The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider an energy harvesting two-way channel with decoding costs. In this system, each node spends energy to transmit data to the other user, and also to decode data coming from the other user; that is, each user divides its harvested energy for transmission and reception. The power needed for decoding the incoming data is a function of the incoming data rate. We determine the optimal offline...
In this work, the stability region of the broadcast channel (BC) is explored, where the receiver, for which the packets need to be kept secret from the other receiver has full-duplex (FD) capability. The effect of self-interference on the stability region has also been investigated. In particular, the stability region is characterized under two types of decoding schemes: (a) both the receivers perform...
In this paper, we propose a serially concatenated turbo-encoded faster-than-Nyquist signaling (FTNS) transceiver that takes into account FTNS-specific colored noise effects. The proposed low-complexity receiver carries out soft-decision frequency-domain equalization with the aid of the minimum-mean square error criterion while whitening the colored noise. Simulation results demonstrate that the proposed...
Guaranteeing the secure delivery is a critical yet challenging issue in wireless transmission. In this paper, a secure delivery scheme that utilizing the dynamic fountain code design is proposed. Using fountain-coded transmission, the transmitter continuously sends fountain packets until the legitimate receiver successfully recovers the original data from a sufficient number of fountain packets. Secure...
Modern wireless systems deal with the adverse and unpredictable channel conditions using two main transmission schemes considered as complimentary: adaptive modulation and coding (AMC) and hybrid ARQ (HARQ). In this work we use the effective capacity as the performance measure to evaluate different design options. We thus show how to calculate this performance measure under independent, identically...
Automatic repeat request (ARQ) is widely used in modern communication systems to improve transmission reliability. In conventional ARQ protocols developed for systems with energy-unconstrained receivers, an acknowledgement/negative-acknowledgement (ACK/NACK) message is fed back when decoding succeeds/fails. Such kind of non-adaptive feedback consumes significant amount of energy, and thus will limit...
In this paper, the fundamental limits of decentralized simultaneous information and energy transmission in the two-user Gaussian multiple access channel (G-MAC) are fully characterized for the case in which a minimum energy transmission rate b is required for successful decoding. All the achievable and stable information-energy transmission rate tuples (R1, R2, B) are identified. R1 and R2 are in...
We consider the problem of transmitting confidential messages over a two receiver broadcast channel. Two private messages are to be communicated, one to each of the two receivers. Each message is to be kept secret from the unintended receiver. Secret keys are available at fixed rates between each receiver and the transmitter. Various regimes of the key rates are described and achievable schemes are...
WiBeD2: As the name suggests it is a Wireless BEll for Deaf and Dumb. Generally bells are meant for calling the people in a house, but how can a deaf or a dumb respond to bells. A Deaf cannot hear to the bell and a dumb cannot respond to the calling bell. Therefore, we have brought forward a simple low cost feasible system to help the deaf and the dumb to respond effectively to the person knocking...
This paper presents an economic, re-configurable, wireless communication system between two FPGAs (Spartan 3AN Starter Kit) using RF based wireless transmission at 433 MHz. This paper brings the two domains of Digital VLSI and Wireless communication, to accomplish the task of conveying data from source to destination. In this system, the 4-bit data generated at transmitter FPGA, is transmitted serially...
For overcoming the scarcity of frequency resources, spectrum efficiency should be always enhanced by adopting the novel transmission methods. Nowadays, there are a few brilliant transmission technique in academic investigation area such as interference alignment, multi-cell beamforming and cooperative communication. Interference alignment has received the spotlight to enormously enhance the spectral...
Turbo compressive sensing is a sparse signal transmission technique over an AWGN channel. In this method, compressive sensing is applied as a source encoder serially concatenated with a convolutional channel encoder which thus makes up the transmitter system model. At the turbo compressive sensing receiver, a mapping method, following the channel and source decoding, is used to generate extrinsic...
In recent years, there has been enormous interest in millimeter (mm) wave communication systems such as IEEE 802.11ad and IEEE 802.15.3c operating in higher and unused frequency bands. To make system more resilient in time varying, multipath fading channels, a modulation scheme called π/2-quadrature phase shift keying (QPSK) along with a forward error control (FEC) scheme has been proposed in these...
This paper studies communication scenarios where the transmitter and the receiver have different objectives due to privacy concerns, in the context of a variation of the strategic information transfer (SIT) model of Sobel and Crawford. We first formulate the problem as the minimization of a common distortion by the transmitter and the receiver subject to a privacy constrained transmitter, We show...
The design of artificial-noise-aided secure transmission over multiple-input, single-output, and multi-antenna eavesdropper (MISOME) slow fading channels is addressed in this paper. We consider the scenario where the messages sent by N-antenna transmitter are overheard by a K-antenna eavesdropper. The instantaneous channel state information of the eavesdropper's channel is assumed to be unknown to...
We propose a linear precoder for the layered space-time block coding system [2] over spatially correlated channels with channel covariance matrix feedback at the transmitter. The precoder is a combination of the well known waterfilling solution and the precoder for spatial multiplexing system that minimizes the probability of decoding error. At the receiver, decoding schemes of group zero-forcing...
In this paper, simultaneous wireless information and energy transmission is studied from an information theoretic standpoint. The main contribution is twofold: (i) the capacity-energy region of the memoryless Gaussian multiple access channel is fully characterized; and (ii) the maximum sum-rate that can be achieved when a minimum energy level is required at the input of the receiver is determined...
In this paper, a rate allocation policy is proposed for truncated transmission of spinal codes based on imperfect feedback over block fading channels. By constructing and solving the throughput optimization problem, the optimized rate allocation policy is obtained under the constraint of limited transmission attempts and frame error probability. Both analysis and simulations show that the rate-allocated...
A friendly eavesdropper assists communication in a broadcast scenario in which one transmitter wishes to send a common message to two receivers in the presence of a malicious jammer. The jammer attempts to disrupt communication by transmitting a high power Gaussian signal, whereas the friendly eavesdropper ‘hears’ the jammer's transmission and sends an assisting signal to the destinations over an...
Data movement over long on-chip interconnects is a major contributor to system energy. This paper presents novel signaling and encoding techniques that toget her improve the energy efficiency of data communication between the processor cores and the last level cache. The proposed techniques make the interconnect energy proportional to the number of ones in the transferred data block (i.e., the block's...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.