The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a wireless PID controller, known as PIDPlus. The same quality control as wired PID can be provided by PIDPlus using a wireless measurement, despite slower wireless measurement update and communication interruptions. The PIDPlus novel algorithm is based on a modification of the PID reset and rate calculation to account for non-periodic measurement updates. The paper presents and...
Simultaneous wireless information and power transfer (SWIPT) has recently drawn significant interests for its dual use of radio signals to provide wireless data and energy access at the same time. However, a challenging secrecy communication problem arises in the SWIPT system since the messages sent to information receivers (IRs) may be eavesdropped by energy receivers (ERs), which are presumed to...
Probabilistic Data Association (PDA) algorithm has shown promising performance in symbol detection and interference cancellation in different communication schemes. This paper proposes new algorithms that build on PDA and introduce modifications in the way the symbol being detected is treated. While PDA models this symbol as a discrete sample from a constellation, PDA with symbol uncertainty (SU-PDA)...
This paper presents a delay-QoS-driven spectrum and energy efficiency optimization transmission technique. In particular, considering the cross-layer effective capacity (EC) model in Rayleigh fading channels, a spectrum- and energy-efficient power allocation strategy is proposed when maximum spectrum efficiency is achieved under minimum energy efficiency (EE) requirement. For this purpose, at a target...
In this paper, we consider Coordinated Multi-Point (CoMP) in a cloud-based radio access network (RAN), where each coordinating access point compresses its observation using distributed Wyner-Ziv compression and forwards the compressed signal to the receiving processing unit. We map this architecture to the multiple-relay compress-and-forward (CF) problem, derive the achievable rate of such a system...
Device-to-device (D2D) communication, which underlays a cellular network to improve the reuse of spectrum resources, is a promising technique that can increase system capacity, enhance cell coverage and extend battery lifetime of user equipments. In this paper, we study the power allocation for a D2D underlaying cellular network. Our optimization task is to maximize the sum rate of the cellular network...
Compressed sensing (CS) technique has attracted a lot of recent research interests in mathematics and signal processing fields. Literature studies often exploit CS at the receiver side to sub-sample the receiving signals to reduce the sampling rate and processing overhead. It would be of great benefit if it is possible to exploit CS at the transmitter side to reduce the redundancy of the data before...
The live implantation of micro-electrode arrays allows the observation of populations of neural activity. There is a strong need for unsupervised adaptable neural spike extraction and spike-sorting methods, which would significantly reduce data throughput and allow for implantation and wireless transmission. We present a method for neural spike feature-extraction that involves the generation and use...
The growing prevalence of Smartphones and Tablets has introduced new challenges and a heterogeneous hardware and software ecosystem. One of the interesting aspects of this phenomenon is how to control the user owned devices' access to organization/retail resources. This research focuses on enhancing a proposed indoor geo-fencing and access control framework aiming for retail environments as a case...
Multipath spread is one of the most important factors which limit data transfer with high bit rate. Data transfer with high bit rate is possible in the range of gigahertz. The main problem in this frequency range is multipath spread. Orthogonal frequency division multiplexing (OFDM) technique divides the transferring symbols between several subcarriers and transfers them simultaneously. Accordingly...
We revisit the problem of describing optimal anchor geometries that result in the minimum achievable MSE by employing the Cramer Rao Lower bound. Our main contribution is to show that this problem can be cast onto the whelm of modern Frame Theory, which not only provides new insights, but also allows the straightforward generalization of various classical results on the anchor placement problem. For...
Attracting increasing attention in recent years, the Free Space Optics (FSO) technology has been recognized as a cost-effective wireless access technology for multi-Gigabit rate wireless networks. Radio over Free Space Optics (RoFSO) provides a promising enhancement to optical fiber systems. In an RoFSO system using wavelength-division multiplexing (WDM), it is possible to concurrently transmit multiple...
This paper proposes a novel physical-layer security scheme for anti-eavesdropping, which is based on friendly jamming with dynamic role assignment (DRA). In particular, the roles of message sender and cooperative jammer could be adaptively re-assigned among multiple coordinating transmitter nodes to enhance secrecy rate. We discuss two different prospect approaches to determine the role assignment...
In this paper, geometry-based algorithms for device-free localization (DFL) of a single target are proposed. The algorithms exploit the change in attenuation caused by the device-free target on radio links passing through the deployment area. By solving for the intersections of some of the attenuated links and taking the centroid of the intersection points, an estimate of the target's location is...
Wireless LANs, especially WiFi, have been pervasively deployed and have fostered myriad wireless communication services and ubiquitous computing applications. A primary concern in designing each scenario-tailored application is to combat harsh indoor propagation environments, particularly Non-Line-Of-Sight (NLOS) propagation. The ability to distinguish Line-Of-Sight (LOS) path from NLOS paths acts...
The world population is in the midst of a unique and irreversible process of aging. Fall, which is one of the major health threats and obstacles to independent living of elders, will aggravate the global pressure in elders' health care and injury rescue. Thus, automatic fall detection is highly in need. Current proposed fall detection systems either need hardware installation or disrupt people's daily...
We present two novel distributed event detection algorithms based on a statistical approach that tolerate Byzantine attacks where malicious (compromised) sensors send false sensing data to the gateway leading to increased false alarm rate. We study the problem of Byzantine attack function optimization and the decision threshold optimization and consider two practical cases in our algorithms. In the...
Despite the widespread use of Bluetooth technology, identity management of Bluetooth devices remains a significant challenge because the MAC address and name of Bluetooth device are easy to forge. In this paper, we present BlueID — a practical system that identifies Bluetooth devices by fingerprinting their clocks. Previous approaches to clock fingerprinting exclusively rely on the timestamps carried...
Bayesian estimation methods are widely used for wireless localization systems. They employ priori information and current measurement error distribution models to derive the state of a mobile target. Cramér-Rao lower bound (CRLB) is a fundamental tool to analyze the performance of Bayesian estimators. Although CRLB is derived based on the measurement error distribution, only a few works have investigated...
In wireless medium, requirement of high frequency is increasing day by day. For high frequency based system data rates should be high. In unguided media, as signal travels a long distance and due to interference of noise, there is error in phase and frequency and we get a deviated output. In view of this, We are motivated to design a low power frequency synthesizer which would provide a low locking...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.