The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a routing algorithm for wireless multi-hop ad hoc networks, which applies distributed source coding (DSC) and multi-path transport of data packets. DSC enables the relay nodes to efficiently encode the packets and helps the destination node to correctly decode the information from multiple erroneous copies of the same packet received via different paths. While in conventional communication...
The design of efficient wireless fronthaul connections for future heterogeneous networks incorporating emerging paradigms such as heterogeneous cloud radio access network (H-CRAN) has become a challenging task that requires the most effective utilization of fronthaul network resources. In this paper, we propose and analyze possible solutions to facilitate the fronthaul traffic congestion in the scenario...
Recent information theoretic results have shown that interference can be exploited in wireless relay-assisted networks to secure the information communicated between two legitimate network nodes from the potentially untrusted nodes. In this paper, we consider a two-hop multi-relay network with untrusted relays, where the destination node, aiming at securing the source node's information signal, designs...
In this paper, we study the performance of wireless information and power transfer in the presence of statistical queuing constraints. We consider harvest-then-transmit protocol in which users first harvest energy from a dedicated source and then transmit information through an uplink multiple access channel (MAC). Each user is subject to limitations on the buffer overflow probability, specified by...
In this paper, we consider a multiple-access broadcast channel (MABC) with ARQ feedback, in which M endusers wish to exchange messages with a central node or basestation. In this scenario, an end-user may overhear other endusers' messages prior to the re-transmission phase. We propose a new network coded (NCed)-ARQ scheme with reverse-link-assistance (RLA) that exploits this overheard information...
We design rateless codes for correlated multi-source relay networks over packet erasure channels. In particular, we optimize relay combining process of distributed Luby transform (DLT) codes for a multi-source single-relay network where information data is correlated among the sources. Density evolution is used to characterize the asymptotic performance in terms of unrecovered information symbols...
The paper investigates the scenario of wireless multicast with a single transmitter and multiple relays that jointly deliver successively refined (or multi-resolution) sources to multiple receivers. An asynchronous cooperative joint source-channel coding (JSCC) protocol is proposed, which can mitigate the complexity and difficulty in signal synchronization under the wireless multicast with cooperative...
A secure and efficient key agreement method is required by Wireless Body Area Network, especially for intersensor/controller communication. The communicating parties share similar channel information at physical layer that the others cannot grasp. The physical layer information-based key generation and agreement will only pass check symbols from one side to the other side of the communication channel...
Guaranteeing the secure delivery is a critical yet challenging issue in wireless transmission. In this paper, a secure delivery scheme that utilizing the dynamic fountain code design is proposed. Using fountain-coded transmission, the transmitter continuously sends fountain packets until the legitimate receiver successfully recovers the original data from a sufficient number of fountain packets. Secure...
We commenced two memory measure, and power productive algorithmic transmutation for the Viterbi Algorithm (VA) and genetic algorithm(GA). The first performs in-place ciphering marking down memory vital and bit transitions on the data address bus, although the second elucidate the traceback standard of expressive VA, Today the technology changes indubitable fast as it evoked from old stone (Palaeolithic)...
Modern wireless systems deal with the adverse and unpredictable channel conditions using two main transmission schemes considered as complimentary: adaptive modulation and coding (AMC) and hybrid ARQ (HARQ). In this work we use the effective capacity as the performance measure to evaluate different design options. We thus show how to calculate this performance measure under independent, identically...
The paper studies the scenario of wireless multicast with a single transmitter and a relay that jointly deliver successively refined (or multi-resolution) sources to multiple receivers. By taking the end-to-end mean square error distortion (EED) as the performance metric, the problems of power allocation at the transmitter and relay are formulated. Due to nonlinearity of the formulations, a generalized...
In this work, Automatic-Repeat-Request (ARQ) and Maximal Ratio Combination (MRC), have been jointly exploited to enhance the confidentiality of wireless services requested by a legitimate user (Bob) against an eavesdropper (Eve). The obtained security performance is analyzed using Packet Error Rate (PER), where the exact PER gap between Bob and Eve is determined. PER is proposed as a new practical...
A competent and fast decoding method for a Rate 3/4 Trellis Coded Modulation (TCM) used in Digital Mobile Radio systems, is proposed in this paper. Digital Mobile Radio (DMR) is a standard for digital radio. European Telecommunication Standard Institute (ETSI) developed the specification for the Professional Mobile Radio (PMR) users. TCM is a bandwidth efficient modulation. In TCM, doubling of constellation...
Airborne image service plays an important role in both government and commercial applications. These applications require reliable transmission of compressed images over wireless channels. Various image compression and wireless channel coding schemes have been separately developed in the past decades. However, the transmission quality supported by the existing algorithms can be attenuated by many...
In this paper, we study optimal resource allocation strategies for simultaneous information and power transfer (SWIPT) focusing on the system energy efficiency. We consider two-user multiple access channels in which energy harvesting (EH) and information decoding (ID) nodes are spatially separated. We formulate optimization problems that maximize system energy efficiency while taking harvested energy...
We present in this paper a MAC layer protocol capable to cope with lossy links in interference-prone wireless environments. Our approach exploits the recent advances in information theory and physical layer coding by relaying at intermediate nodes corrupted messages. To do so, we rely on collaboration between nodes and on a complete rethinking of the header structures and wireless access techniques...
Paper describes method that use intentional downsampling of the video sequence as part of the pre-processing step before being compressed, and the application of SR techniques as a post-processing of the compressed sequence. This scheme can be utilized as a bitrate control mechanism to optimize the overall quality of the high resolution (HR) reconstructed video. The main difference between the conventional...
Polar codes have been shown to approach capacity of symmetric binary erasure channels. This paper investigates the performance of polar codes over typical urban fading wireless channels. The wireless channel is modeled as a degraded erasure channel by using an inner convolution code. When the convolution code fails to correct any errors, the corresponding bits are discarded and treated as erasures...
This paper presents an economic, re-configurable, wireless communication system between two FPGAs (Spartan 3AN Starter Kit) using RF based wireless transmission at 433 MHz. This paper brings the two domains of Digital VLSI and Wireless communication, to accomplish the task of conveying data from source to destination. In this system, the 4-bit data generated at transmitter FPGA, is transmitted serially...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.