{"title":"Upper and lower redundancy of finite frames","authors":"B. Bodmann, P. Casazza, Gitta Kutyniok","doi":"10.1109/CISS.2010.5464807","DOIUrl":"https://doi.org/10.1109/CISS.2010.5464807","url":null,"abstract":"The objective of this paper is to improve the customary definition of redundancy by providing quantitative measures in its place, which we coin upper and lower redundancies, that match better with an intuitive understanding of redundancy for finite frames in a Hilbert space. This motivates a carefully chosen list of desired properties for upper and lower redundancies. The means to achieve these properties is to consider the maximum and minimum of a redundancy function, which is interesting in itself. The redundancy function is defined on the sphere of the Hilbert space and measures the concentration of frame vectors around each point. A complete characterization of functions on the sphere which coincide with a redundancy function for some frame is given. The upper and lower redundancies obtained from this function are shown to satisfy all of the intuitively desirable properties. In addition, the range of values they assume is characterized.","PeriodicalId":118872,"journal":{"name":"2010 44th Annual Conference on Information Sciences and Systems (CISS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130768671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iterative row-column soft-decision feedback algorithm using joint extrinsic information for two-dimensional intersymbol interference","authors":"Yiming Chen, B. Belzer, K. Sivakumar","doi":"10.1109/CISS.2010.5464706","DOIUrl":"https://doi.org/10.1109/CISS.2010.5464706","url":null,"abstract":"In this paper, we redesign the previous iterative row-column soft decision feedback algorithm (Cheng et al., 2007) for a two-dimensional intersymbol interference channel with additive white Gaussian noise; a 2 × 2 averaging mask and two 3 × 3 masks are considered. In particular, we consider the joint statistics for a block of pixels involved in the exchange of extrinsic information between the detectors; previously, these pixels were considered to be statistically independent. The new algorithm, referred to as the block (BLK) algorithm, provides more than 1 dB SNR gain; the resulting performance is within 0.3 dB from the maximum likelihood bound for the masks considered. To address the increased computational and storage complexity introduced by the joint statistics, we have developed a simplified version of the block (SBLK) algorithm. Experimental results demonstrate that the SBLK algorithm performs almost as well as the BLK algorithm.","PeriodicalId":118872,"journal":{"name":"2010 44th Annual Conference on Information Sciences and Systems (CISS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117016528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Costas array search technique that maximizes backtrack and symmetry exploitation","authors":"J. Russo, K. Erickson, J. K. Beard","doi":"10.1109/CISS.2010.5464772","DOIUrl":"https://doi.org/10.1109/CISS.2010.5464772","url":null,"abstract":"Two innovations in search methodology for Costas arrays are presented here: extensive exploitation of symmetries, and look-ahead row index exclusion tables. Together, they achieve a reduction of more than a factor of four in computational requirements over conventional search methods. We examined the benefits of these innovations on Costas arrays of higher orders, and particularly on a search over order 28.","PeriodicalId":118872,"journal":{"name":"2010 44th Annual Conference on Information Sciences and Systems (CISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131205458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative communication with regenerative relays for cognitive radio networks","authors":"Tuan T. Do, B. L. Mark","doi":"10.1109/CISS.2010.5464797","DOIUrl":"https://doi.org/10.1109/CISS.2010.5464797","url":null,"abstract":"Cognitive radios hold tremendous promise for increasing spectral efficiency in wireless systems. In cognitive radio networks, secondary users equipped with frequency-agile cognitive radios communicate with one another via spectrum that is not being used by the primary, licensed users of the spectrum. We consider a cooperative communication scenario in which a secondary transmitter can communicate with a secondary receiver via a direct communication link or a relay channel, depending on the state of a primary transmitter. We develop a decode-and-forward transmission strategy that exploits the presence of spectrum holes both in time and in space. A strategy based on pure temporal sensing alone uses the direct link when the primary transmitter is off, whereas a scheme based on spatial sensing alone uses the relay channel. Our numerical results show that the proposed scheme, employing joint spatial-temporal sensing, significantly reduces the average symbol error probability compared to schemes based on pure temporal or pure spatial sensing.","PeriodicalId":118872,"journal":{"name":"2010 44th Annual Conference on Information Sciences and Systems (CISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131571515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interference mitigation with MIMO precoding in femtocellular systems","authors":"Chenzi Jiang, L. Cimini, N. Himayat","doi":"10.1109/CISS.2010.5464839","DOIUrl":"https://doi.org/10.1109/CISS.2010.5464839","url":null,"abstract":"Femtocells have the potential to provide significant benefits for cellular users. However, the introduction of femtocells also introduces new sources of interference for existing users. In this paper, three techniques for interference mitigation using MIMO precoding are considered at the femtocellular base stations to reduce the interference to the macrocellular users: Precoding Matrix Index (PMI) restriction, Least Interference (LI) and Codebook-based Beamforming with Nulling (CBN). Different sizes of codebooks are generated and applied in these three methods in a single-cell environment. We show that PMI restriction improves macrocellular performance at the expense of femtocellular throughput; LI maximizes the former while minimizing the latter; and CBN theoretically achieves a balance between the two.","PeriodicalId":118872,"journal":{"name":"2010 44th Annual Conference on Information Sciences and Systems (CISS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131713062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pin-Hsun Lin, Shih-Chun Lin, Hsuan-Jung Su, Y. Hong
