The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A non-orthogonal multicarrier signal, termed spectrally efficient frequency division multiplexing (SEFDM), is investigated in this work. It improves spectral efficiency by compressing sub-carrier spacing below the symbol rate at the cost of self-created inter carrier interference (ICI). Sphere decoding (SD) is an efficient method to recover signals approaching maximum likelihood (ML) performance....
This paper concerns the uplink (UL) and downlink decoupled access in heterogeneous networks (HetNets) with multi-antenna base stations (BSs). Departure from the traditional minimum pathloss policy, a maximum UL signal-to-noise ratio (SNR) user association policy that takes account of multiple antennas at BSs is proposed. Based on the proposed association policy, the UL association probabilities and...
HBT effect of thermal light between different modes based on multi-mode interference is directly observed in a modified Michelson interferometer with orthogonal polarizations by a two-photon absorption detector at ultrashort timescale, which serves as a new unique tool for ultrafast quantum bunching distribution.
We present a novel single-shot text detector that directly outputs word-level bounding boxes in a natural image. We propose an attention mechanism which roughly identifies text regions via an automatically learned attentional map. This substantially suppresses background interference in the convolutional features, which is the key to producing accurate inference of words, particularly at extremely...
Electromagnetic interference can cause severe degradation of the performance of wireless communication systems. In order to predict or handle the performance degradation, methods for calculating the impact of the interference is needed. However, for a communication system that is subjected to several impulsive interference sources, the performance is hard to calculate exactly. In addition, using standard...
Electronic systems can cause electromagnetic interference that disrupt radio and wireless systems. This is typically unintentional interference and it has been known for about a century now. Nowadays, dedicated jamming equipment is sold openly and at low cost via Internet. This implies that intentional interference can become more common. In this paper results from a measurement campaign of the interference...
In next generation communication systems high data rate, and higher transmission capacity through wireless channel are important for researchers. Filter bank based multicarrier (FBMC) modulation with offset quadrature amplitude modulation (OQAM) makes researchers interested due to its advantages over orthogonal frequency division multiplexing (OFDM). The paper indicates that OFDM, FBMC-QAM, multiple-input...
We demonstrate a novel architecture for a THz near-field probe, which enables coherent imaging with subwavelength spatial resolution using THz quantum cascade lasers. An InAs nanowire acting as a THz detector based on the field effect transistor concept is integrated inside a subwavelength input aperture of the near-field probe to detect intensity of the THz field and its phase. To determine the phase...
By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes...
This paper presents a low-complexity two-dimensional (2D) detection strategy for shingled magnetic recording (SMR) media. The detection strategy involves the use of multi-level 2D BCJR detector along-track for inter-symbol interference (ISI) cancellation and regular BCJR detector across tracks for inter-track interference (ITI) cancellation. This is applied in a multi-track two dimensional magnetic...
This paper considers the problem of knowledge-aided space-time adaptive processing (KA-STAP) combined with a parametric technique. Specifically, by modeling the disturbance as a multichannel autoregressive (AR) process, we introduce a stochastic signal model in which the spatial covariance matrix of the disturbance is assumed to be random, with some prior distribution. Incorporating the a priori knowledge...
Radio frequency interference (RFI) can corrupt passive remote sensing measurements taken with microwave radiometers. With the increasingly utilized spectrum and the push for larger bandwidth radiometers, the likelihood of RFI contamination has grown significantly. In this work, an eigenvalue-based algorithm is developed to detect the presence of RFI and provide estimates of RFI-free radiation levels...
An indoor visible light communication (VLC) system using white light-emitting diodes (LEDs) usually consists of multiple optical attocells, such that it can achieve full coverage of an indoor environment. The performance of an indoor multi-cell VLC system could be significantly degraded by inter-cell interference (ICI). To address the ICI issue, we propose and investigate an angle diversity multi-element...
Signal demodulation in short range multi-path channel plays an important role in communication system. The existed wireless communication system in short range multi-channel achieve signal demodulation by using a equalizer to minimize the effect of inter-code crosstalk caused by the channel before the signal detection. However, channel equalization methods are either with high complexity or a waste...
A single pixel Holoscopy for 3D high resolution optical imaging acquisition method is proposed. By using compressive sensing theory in holoscopy, we fully reconstruct the wave field from a single hologram with only 10% sampling ratio.
Heralded single-photon sources (HSPS) are widely used in experimental quantum science because they have negligibly small jitter and can therefore achieve high visibility for quantum interference. However, it is necessary to decrease the photon generation rate to suppress multi-photon components. To address this problem, two methods have been proposed and discussed: spatial (or temporal) source multiplexing...
Ambient backscatter is a new technology that utilizes existing wireless signals of other communication systems to enable small devices to communicate with each other. One key problem for ambient backscatter is that if it will result in interference on existing communication systems. We investigate this problem in this paper. Specifically, we build up the theoretical system model for the ambient backscatter...
Indoor positioning for visible light communication (VLC) has gained significant attentions recently with the popularity of light-emitting diodes (LEDs). In this paper, we consider a typical application of VLC by proposing a three-dimensional positioning scheme for a target terminal equipped with multiple photodiodes (PDs). Given the relative coordinates between the target terminal and receiving PDs...
With the reuse of identical training sequences by users in different cells, massive MIMO is severely affected by pilot contamination due to residual error in channel estimation. In this paper, we consider the traditional structure of the training phase, where orthogonal pilot sequences are reused, and analyze a recently proposed group- blind detector in the uplink of an interference- limited network...
In this work, we introduce a powerful hardware-based rogue access point (PrAP), which can relay traffic between a legitimate AP and a wireless station back and forth, and act as a man-in-the-middle attacker. Our PrAP is built of two dedicated wireless routers interconnected physically, and can relay traffic rapidly between a station and a legitimate AP. Through extensive experiments, we demonstrate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.