The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper considers the layered transmission between the source and the destination over two relays using super-position coding (SC). In this two-hop decode-and-forward (DF) relaying system, because of the network topology, the receiver continuously decodes only the base layer of the direct transmission from the source; the enhancement layer is decoded with a delay based on the transmission from...
Lattice codes used under the Compute-and-Forward paradigm suggest an alternative strategy for the standard Gaussian multiple-access channel (MAC). It has been proven that decoding an integer linear combination of the transmitted codewords enables higher data rates compared to decoding the messages individually. Recent work of Gasptar et al. proposed a new multiple access channel technique that they...
In this paper, we present a nonuniform quantizer based on the condition of maximum information rate achieved over uncorrelated Rayleigh fading channel and when successive cancellation (SC) decoding algorithm of polar codes is applied. Based on symmetry condition of random variables, we start with theoretical model where uniform scaling factors are applied to correct soft messages at the absence of...
This work presents a self-adaptation algorithm to automatically adjust the peaking settings of a continuous-time linear equalizer (CTLE) in a high-speed PAM4 receiver. A statistical approach is adopted to improve the robustness and flexibility of the adaptation algorithm. The PAM4 top level distribution around the peak value of several consecutive top levels guides the CTLE to attain the optimal digital...
In a binary input additive white Gaussian noise (BIAWGN) channel, belief propagation (BP) decoding for luby transform (LT) codes requires the knowledge of the signal-to-noise ratio (SNR) at the receiver to achieve its optimal performance. An erroneous estimation of the SNR at the decoder is referred to as “SNR mismatch”. SNR mismatch can significantly degrade the BP decoding performance of LT codes...
Molecular communications (MC) is a promising paradigm which utilizes molecules to implement communication among nano-machines. Cooperative relaying strategies can be used to extend communication distance and achieve reliable remote communications. In this paper, a two-hop diffusion-based molecular communication with three nano-machine nodes is considered. To mitigate the drawback of traditional cooperative...
The existing secure transmission methods based on fountain codes require a quite dominant quality of the main channel. In this paper, we propose a novel feedback-based method for fountain code to achieve stronger security. In the binary erasure channel model, the legitimate user shares the decoding situation with transmitter via feedback messages. The transmitter updates the coding process based on...
This paper studies an uplink simultaneous wireless information and power transfer (SWIPT) system with non-orthogonal multiple access (NOMA), consisting of two users and one energy-harvesting access point (AP). The users transmit their independent information simultaneously to the AP which harvests energy and decodes information at the same time by dynamic power splitting (DPS). We focus on the ergodic...
In this paper Barnes-Wall lattices for the K-user symmetric interference channel are considered. This paper is inspired by the work of Jafar [1], where a deterministic model is used in order to build a scheme to obtain the generalized degrees of freedom for each type of interference. The scheme uses a base Q expression to build the transmitted signals. This is an inspiration for [2] where, for some...
The Gaussian fading channel is studied, in which the channel from the transmitter to the receiver is corrupted by a multiplicative fading coefficient H and an additive Gaussian random noise. It is assumed that the channel is experiencing block fading, and the transmitter does not know the channel state information (CSI). The receiver is assumed to have full knowledge of the CSI. If the channel state...
The mobile underwater acoustic channel has brought a great challenge on the encoding and decoding process. The recent development of underwater acoustic processing method aims to get a lower bit error rate(BER). However, the controdiction between lower BER and real-time transmission are not well solved. In this paper, we reach a compromise between them, we combine the turbo code with the adaptive...
A direct spread spectrum (DSS) communication system is presented, which uses optimized spread spectrum sequence (SSS) and adaptive soft-iteration (Turbo) equalization (ASIE). The scheme using multiple receiver is similar to MIMO systems. The average cross-correlation of SSS is regarded as a critical factor to search optimized sequences used in under water acoustic (UWA) multi-access burst communication...
In this paper we present a scalable multi-view video streaming system with client-side view interpolation. Most parts of the system have been shown to be able to perform in real-time, but never as a complete system. Even though our algorithms are not yet highly optimized, we show that running a complete multi-view streaming system video on consumer hardware is possible today. Since multi-view coding...
In this article a new class of receiver subsystems is introduced to enhance the performance of detection of signals in wireless sensor networks. The receiver design is applicable for detection of signals from any active or passive sensor, and ideal specifically for passive Radio Frequency Identification (RFID) tags. The system proposed herein employs iterative algorithms based on so called “Turbo...
In this work we present construction of Space Time Block Codes (STBC) from Abelian codes. A well known Eisenstein-Jacobi rank preserving map is applied to map the codeword matrix symbols to symbols in the complex plane. We then propose an NT × NR MIMO (multiple input, multiple output) communication system employing the constructed STBC. An analysis on the receiver (decoder) computational complexity...
In this paper, an accurate QR decomposition based link level performance abstraction technique for a multi-input multi-output iterative receiver is proposed. The post-detection SNR values for an iterative receiver are estimated using QR decomposition of the channel matrix. The effect of channels on the received SNR is realized by scaling the signal in accordance with the leading diagonal elements...
Although, it was shown that NC is a promising technique to improve the throughput; especially for multicast environment; it also bears negative side-effects (e.g., high decoding delay). Since streaming video are usually subject to strict delay constraints, high decoding delay must be resolved to enhance the performance of the NC schemes. To overcome this issue, this paper presents a new scheme named...
We define a multiaccess communication scheme that effectively eliminates interference and resolves collisions in many-to-one and many-to-many communication scenarios. Each transmitter is uniquely identified by a coding vector. Using these vectors, all signals issued from a specific transmitter will be aligned along a unique dimension at all receivers hearing this transmission. This dimension is characteristic...
Multilayer coding represents an appealing solution for the broadcasting of common data when we want to ensure the receivers decode the signal with different distortion levels depending on the quality of the received signal. In addition, the combination of digital and analog techniques to encode the source data allows to solve the limitation of these approaches when they are applied separately. In...
The RTCA DO-260B document has stimulated since a few years ago the adoption of novel algorithms to improve the ability of receivers to detect and decode ADS-B signals, with particular emphasis on preamble detection, declaration of bit state and confidence level, detection and correction of errors. Motivated by an industry-driven project, this paper reports on performance analysis of a set of enhanced...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.