with practical finite-precision decoder implementations. This motivates us to extend our previous work on finite-alphabet decoders based on look-up tables (LUTs) to irregular LDPC codes. We devise a joint design of the LUTs used for...
Unmanned aerial vehicle (UAV) is attractive for localization where global positioning system (GPS) satellites are uncapturable and wireless anchor nodes are unavailable. The advantage of localization using UAVs is their movability, that is, even when only few UAVs are available, if each of them ranges a target node many times from different locations, the localization accuracy can be improved, because...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.