The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
CDMA-based technologies deserve assiduous analysis and evaluation. We study the performance, at call-level, of a CDMA cell with interference cancellation capabilities, while assuming that the cell accommodates different service-classes of batched Poisson arriving calls. The partial batch blocking discipline is applied for Call Admission Control (CAC). To guarantee certain Quality of Service (QoS)...
We propose an automated procedure, based on attribute analysis, to quickly and objectively detect and characterize reflections along GPR profiles. The process uses the cosine of the instantaneous phase to mark as a horizon any event that shows lateral phase continuity, defining its time-space positions and peak amplitudes, to be used in interpretation and inversion processes. Such attribute allows...
This paper studies the effectiveness of compress-and-forward (CF) relaying scheme for a multiple-input multiple-output (MIMO) Gaussian relay channel with an out-of-band finite-capacity relay-to-destination link in which noises at the relay and destination are correlated due to common sources of interference. This scenario is motivated by the possibility of using device-to-device links for inter-cell...
Inter-channel nonlinear processes that are responsible for nonlinear interference noise (NLIN) in fiber optic transmission, can be classified as two-pulse, three-pulse, or four-pulse collisions. Each type of collision is shown to have a unique signature and the nature of NLIN is determined by the relative importance of the various classes of pulse collisions. The pulse-collision picture provides a...
This paper investigates the joint robust beamforming and artificial noise design in two-user interference networks, where one of the two pairs is wiretapped by an external eavesdropper, and only imperfect eavesdropper's channel state information (ECSI) is available for the two pairs. Under individual transmission power constraint, our goal is to maximize the worst-case achievable secrecy rate of the...
Inter-symbol interference (ISI) may become detrimental when the data rate rises in the atmospheric scattering UV channel. In this paper, we model the ISI effect due to delay spread in the UV channel and evaluate the approach of direct sequence spread spectrum (DSSS) in eliminating ISI and improve the system performance. Both the measured noise and newly reported experimental results of impulse response...
Wearable real-time Electrocardiogram (ECG) monitoring is an emerging wireless technology enabling early diagnosis and increased ability of prevention of cardiovascular diseases. However, the ECG signal suffers from Powerline Interference (PLI) which corrupts the biomedical recordings. Low power and high speed filtering of the ECG signal is essential to make the monitoring device portable. This paper...
An electrocardiogram (ECG) signal noise caused by different source e.g. power line interference (PLI), muscle and motion artifacts etc. Eliminating signal noise from ECG signal will increase the accuracy in diagnosis disease. In this paper, we propose sinusoid kernel function on Gaussian process (GP) to eliminate power line interference (50Hz or 60Hz) for electrocardiogram (ECG) signal. Expressing...
It is well known that separate coding on each carrier is capacity-achieving in parallel Gaussian multiple-input multiple-output (MIMO) broadcast channels in the sense that the sum rate capacity under a sum power constraint is achievable with separate coding if the noise is independent on each carrier. In this paper, we generalize this statement by proving that the optimality of separate coding also...
The development of next-generation networks has been driven by a number of use cases aimed at supporting innovative applications and services. Among these drivers the Internet of Things has gained momentum due to its potential to leverage Machine Type Communications (MTC), a term used to denote machine-centered communications among sporadic, bursty traffic generating devices. While scalability issues...
We introduce a novel programming algorithm that is particularly suitable for 3D NAND. With larger design rules and charge trapping (CT) device 3D NAND is much less sensitive to interference therefore should not use elaborate and costly algorithms designed for scaled 2D NAND. By binary division of cell Vt into smaller groups the number of verification pulses can be reduced. For MLC/TLC which requires...
This work investigates the signal-to-noise and interference ratio (SNIR) for underwater acoustic networks (UANs) employing ALOHA as medium access control (MAC) protocol. A uniformly random spatial node distribution model is proposed. The model allows to obtain the SNIR between a pair of nodes as function of network parameters like the radius size, the communication frequency, the total amount of nodes...
This paper proposes a methodology for the use of parallel channels for processing of biomedical signals, allowing to minimize the distortion of time-amplitude signal informative features in the process of interference eliminating. Structures and methods of preprocessing of electrocardio signal is developed that allow to reduce distortion diagnostically significant informative parameters of ECS in...
We study the secure degrees of freedom (d.o.f.) of helper-assisted Gaussian wiretap channel with shared key between the transmitter and the helper. Given that the rate of the key scales with power as γ over 2 log SNR, we show that secure d.o.f. is min{1+γ over 2, 1}. The achievability proof combines real interference alignment with the artificial noise transmission technique. Using the shared key...
In the setting of the two-user single-input single-output X channel, recent works have explored the degrees-offreedom (DoF) limits in the presence of perfect channel state information at the transmitter (CSIT), as well as in the presence of perfect-quality delayed CSIT. Our work shows that the same DoF-optimal performance — previously associated to perfect-quality current CSIT — can in fact be achieved...
The problem of transmitting confidential messages in the M × K wireless X network is considered, in which each transmitter intends to send one confidential message to every receiver. In particular, the secrecy degrees of freedom (SDOF) of the considered network are studied by an artificial noise alignment (ANA) approach, which integrates interference alignment and artificial noise transmission. At...
In this paper, we consider a multi-pair two-way amplify-and-forward relay interference channel, where multiple pairs of full-duplex users exchange information through a full-duplex relay with very large number of antennas, while each user only has two antennas. In order to save the transmission power, four typical power scaling schemes are proposed based on the maximum-ratio combining/maximum-ratio...
A distributed antenna system (DAS) architecture is considered to be a key enabler for further Network Virtualization where different network configurations are created as needed by a centralized decision making unit that is typically integrated into the Cloud Radio Access Networks (C-RAN) which offers a potential architecture for 5G wireless communication systems. Many schemes have been proposed for...
Future mobile communication networks will require enhanced network efficiency and reduced system overhead due to their user density and high data rate demanding applications of the mobile devices. Research on Blind Interference Alignment (BIA) and Topological Interference Management (TIM) has shown that optimal Degrees of Freedom (DoF) can be achieved, in the absence of Channel State Information (CSI)...
In this paper, we consider the secure communication in a K-user multi-antenna broadcast channel (BC) with state feedback. We characterize the optimal secure degrees of freedom (SDoF) region of multiple-input single-output (MISO) channel. The SDoF region is achievable by a secret key based linear scheme, which generates analog secret keys by sending artificial noise and then performs space-time alignment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.