The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider three different time-division multiple-access based Protocols for distributed convolutional-based coded cooperative networks. Protocols I, II and III convert the spatially distributed antenna system into effective multiple-input multiple-output (MIMO), single-input multiple-output (SIMO) and multiple-input single-output (MISO), respectively. The main focus will be on the...
The ability of ultra-low latency to process market data feed is the premise and foundation for a today's trading system to grab the instant trading profits. The market data feed containing up-to-date information on market changes is multicasted real-timely from financial exchanges to market participants, usually in the form of financial information exchange (FIX) Adapted for STreaming (FAST) protocol...
In this paper, we propose a random sleep protocol based on distributed coding (RSDC) to realize an energy-efficient sensor-to-vehicle communications. In the proposed protocol, every sensors independently decide to either sleep or transmit with a given sleep probability. The sleep of sensors can be considered as erasures; packets are erased with the sleep probability. We, hence, introduce Luby-transform...
In this paper, a new cooperative spectrum sharing protocol that employs space-time block coded spatial modulation (STBC-SM) at the secondary user (SU), is proposed for overlay cognitive radio (CR) networks. STBC-SM is applied at the secondary transmitter (ST) which transmits its data by both modulated symbols and antenna combinations while conveying PU's data only by modulated symbols. This protocol...
Often, in a distributed system, a task must be performed in which all entities must be involved; however only some of them are active, while the others are inactive, unaware of the new computation that has to take place. In these situations, all entities must become active, a task known as Wake-Up. Another typical occurrence of this problem, known also as Reset, is when some entities, upon detecting...
Network diversity multiple access or NDMA is the family of algorithms with the highest potential throughput in the literature of signal-processing-assisted random access. NDMA uses the concept of protocol-induced retransmissions to create an adaptive source of physical (PHY) layer diversity. This adaptive diversity is used to resolve packet collisions (via signal separation) without the explicit need...
This paper presents a smooth way to include Network Coding in the Constrained Application Protocol (CoAP) for large resource transmissions. Devices in the Internet of Things usually communicate using short messages with little data. In some cases, for example, requesting firmware updates, bigger resources need to be transferred. CoAP's recently finalized blockwise transfer scheme can handle large...
We present results on the performance of a network-coding based method for broadcast file delivery in an ad hoc network consisting of half-duplex packet radios. Our technique allows a receiver to exploit the broadcast nature of the wireless medium by overhearing packets sent by a node that is not necessarily one of the receiver's designated relays. Delivery of the file to the remote destinations is...
This paper proposes a tree-based RFID tag anti-collision protocol, called the silence coding query tree (SCQT) protocol, based on a novel coding scheme, namely the silence coding, to speed up tag identification. The proposed protocol can identify multiple tags at a time even at the appearance of tag signal collisions. Simulation results show that the SCQT protocol significantly outperforms other related...
Selection cooperation is a preferable cooperative scheme for wireless sensor networks (WSNs) for its simplification and easy implementation. In this paper, we present a selection cooperation experimental platform (CEP) based on IEEE 802.15.4 WSNs using cheap radios. This work concentrates on employing the lightweight selection cooperation protocol (LSCP) with feedback to govern the cooperation between...
The transmission distance of continuous variable QKD (CV QKD) protocol based on Gaussian modulation has been quite limited by the low efficient reconciliation protocol. On the other hand, noiseless linear amplifier (NLA) have greatly enhanced the ability of CV QKD. In this paper, we propose a Gaussian post-selection method simulating NAL in CV QKD, followed by a reconciliation process based on systematic...
This paper presents a UHF RFID Reader designed for recognition and tracking in IoT domain. It is built by NI USRP software radio platform and NI LabVIEW with flexible physical/MAC layer parameters, which can be modified easily and monitored clearly from front panel of this Reader compared to commercial RFID Reader. Queried random number sequence from a commercial Tag can be detected within half meter...
In this paper, we proposed a secure communication scheme based on Reliability-Based Hybrid Automatic Repeat reQuest (RB-HARQ) protocol over the additive white Gaussian noise (AWGN) wiretap channel. RB-HARQ protocol aims at retransmitting the unreliable bits required for the authorized user's (Bob) successfully decoding and minimizing the information leakage that may benefit to eavesdropper (Eve)....
The article discusses the possible means of analyzing radio signals used to control drones — Unmanned Aircraft or Aerial Systems (UAS) through the Analysis and Classification of Radio Signals (AKRS) system; it also includes a description of the physical layer of the selected, most popular protocols and introduces the possibility of decoding the received data, identification of the radio device and...
Error-related potentials (ErrP) have been increasingly studied in psychophysical experiments as well as for brain-machine interfacing. In the latter case, the generalisation capabilities of ErrP decoders is a crucial element to avoid frequent recalibration processes, thus increasing their usability. Previous studies have suggested that ErrP signals are rather stable across recording sessions. Also,...
Underwater acoustic sensor networks (UASNs) are widely used in many application. However, the underwater acoustic channel poses many challenges for reliable data transmission protocol design. In this paper, we propose a new data transmission protocol based on Fountain codes and Selective-repeat ARQ scheme (FSR-ARQ). The new approach utilizes the packet error correction ability of rateless code and...
File synchronization is a critical component of many modern data sharing applications. File synchronization is particularly challenging when different versions of a file that need to be synchronized differ in some number of edits. Several recent works have studied exact synchronization under edit errors. In this paper, we extend the available analytical toolbox of file synchronization by focusing...
In this work, we propose a new technique of spatially-coupled low-density parity-check coding within a threshold-based lossy forwarding protocol for a multiple access relaying system. Here, block Rayleigh fading is assumed for all transmission links and error-free decoding at the relay is not required. Two schemes are presented in which the relay computes log-likelihood ratios (LLRs) of the network-coded...
This paper investigates a new methodology for soft information forwarding (SIF) based on a novel technique known as soft angular modulation (SAM). In this new relay scheme, the soft symbols are embedded into phases at the relay. This is more advantageous as we refrain to forward real values (under bandwidth constraints) via wireless channels. This makes the proposed scheme practically feasible. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.