{"title":"Cognitive radio with unidirectional transmitter and receiver cooperations","authors":"Pin-Hsun Lin, Shih-Chun Lin, Hsuan-Jung Su, Y. Hong","doi":"10.1109/CISS.2010.5464799","DOIUrl":"https://doi.org/10.1109/CISS.2010.5464799","url":null,"abstract":"In this paper, we consider the interference-mitigation based cognitive radio (CR) model where the CR and primary users can coexist at the same time and frequency bands, under the constraint that the primary rate remains the same with the single-user decoder. To meet such a coexistence constraint, the unidirectional cooperation from the CR user is performed by relaying the primary user's signal. We propose a new CR transmission scheme where both the CR transmitter and receiver help relaying the PR signals under the half-duplex constraints. Compared to the previous scheme with only CR transmitter cooperation, the additional cooperation from CR receiver not only provides diversity but a “clean” relaying without interference from the CR. The numerical examples show that the proposed scheme provides significant rate gains over that with only CR transmitter cooperation.","PeriodicalId":118872,"journal":{"name":"2010 44th Annual Conference on Information Sciences and Systems (CISS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133361762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ergodic capacity analysis in cognitive radio systems under channel uncertainty","authors":"Sami Akın, M. C. Gursoy","doi":"10.1109/CISS.2010.5464753","DOIUrl":"https://doi.org/10.1109/CISS.2010.5464753","url":null,"abstract":"In this paper, pilot-symbol-assisted transmission in cognitive radio systems over time selective flat fading channels is studied. It is assumed that causal and noncausal Wiener filter estimators are used at the secondary receiver with the aid of training symbols to obtain the channel side information (CSI) under an interference power constraint. Cognitive radio model is described together with detection and false alarm probabilities determined by using a Neyman-Person detector for channel sensing. Subsequently, for both filters, the variances of estimate errors are calculated from the Doppler power spectrum of the channel, and achievable rate expressions are provided considering the scenarios which are results of channel sensing. Numerical results are obtained in Gauss-Markov modeled channels, and achievable rates obtained by using causal and noncausal filters are compared and it is shown that the difference is decreasing with increasing signal-to-noise ratio (SNR).Moreover, the optimal probability of detection and false alarm values are shown, and the tradeoff between these two parameters is discussed. Finally, optimal power distributions are provided.","PeriodicalId":118872,"journal":{"name":"2010 44th Annual Conference on Information Sciences and Systems (CISS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132116619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Issues in acquiring, processing and visualizing large and detailed 3D models","authors":"G. Godin, L. Borgeat, J. Beraldin, F. Blais","doi":"10.1109/CISS.2010.5464966","DOIUrl":"https://doi.org/10.1109/CISS.2010.5464966","url":null,"abstract":"Modelling from reality using active optical geometric sensing has been a very active research area in computer graphics and vision for the last twenty years. While most elements of the modelling pipeline have reached maturity and have been adopted in several application sectors, several issues remain, particularly in the modelling of large structures and environments, as well as in the management of large, complex and detailed 3D models. This paper describes some of these issues, and outlines some of the solutions that we have proposed. These methods and approaches, as well as their current limitations, are described using different example applications: a monument (the Erechtheion), a painting (Mona Lisa), and a terrain model.","PeriodicalId":118872,"journal":{"name":"2010 44th Annual Conference on Information Sciences and Systems (CISS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128999463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nonlinear turbo TCM schemes over AWGN and Rayleigh fading channels","authors":"Hsinlun Tsai, M. Salehi","doi":"10.1109/CISS.2010.5464894","DOIUrl":"https://doi.org/10.1109/CISS.2010.5464894","url":null,"abstract":"Turbo trellis coded modulation (TTCM) has been widely used as a channel coding scheme that achieves nearcapacity rate without sacrificing bandwidth. Traditionally, linear trellis codes are used as the constituent encoders in the design of TTCM schemes. In this paper we design nonlinear trellis codes that outperform previously designed code over AWGN and fullyinterleaved Rayleigh fading channels.","PeriodicalId":118872,"journal":{"name":"2010 44th Annual Conference on Information Sciences and Systems (CISS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128572848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complex blind source separation: optimal nonlinearity and approximation","authors":"Yang Zhang, S. Kassam","doi":"10.1109/CISS.2010.5464946","DOIUrl":"https://doi.org/10.1109/CISS.2010.5464946","url":null,"abstract":"This paper discusses the performance of complex blind source separation via the EASI algorithm. In particular, we show that the optimum amplitude nonlinearity used in the algorithm can be derived from the sources' distribution. In addition, this nonlinearity can be further approximated by a piecewise constant quantizer to reduce the complexity of the system. These results are obtained with an approach based on the magnitude-phase representation of complex signals and a circularly symmetric source PDF assumption. However, in the QAM signal separation case where this assumption is not true, the optimum nonlinearity and its approximation derived will still deliver good performances if a good amplitude PDF model is matched to the QAM source distribution.","PeriodicalId":118872,"journal":{"name":"2010 44th Annual Conference on Information Sciences and Systems (CISS)","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128774890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}