The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper studies the end to end distortion of transmission of a layered encoded source over a cooperative relay broadcast channel. A jointly optimised source-channel code is proposed to multicast a two-layered encoded source to two destinations. A degraded discrete memoryless broadcast channel is assumed, where the first destination with better channel conditions decodes both layers consisting of...
Automatic repeat request (ARQ) is widely used in modern communication systems to improve transmission reliability. In conventional ARQ protocols developed for systems with energy-unconstrained receivers, an acknowledgement/negative-acknowledgement (ACK/NACK) message is fed back when decoding succeeds/fails. Such kind of non-adaptive feedback consumes significant amount of energy, and thus will limit...
We study the interactive compression of an arbitrary function of two discrete sources with zero-error. The information on the joint distribution of the sources available at the two sides is asymmetric, in that one user knows the true distribution, whereas the other user observes a different distribution. This paper considers the minimum worst-case zero-error codeword length under such asymmetric prior...
The performance of uplink HARQ in a Cloud-Radio Access Network (C-RAN) architecture is limited by the two-way latency on the fronthaul links connecting the Remote Radio Heads (RRHs) with the Baseband Unit (BBU) that performs decoding. In order to alleviate this problem, this work considers an alternative architecture based on the separation of control and data planes, in which the control plane is...
We investigate the application of network coding to file transfers from a single source to multiple destinations in a two-hop ad hoc relay network that consists of half-duplex packet radios. Our network-coded file distribution techniques make simultaneous use of a pair of relay nodes. All transmissions by the source and the relay nodes employ packet-by-packet adaptive modulation and channel coding...
Emerging resistive random-access memory (RRAM) can provide non-volatile memory storage but also intrinsic logic for matrix-vector multiplication, which is ideal for low-power and high-throughput data analytics accelerator performed in memory. However, the existing RRAM-based computing device is mainly assumed on a multi-level analog computing, whose result is sensitive to process non-uniformity as...
The article presents structural logic schemes of building decision support systems in crisis situations with providing support for video conferencing based on heterogeneous networks. The proposed structural solutions allow implementing them with the use of any data transmission systems of the conditions of implementation of new compression technology based on the presented methods and models of adaptive...
To account for the problems of long delay, large loss, low SNR and no feedback information in IPN (InterPlaNetary Internet) backbone network, we proposed multihop relay protocols based on fountain codes. The rateless property, erasure property and no need feedback of fountain codes, which combined the advantage of relay make us propose the Random Linear Network Coding (RLNC) based and LT code based...
The paper presents a set of steganographic filters which can be used on Raspberry Pi 2 microcomputer. Four types of filters are described: two types for network steganography based on IP header, one for steganography based on TCP header, and one for steganography in VoIP technique.
Distributed Network Protocol (DNP3) is a set of communications protocols used between components in industrial control systems, especially power electric systems. Those systems should have integrity, low complexity, authentication and so on. Among them, the scheme using cyclic shift operation that can satisfy the integrity and complexity is addressed. Furthermore, another scheme using undetected burst...
We study source compression with a helper in the fully quantum regime, extending our earlier result on classical source compression with a quantum helper [arXiv:1501.04366, 2015]. We characterise the quantum resources involved in this problem, and derive a single-letter expression of the achievable rate region when entanglement assistance is available. The direct coding proof is based on a combination...
As modern ASIC technologies suffer from substantial delay uncertainties, delay insensitive (DI) communication protocols are receiving increasing attention. Among these, the more energy-saving 2-phase protocols are most attractive. In the literature such protocols are widely covered already, with Level-Encoded-Dual-Rail (LEDR), Level-Encoded-Transition-Signalling (LETS) and Transition Encoding (TranEnc)...
This paper gives an brief survey on full-duplex relaying. First, we discuss the importance of full-duplex communications and its major drawback, known as self-interference. We provide a overview of the state-of-the-art on self-interference cancellation techniques from antenna design to digital cancellation. Then, we assess current developments in full-duplex relaying, some promising protocols and...
In this paper, we explore the possibility of using smartphones as WAVE devices. When it is expected to take more than a decade from now to deploy the WAVE technology in full scale, smartphones running the WAVE protocol stack can bring the benefit of the technology earlier. In particular, we design and implement the lower layers of the WAVE stack in software defined radio (SDR) on smartphone platform...
The theory of compressed sensing (CS) is very attractive in that it is possible to reconstruct sparse signals with a sub-Nyquist sampling rate. Recently many researches have applied CS as the channel code, and show its great potential in communication systems. This paper studies the compressed cooperation in an amplify-and-forward (CC-AF) relay channel, where CS is used to compress the source data...
In this paper, we study the effect of optimal power allocation on the performance of communication systems using hybrid-automatic repeat request (HARQ) protocols with a limited maximum number of transmission rounds. We formulate the optimization problem aiming to minimize the total average power consumption in order to achieve a target performance constraint, where the total power consumption stands...
A new joint message-passing decoder is presented for use in a two-user cooperative wireless network. This decoder is designed for use with the diversity network coding scheme of Xiao et al. [1], which uses nonbinary network codes together with channel coding to achieve high diversity gains. The proposed joint decoder, together with appropriate modifications to the cooperative protocol of [1], significantly...
It is widely believed that future small-cell unmanaged wireless networks will be dominated by interference caused by packet collisions and not by signal-to-noise issues. In such a network, a large fraction of the collisions are caused by hidden terminals. Here we present the design and evaluation of RoXOR, a system that can effectively combat random collisions caused by bursty traffic from hidden...
In this paper, we consider the network coding (NC) enabled three-phase protocol for information exchange between two users in a wireless two-way (bidirectional) relay network. Modulo-based (nonbinary) and XOR-based (binary) NC schemes are considered as information mixture schemes at the relay while all transmissions adopt pulse amplitude modulation (PAM). We first obtain the optimal constellation...
In this work we describe the implementation details of a protocol suite for a secure and reliable over-the-air reprogramming of wireless restricted devices. Although, recently forward error correction codes aiming at a robust transmission over a noisy wireless medium have extensively been discussed and evaluated, we believe that the clear value of the contribution at hand is to share our experience...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.