The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we apply an efficient scaling strategy on layered scaled min-sum LDPC decoder. In addition, we propose a joint optimization strategy for the quantization and scaling parameters of layered scaled min-sum LDPC decoder. The study of our optimization results, for DVB-S2 LDPC codes with different constellation sizes and code rates, shows that each constellation size code rate pair has different...
By developing one-shot mutual covering lemmas, we derive a one-shot achievability bound for broadcast with a common message which recovers Marton's inner bound (with three auxiliary random variables) in the i.i.d. case. The encoder employed is deterministic. Relationship between the mutual covering lemma and a new type of channel resolvability problem is discussed.
In this paper, we explore code optimization for two-user discrete memoryless interference channels (DMICs) wherein the inputs and outputs of the channel are from a finite alphabet. For encoding, we employ irregular low-density parity-check (LDPC) codes combined with non-linear trellis codes (NLTCs) to satisfy the desired distribution of zeros and ones in the transmitted codewords. At the receiver...
A protograph-based low-density parity-check (LDPC) code design technique for bandwidth-efficient coded modulation is presented. The approach jointly optimizes the LDPC code node degrees and the mapping of the coded bits to the bit-interleaved coded modulation (BICM) bit-channels. For BICM with uniform input and for BICM with probabilistic shaping, binary-input symmetric-output surrogate channels are...
Energy harvesting is a promising solution to prolong the lifetime of energy-constrained wireless sensor networks. In particular, scavenging energy from ambient radio frequency (RF) signals has drawn a lot of attention recently. In this paper, we apply simultaneous wireless information and power transfer (SWIPT) to a clustered sensor network such that a cluster head node harvests the wireless energy...
Forward error correction techniques are commonly used for delay-sensitive video streaming applications. Streaming of compressed videos can usually withstand a certain level of packet loss, depending on the compression methods and error concealment techniques. In this paper, a QoS-driven optimization algorithm is proposed for the streaming of scalable videos using layer-aligned multipriority rateless...
In this paper, we study the impact of a full-duplex secondary node on a cognitive cooperative network with Multipacket Reception (MPR) capabilities at the receivers. Motivated by recent schemes that make full-duplex communication feasible, we study a model with one primary and one secondary transmitter-receiver pair, where the secondary transmitter is able to relay primary unsuccessful packets. Cooperation...
Various versions of the Vehicle Routing Problem (VRP) have been studied for many years. VRP is a static problem, while in the real world, many problems have dynamic nature. In the Dynamic VRP (DVRP), not all information about the problem is known at the beginning of the planning horizon, and, in most cases the information can change after the solution process begins. This two characteristics make...
The design of low-density parity-check (LDPC) code ensembles optimized for a finite number of decoder iterations is investigated. Our approach employs EXIT chart analysis and differential evolution to design such ensembles for the binary erasure channel and additive white Gaussian noise channel. The error rates of codes optimized for various numbers of decoder iterations are compared and it is seen...
In this paper we argue that to produce good optimization performances, the exploration of the solution space does not need to be carried out in the unorderly fashion most evolutionary algorithms use. Other strategies that seek to minimize the cost involved in successive evaluation processes should be explored. This does not imply a fundamental change on how evolutionary algorithms work, but rather,...
We study the rate control problem for video transmission environments which require real-time encoding and transfer of the video data, and where rate-distortion (RD) optimal rate control approaches requiring a long encoding delay cannot be used. We propose two novel RD optimized rate control approaches based on dynamic programming and Lagrangian optimization.
We consider the general MIMO relay network with K user pairs and R relays. The model to maximize the total signal to total interference plus noise ratio, with individual relay transmit power constraints, is set up. We constrain the precoding matrices to have orthogonal columns to guarantee multiple stream transmission. By alternating iteration method, we decompose the problem into several subproblems...
The Cayley unitary (CU) codes constitute a systematic way of constructing unitary space-time modulations for noncoherent MIMO communications. For MIMO systems employing CU codes, there is no explicit expression for block (or bit) error probabilities. Hence, deterministic optimization tools cannot be employed to design the optimal CU codes. In this work, we propose to optimize the design of CU codes...
Soft errors have been a concern in memory reliability for many years. With device feature size decreasing and memories density increasing, a single event upset (SEU) in memory may generate adjacent bit upsets in a word that may cause data errors. To avoid data errors in memories, Error Correction Codes (ECCs) are used. As multiple bits affected become frequent, the Single Error Correction (SEC) codes...
This paper designs protograph-based Raptor-like (PBRL) codes as a class of rate-compatible (RC) LDPC codes for binary-erasure channels (BEC). Similar to the Raptor Codes, the RC property is achieved by X-OR operations of the precoded bits. The additional parity bits, which lower the rate, are selected such that their connections in the protograph optimize the density evolution threshold. In order...
A power optimized communication system is proposed in this paper with clock gating technique. The encoder decoder block and the converter circuits are designed using clock gating for power optimization without degrading the system performance. Unwanted switching activities can be much reduced by using clock gating techniques and power saving can be done. Negative latch has been used to generate the...
The Data Distribution Service (DDS) based on the Publish and Subscribe (PUB/SUB) communication model provides a high flexible data transmission for real-time applications, yet it faces a significant challenge for achieving reliable multicast. The ARQ-based error control adopted in the DDS is effective only when the channel condition is moderately good, and is also vulnerable to feedback implosion...
In this paper, we propose a new optimization-based access strategy of multi-packet reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum. We devise an analytical model that realizes the multi-packet access strategy of the SUs. All the network receiving nodes have MPR capability. We aim at maximizing the throughput of the individual SUs subject to the PU's...
In Small cell environment, network monitoring is required so that Home eNB (evolved node base-station) can perform self operations to configure itself, maintain the services by organizing itself and in case of any failure can heal itself. NMM (Network Monitor Mode) is a part of physical layer that does the sniffing of neighbor cells and helps in the monitoring of the network. It can be accessed through...
Following the long-term goal of substituting conventional power generation, market oriented approaches will lead to interaction, competition but also collaboration between different units. Together with the expected huge number of actors, this in turn will lead to a need for self-organized and distributed control structures. Virtual power plants are an established idea for organizing distributed generation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.