The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To improve the power-spectral efficiency trade-off of intensity-modulated direct-detection (IM/DD) optical transmissions, enhanced unipolar orthogonal frequency-division multiplexing (eU-OFDM) was recently introduced. Uncoded eU-OFDM systems have been presented in literature but coding techniques to further improve the reliability of transmissions over such systems have not yet been explored. Applying...
State-of-the-art NAND flash chips experience significant channel noise impairments and raise several data reliability issues. To overcome these issues, low-density parity-check (LDPC) codes are becoming the main stream error-correcting-codes in flash memory controllers. Consequently, the long belief-propagation (BP) decoding latency starts to deteriorate the system performance. In this paper, a low-complexity...
We consider the problem of reliable and information theoretically secure communication over adversarial multi-path networks. The adversary, hidden in the multi-path network, is able to eavesdrop on and jam (possibly distinct) subsets of links. We study three types of problems — communication in the presence of non-causal adversaries, causal adversaries, and causal adversaries with passive feedback...
In this work, we propose the construction of distributed turbo network codes that have close-to-outage probability performance over the quasi-static fading multiple-access relay (MARC) channel, where two users share a common relay to transmit their information to the destination. Our designs are based on full-diversity channel multiplexing schemes initially developed for point-to-point block fading...
Recent studies show that dynamic scheduling using the latest available information is superior to the flooding scheduling. While the existing works on informed dynamic scheduling focus on belief propagation (BP) based algorithm for binary LDPC codes, in this paper we devise novel methods which are appropriate for majority-logic decoding of non-binary LDPC codes. Firstly we propose a low complexity...
In this paper, we propose a selectively polarized concatenation structure for polar codes. We first divide the polarized bit-channels into three types, i.e., good, intermediate and bad bit-channels according to their Bhattacharyya parameter. Then, through combining several information blocks, the intermediate bit-channels are further polarized to enhance polarization rate. Theoretical and numerical...
The design of artificial-noise-aided secure transmission over multiple-input, single-output, and multi-antenna eavesdropper (MISOME) slow fading channels is addressed in this paper. We consider the scenario where the messages sent by N-antenna transmitter are overheard by a K-antenna eavesdropper. The instantaneous channel state information of the eavesdropper's channel is assumed to be unknown to...
In Digital Linear Dropout (Digital LDO) implementation for System-On-Chips (SOC), the power gates operate in triode region and are distributed in bank structure. With wide dropout, the current distribution in the power gate bank turns out to be the key challenge. The proposed work presents a methodology/algorithm to distribute the current flowing through the bank of a digital LDO uniformly in a 14nm...
To account for the problems of long delay, large loss, low SNR and no feedback information in IPN (InterPlaNetary Internet) backbone network, we proposed multihop relay protocols based on fountain codes. The rateless property, erasure property and no need feedback of fountain codes, which combined the advantage of relay make us propose the Random Linear Network Coding (RLNC) based and LT code based...
In current 3D video coding solutions, such as the 3D-HEVC standard, depth data is instrumental to have a continuum of views synthesized at the decoder based on a limited set of coded views. In order view synthesis may be performed at the decoder, depth data is currently directly acquired or estimated at the encoder based on very few neighboring views and transmitted to the decoder after appropriate...
A technology of improving the security of telecommunications systems is offered. The main features of the technology is the adaptation of turbo codes in conditions of jamming, which give rise to uncertainties in the process of decoding turbo codes, and the use of encryption algorithms and protection against network attacks. This technology can significantly improve the stability of the system to the...
A broadcast transmission scheme for multimedia broadcast multicast services (MBMS) is proposed using a coded system with users' feedback in wireless systems. In the proposed transmission scheme, it is possible to adjust the transmission rate with binary users' feedback signals to maximize the overall throughput for a given set of users as a user-ware broadcast transmission scheme. The proposed scheme...
In this paper, we utilize the knowledge of frame type and structure combined with multimode precoded MIMO transmission scheme for video stream, in order to achieve a better tradeoff of physicl layer performance (eg., SER) and the transmission delay via a proposed two-stage selection algorithms. The algorithm adaptively selects the optimal transmission mode (DIV or MUX) and the corresponding precoder...
In single-level cell flash memory, the most popular error correction code used for protection of the stored data is Bose-Chaudhuri-Hocquenghem (BCH) codes. However, BCH codes are not adequate to meet the error requirements of multi-level cell flash memory. Serial concatenation of codes increases the error correcting capability of the resulting system. Hence, a favorable concatenated coding scheme...
The computation of the reliability inferences among the variables of a single-parity-check (SPC) code is a common challenge to the implementation of channel decoders. Applicable to a variety of computational mechanisms using disparate kernels, a parallel-routing network has been developed, which is, compared to the state-of-art structure, exploring the best of its parallel nature for an improved timing...
Resistive random access memory (RRAM) has been recognized as one of the most promising candidates for next generation non-volatile memory due to its simple structure and excellent scalability. However, poor reliability is a serious issue for RRAM memory applications. To improve the reliability and endurance, many researchers changed the cell material, process and structure. Here, in this paper, we...
This paper investigates reliable and secure transmissions over the Gaussian wiretap channel. A physical layer coding scheme based on Low-Density-Parity-Check (LDPC) codes with granular Hybrid Automatic Repeat reQuest(HARQ) protocol is presented. HARQ granularity aims at sending coded data at the minimum rate required for legitimate successful decoding while minimizing the information leakage that...
Multiple measurements of a physical or biometric identifier are used at the decoder of a secrecy system to improve the secret-key vs. privacy-leakage capacity region of the single-measurement case. The capacity regions of doubly symmetric binary sources with multiple measurements are derived by applying Mrs. Gerber's lemma to mixtures of binary channels.
In this paper we proposed correcting codes-based on modular arithmetic — to improve the data transmission robustness in wireless sensor networks. We developed a new method and algorithm for the detection and correction of multiple errors. The codes are characterized by high correction characteristics as well as the simplified coding procedure1.
Recently wireless sensor networks have been shown to be very attractive for many wireless communications applications. A large number of very tiny sensors spread over the area under consideration constitute the wireless sensor networks. These tiny sensors have limited power resources. Due to limited built-in battery life-time at each sensor, minimizing power consumption in the sensors is an important...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.