The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Vehicular communications have a great potential to improve intersection safety and traffic efficiency. Achieving a high application performance is challenging due to the specific propagation conditions caused by buildings and obstacles found at urban intersections. Relying on the state-of-the-art solution for vehicular communication based on IEEE 802.11, we extend contention-based forwarding to distribute...
Across neuroscience research, clinical diagnostics, and engineering applications in pain evaluation and treatment, there is a need for an objective measure of pain experience and detection when it occurs. This detector should be reliable in real-world settings using easily accessible, non-invasive data sources. We present a simple yet robust paradigm for decoding pain using neural and physiological...
We consider a dual-hop wireless network where an energy constrained relay node first harvests energy through the received radio-frequency signal from the source, and then uses the harvested energy to forward the source's information to the destination node. The throughput and delay metrics are investigated for a decode-and-forward relaying mechanism at finite blocklength regime and delay-limited transmission...
Stereo-electroencephalographic (SEEG) depth electrodes were used to record neural activity from deep brain structures in this study. By localizing all the electrodes into the individual brain, we found that areas that are inside of central sulcus occurred obvious hand-movement-related modulation when the subjects were performing different hand motion tasks. Then, an asynchronous brain-computer interface...
In this paper, we design a fast and efficient energy-based and asynchronous neighbor discovery protocol for the Internet of Things (IoT). In our solution, we relax the assumption of frame-level synchronization. We formulate a novel asynchronous group testing scheme and apply it to the neighbor discovery problem. We then show that our proposed scheme is able to detect the set of K active neighbors1...
Bus is the main communication channel for processor from/to memory or external devices to deliver data or commands. Advancement, if the jobs are co-executed by the processor with multi-cores, the bus management is very important and to be depended by the arbitration strategy. In this paper, the system-on-chip insides two DLX processors, which has 32 bits and are implemented by the ARM SoC Designer...
Recently, the forward error correction (FEC) codes are gaining popularity in video transmission community because of its capability of recovering lost packets in lossy wireless networks. The state-of-the-art scheme for FEC video transmission are the delay-aware fountain codes (DAF), which combine the ratelessness of fountain codes with the property of video coding. However, DAF assumes that all the...
In this paper we propose a two-way spectrum sharing protocol for the overlay cognitive radio network consisting of two primary users (PUs) and two secondary users (SUs). One of the SUs acts as a relay to assist the communication between the PUs while at the same time allowing for two-way transmission with the other SU. The communication process is done in two phases. In the first phase, the PUs and...
Multi-path TCP has recently shown great potential to take advantage of the rich path diversity in data center networks (DCN) to increase transmission throughput. However, the small flows, which take a large fraction of data center traffic, will easily get a timeout when split onto multiple paths. Moreover, the dynamic congestions and node failures in DCN will exacerbate the reorder problem of parallel...
This paper presents an improvement to the end-to-end bit error rate (E2E-BER) performance of turbo-coded orthogonal frequency division multiplexing for physical layer network coding (TC-OFDM-PLNC) over power line communication (PLC) channels in the presence of impulsive noise. A novel detection scheme is introduced to transform the transmit signal constellation based on the frequency-domain channel...
In this paper, we propose a new full-duplex relay-assisted cognitive radio system model with an adaptive decoding algorithm at the secondary user, in order to maximize both primary and secondary achievable rates. We consider the uplink transmission and we compare the system's achievable rates obtained with both amplify-and-forward and decode-and-forward relaying in the single-carrier case. Then, we...
Message dissemination is considered as a challenging task in Vehicular Ad-hoc network (VANET). In particular, safety messages, such as, road accident warning, traffic congestion warning, etc., are the most critical messages type that need to be efficiently transmitted in a wireless and mobile network where the topology changes dynamically. Many protocols have been proposed for the sake of disseminating...
In vehicular communication protocol stacks, received messages may not always be decoded successfully due to the complexity of the decoding functions, the uncertainty of the communication load and the limited computation resources. Even worse, an improper implementation of the protocol stack may cause an unfair data age distribution among all the communicating vehicles (the receiving bias problem)...
Physical-layer security is emerging as a promising paradigm of securing wireless communications against eavesdropping, with the purpose of improving the transmission reliability of the main link. We propose a best relay selection scheme with multi-eavesdropper cooperation, and deduce the corresponding outage probability and the intercept probability. The simulation results show that he proposed scheme...
In view of the problem that the unfixed CRC calculation and the compatibility with gigabit Ethernet are the two questions during design of ten gigabit Ethernet MAC controller. This paper solves the above two questions according to the proposed solution. CRC calculation module can be designed to be a fast calculation speed and low gate delay by using a new type CRC method which contains the preprocessing...
This paper studies the simultaneous wireless information and power transfer (SWIPT) in the multi-carrier differential chaos shift keying (MC-DCSK) communication system. Two energy harvesting protocols with a power splitting (PS) receiver are considered. In the first protocol, only a fraction of reference sub-carrier signal are used for energy harvesting (EH). In another one, a fraction of all sub-carriers...
In this paper, an Automatic Repeat Request (ARQ)-aided secure polar coding scheme for the wiretap channel is proposed, where the frozen bits of the codes are obtained through the feedback of the legitimate recipient. Then, security of the proposed scheme is investigated, and analytical work proves that, both the reliability condition and security condition can be satisfied, specifically for the non-degraded...
By exchanging the information on the status and the surrounding environment between devices, devices can determine the optimal action. We focus on the construction of a digital signature scheme for local broadcast, which allows the devices with limited resources to securely transmit broadcast messages. A multi-group authentication scheme that enables a node to authenticate its membership in multi...
Honey encryption (HE) is a novel password-based encryption scheme which is secure against brute-force attack even if users' passwords have min-entropy. However, because decryption under a wrong key produces fake but valid-looking messages to everyone, typos in password may confuse even legitimate users in HE. This has been one of the most challenging problems in HE. In this paper, we propose two types...
This paper considers a scheme of distributed coded cooperation for three different Protocols where the antennas are shared between source and relay so that an array for virtual transmission is created to facilitate transmission towards the destination. Since the relaying employed by relay uses amplify-and-forward (AF). The source is assumed to be equipped with two encoders, where the first one output...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.