The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the main challenges of communication in the absence of transmitter channel knowledge is codebook universality, i.e., the existence of a single codebook that guarantees a given rate for all channel states. We address this problem for a class of ergodic fading multiple-input multiple-output (MIMO) channels, whose fading distribution is not necessarily isotropic. It is shown that a universal codebook...
A new model for the interference channel with confidential messages (IC-CM) is introduced, where each receiver, besides his noisy observations, is provided with a fixed-length subset, of his choosing, of noiseless observations for the transmitted codewords of both users, making confidential communication more challenging than the previous such model. In addition, in the same spirit, a broadcast channel...
The emergence of networks of many devices in the context of cyber-physical systems motivates novel solutions for communication over random access channels. Currently deployed random access protocols attempt to avoid collisions, and target the performance of a scheduled multiple access system (a strategy known to be only suboptimal from the information-theoretic perspective). In contrast, in this paper,...
We consider subspace codes obtained by lifting L-interleaved [n, k] Gabidulin codes. When used in networks with random linear coding, these codes are able to correct with high probability γ packet insertions and δ packet deletions provided that γ/L + δ ≤ n − k. We propose to use these subspace codes in the so called fountain mode. In this case we do not need to correct deletions and are able to correct...
This paper studies the maximum secrecy rate for a semi-deterministic wiretap channel, in which the channel between the transmitter and the legitimate receiver is deterministic, while that between the transmitter and the eavesdropper is a discrete memoryless channel. For a given decoding error probability and information leakage (measured by the total variation distance), the optimal second-order secrecy...
This paper establishes non-asymptotic tradeoffs between detection delay, output sampling rate, and communication rate for bursty communication. These tradeoffs imply regimes where the gap to capacity is captured by the inverse of the sampling rate rather than the usual dispersion.
Most of the OBU (On Board Unit) devices of vehicles use MCU to control the infrared transmission and reception for the infrared-oriented parking systems. However, the more battery power of the OBU device will be dissipated. In this paper, a non-processor OBU device is proposed to reduce its standby power consumption. Besides, when the OBU device receives an infrared induced signal to cause transmitting...
This paper proposes a 12-bit DAC using switched-current technique and segmented topology, which includes a 9-bit thermometer code and a 3-bit binary code and a 125-MHz fully differential current- mode line driver for a better noise immunity at high frequencies. High bandwidth and power reduction are the major factors of designing high-speed digital transmitter for over a decade. The main building...
Recently, a new paradigm of multiple access (MAC) along with one eavesdropper to achieve secrecy transmissions has been getting in focus. However, all existing work on such multiple access wiretap channel (MAC-WT) mainly concentrates on the secrecy performance of the system as a whole from an information theoretic perspective. In this work, we investigate the secrecy performance of a single transmitter...
Molecular Communication (MC) is an enabling paradigm for the interconnection of future devices and networks in the biological environment, with applications ranging from bio-medicine to environmental monitoring and control. The engineering of biological circuits, which allows to manipulate the molecular information processing abilities of biological cells, is a candidate technology for the realization...
We consider the multicast channel (MC), in which a transmitter broadcasts only a common message to two receivers. In our previous work, we have derived information-theoretic upper and lower bounds and showed that the two-round receiver cooperation (2RC) scheme, in which the receivers interactively perform compress-forward and then decode-forward, improves the MC achievable rate over different schemes...
Hybrid ARQ (HARQ) and link adaptation (LA) are two powerful techniques to improve the data throughput in wireless communication systems. However, when integrated with LA, conventional HARQ does not provide much gain over LA without significantly increasing the number of retransmissions and initial coding rate. In this paper, we explore the feasibility of achieving high throughput by combining HARQ...
In this paper, we develop selective retransmission schemes for multiple-channel systems. The proposed schemes are selective automatic repeat request with fixed bandwidth (SARQ-FB), selective chase combining with fixed bandwidth (SCC-FB) and selective automatic repeat request with variable bandwidth (SARQ-VB). The main objective of the proposed schemes is to use the available power and bandwidth budget...
We consider the following variant of the index coding problem. A transmitter wishes to communicate several messages, each of which is k bit long, to multiple informed receivers over a noisy broadcast link. Each informed receiver already knows some of the messages a priori, which is called its side information, and demands to know the rest of the messages. However, unlike in an index coding problem,...
Road accidents are one of the world's major public health and injury prevention problems. According to the World Health Organization (WHO), more than a million children are killed in road accidents each year, all over the world. The motivation behind this work is an attempt to make an Arduino based embedded system which makes the passenger's journey even safer and more secure. This paper handles the...
The achievable degree of freedom (DoF) boosting has been demonstrated on a single-input single-output (SISO) X channel by using outdated and instantaneous channel state information at transmitter (CSIT) synergistically, in contrast to that of using completely outdated CSIT. However, the means by which the DoF gain can be obtained in a multiple-input multiple-output (MIMO) system remains unclear. This...
We study the transmission of confidential messages across a wireless broadcast channel with K > 2 receivers and K helpers. The goal is to transmit all messages reliably to their intended receivers while keeping them confidential from the unintended receivers. We design a codebook based on nested lattice structure, cooperative jamming, lattice alignment, and i.i.d. coding. Moreover, we exploit the...
There are many research on hybrid selective-repeat ARQ method. In many previous research purposes have been to maximize a throughput on the number of messages delivered to the user. Important theoretical limits were studied under the condition that a decoding error was very small and neglected. In this research we propose the optimal type-I hybrid selective-repeat ARQ with finite receiver buffer....
This paper studies the problem of secure communication over broadcast channels under the individual secrecy constraints. That is, the transmitter wants to send two independent messages to two legitimate receivers in the presence of an eavesdropper, while keeping the eavesdropper ignorant of each message. A general achievable rate region is established by utilizing Marton's coding together with techniques...
We study energy harvesting (EH) transmitter and receiver, where the receiver decodes data using the harvested energy from the nature and from an independent EH node, named helper. Helper cooperates with the receiver by transferring its harvested energy to the receiver over an orthogonal fading channel. We study an offline optimal power management policy to maximize the reliable information rate....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.