The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hybrid architectures are generally composed of a cyber cloud with additional support of edge caching. By utilizing the benefits associated with cloud computing and caching, powerful enhanced interference management techniques can be readily utilized — that among others — also results in low-latency transmission. In this paper, we study the impact of cloud and edge processing on the latency for a heterogenous...
In this paper, we consider the design of multi-resolution non-coherent multiple-input multiple-output (MIMO) systems that enable Unequal Error Protection (UEP). A method for designing multi-layer non-coherent Grassmannian constellations is introduced. Specifically, the proposed method yields multi-layer constellations that are amenable to a natural set partitioning strategy. The resulting subsets...
In this paper, we investigate the cooperative data exchange (CDE) using instantly decodable network coding (IDNC) across the wireless nodes. We model the problem using the cooperative game theory in partition form. Unlike most of existing works concerning IDNC, we focus not only on the decoding delay, but also the consumed energy in order to increase the network lifetime. A distributed merge-and-split...
We consider nonlinear transceiver design for downlink multiuser multi-antenna secure communications with an external multi-antenna eavesdropper. The multi-antenna transmitter simultaneously transmits confidential-message-bearing signals and artificial noise (AN) using nonlinear Tomlinson Harashima precoding based on the limited channel state information feedback. For the proposed nonlinear secure...
We study the broadcast transmission of a single file to an arbitrary number of receivers in a wireless one-hop setting, using random linear network coding (RLNC). In contrast to similar studies, we apply RLNC within segments of the file. In a previous study, we showed that this method can achieve near optimal file transfer completion time while tackling the main drawbacks of RLNC; increased decoding...
Network-coded (NCed) automatic repeat request (ARQ) techniques have been shown to provide significant throughput improvements over basic ARQ systems in two-way wireless systems. Most results derived so far, however, used the assumption of no extra overhead. In practical systems, NCed-ARQ requires more information exchange between base-station and end-nodes, and therefore it is crucial to study the...
We consider a dual-hop wireless network where an energy constrained relay node first harvests energy through the received radio-frequency signal from the source, and then uses the harvested energy to forward the source's information to the destination node. The throughput and delay metrics are investigated for a decode-and-forward relaying mechanism at finite blocklength regime and delay-limited transmission...
In this paper, we propose a design of spatially coupled repeat-accumulate (SC-RA) codes over a three-phase bidirectional relay. The channels between the nodes are assumed binary input additive white Gaussian noise (BIAWGN) channels, while decode-and-forward (DF) relaying is considered at the relay. We present low complexity density evolution analysis for the proposed bidirectional relay code, which...
Recently, data transmission has become more important in our daily life. The developments of communication component are diverging with electromagnetic (EM) techniques. According to the popularity of wireless communications, the limitations of transmission also appear. Especially, electromagnetic interference (EMI) and frequency spectrum shortage would limit the application of wireless communication...
We characterize time and power allocations to optimize the sum-throughput of a Wireless Powered Communication Network (WPCN) with Non-Orthogonal Multiple Access (NOMA). In our setup, an Energy Rich (ER) source broadcasts wireless energy to several devices, which use it to simultaneously transmit data to an Access Point (AP) on the uplink. Differently from most prior works, in this paper we consider...
This paper presents a new technique for providing the analysis and comparison of wiretap codes in the small blocklength regime over the binary erasure wiretap channel. A major result is the development of Monte Carlo strategies for quantifying a code's equivocation, which mirrors techniques used to analyze forward error correcting codes. For this paper, we limit our analysis to coset-based wiretap...
We consider a multiple access relay channel (MARC) network consisting of two sources, one relay, and one common destination applying compute-and-forward (CF) strategy. We show that the direct application of CF to the MARC network results in poor error performance bounded by (p + 1)−1, the probability of rank deficiency of the coefficient matrix over Fp. To solve this problem, we propose two practical...
Hybrid ARQ (HARQ) and link adaptation (LA) are two powerful techniques to improve the data throughput in wireless communication systems. However, when integrated with LA, conventional HARQ does not provide much gain over LA without significantly increasing the number of retransmissions and initial coding rate. In this paper, we explore the feasibility of achieving high throughput by combining HARQ...
Wireless technologies gain importance in various fields of industrial communication as they facilitate control and data acquisition tasks. In this context, Parallel Sequence Spread Spectrum (PSSS) is a promising new approach. The parametrization of a PSSS system is very flexible and thus can be precisely adapted to the application's requirements. Independent of the PSSS parametrization, the transmission...
In this paper, we propose new Raptor codes suitable for uplink Internet of Things using single carrier transmission technique (SC-IoT) with low density parity check (LDPC) codes as the precode, called LDPC-Raptor codes. The utilization of LDPC as the precode is to guarantee high capability of error correction for better Raptor codes performance while keeping the computational complexity low. Raptor...
We consider an energy harvesting (EH) based cooperative relaying network, where two half-duplex relays can alternatively forward source data to the destination. The power-splitting technique is implemented at each relay. That is, part of the received source signal and inter-relay interference is allocated for the EH, while the remaining part is used for the information decoding (ID). The inter-relay...
Phase offset is inevitable in asynchronous physical-layer network coding (PNC) systems, which restricts the accuracy of PNC decoding. To address this issue, this paper proposes a half-blind equalization based on pre-distortion. In the scheme, the intentional phase distortion is pre-brought into the symbols of one user, and then, it is utilized by the relay to equalize the received signals and modify...
Physical-layer security is emerging as a promising paradigm of securing wireless communications against eavesdropping, with the purpose of improving the transmission reliability of the main link. We propose a best relay selection scheme with multi-eavesdropper cooperation, and deduce the corresponding outage probability and the intercept probability. The simulation results show that he proposed scheme...
This paper studies the simultaneous wireless information and power transfer (SWIPT) in the multi-carrier differential chaos shift keying (MC-DCSK) communication system. Two energy harvesting protocols with a power splitting (PS) receiver are considered. In the first protocol, only a fraction of reference sub-carrier signal are used for energy harvesting (EH). In another one, a fraction of all sub-carriers...
We analyze secrecy of a dual-hop cooperative system consisting of multiple decode-and-forward relays in delay-constrained environment using rateless code, where there exists a separate time limit for both the hops. During the first hop, source carries out rateless coded transmission in the allotted time. Relay nodes which have successfully acquired target entropy forwards the information to the destination...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.