{"title":"Constant Envelope Orthogonal Frequency-Division Multiplexing Phase Modulation for Radar Pulse Compression","authors":"J. P. Stralka, G. Meyer","doi":"10.1109/CISS.2007.4298369","DOIUrl":"https://doi.org/10.1109/CISS.2007.4298369","url":null,"abstract":"Constant envelope orthogonal frequency-division multiplexing (CE-OFDM) is evaluated as a potential wideband radar pulse compression modulation using ambiguity function analysis.","PeriodicalId":151241,"journal":{"name":"2007 41st Annual Conference on Information Sciences and Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134637269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Asymptotic Efficiency for Asynchronous CDMA","authors":"G. Romano, D. Ciuonzo, F. Palmieri, P. Rossi","doi":"10.1109/CISS.2007.4298295","DOIUrl":"https://doi.org/10.1109/CISS.2007.4298295","url":null,"abstract":"We consider asynchronous CDMA systems and analyze their performances in terms of asymptotic efficiency when linear receivers are employed and the system becomes overloaded. We show that in such systems, differently from synchronous systems, linear detectors can be asymptotically efficient and, specifically, that the MMSE detector is asymptotically efficient with probabilty. Simulations confirm that it is better to be asynchronous than synchronous and even under heavy overloading the MMSE receiver is still asymptotically efficient.","PeriodicalId":151241,"journal":{"name":"2007 41st Annual Conference on Information Sciences and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131204055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Subspace Sequence Estimation","authors":"M. Tinston, Y. Ephraim","doi":"10.1109/CISS.2007.4298273","DOIUrl":"https://doi.org/10.1109/CISS.2007.4298273","url":null,"abstract":"Recent work in the theory of subspace filtering and estimation, for example the Multistage Wiener Filter (MWF) of Goldstein et. al., has focused primarily on the case of finite dimension filtering. While this is the more practical case, as it can be implemented in a general purpose computer, it has left open the theoretical question of the behavior of subspace filters in the infinite dimension case. In this work we begin develop a causal infinite dimensional filter that operates in a subspace similar to that of the MWF and whose performance approaches that of the causal Wiener Filter using this subspace.","PeriodicalId":151241,"journal":{"name":"2007 41st Annual Conference on Information Sciences and Systems","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multiplying Digital-to-Analog Convertor (MDAC) by Charge-Domain Operation","authors":"J. Ikari, Y. Nagazumi, S. Nakamura","doi":"10.1109/CISS.2007.4298406","DOIUrl":"https://doi.org/10.1109/CISS.2007.4298406","url":null,"abstract":"A multiplication type D/A convertor based on the new principles of charge-domain operations is proposed. The D/A convertor has a linear structure of overlapping gates. The design was fabricated by a standard 1.5 um CMOS process. Evaluation results of the two types of D/A conversion experiment are presented. By simple charge accumulation a relatively high, more than 11-bit, resolution is observed. For a successive charge splitting type D/A conversion, although our current evaluation results only show 5-bit resolution, we found possible clues for future improvements.","PeriodicalId":151241,"journal":{"name":"2007 41st Annual Conference on Information Sciences and Systems","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116194675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differential Space-Frequency Group Codes for MIMO-OFDM","authors":"E. Zeydan, U. Tureli","doi":"10.1109/CISS.2007.4298366","DOIUrl":"https://doi.org/10.1109/CISS.2007.4298366","url":null,"abstract":"In recent years, coherent space-frequency (SF) coded multiple-input multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) systems have attracted great attention. However, obtaining perfect channel estimates for frequency-selective channels with lots of taps is challenging and computationally complex. In this paper, we present a transmission scheme that uses differential space-frequency group codes (DSFC) for MIMO-OFDM systems. Our proposed scheme is based on the theory of space-frequency group codes. We use the group properties of space-frequency codes that has recently been investigated and obtain a differential transmission rule incorporated with subcarrier allocation method that allows data to be sent without channel estimates at the transmitter or receiver. Recently proposed noncoherent space-frequency codes using MIMO-OFDM have exponential computational complexity with code rate in frequency-selective channels. Compared to existing noncoherent space-frequency codes, our proposed code design is computationally more efficient and is easier to implement. We also demonstrate that the presence of additional resolvable channel taps does not monotonically improve the performance of DSFCs, which shows that obtaining full space-frequency diversity order for increasing number of channel taps decreases the performance of the receivers with lack of channel state information (CSI). This result is completely different from the coherent case of space frequency group codes in which additional channel taps increase the BER performance due to the exploitation of frequency diversity present in MIMO-OFDM frequency-selective channels.","PeriodicalId":151241,"journal":{"name":"2007 41st Annual Conference on Information Sciences and Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114826450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some Analogies Between Thermodynamics and Shannon Theory","authors":"D. Samardzija","doi":"10.1109/CISS.2007.4298293","DOIUrl":"https://doi.org/10.1109/CISS.2007.4298293","url":null,"abstract":"In this paper we present some analogies between thermodynamics and certain Shannon theory results. We revisit the previously published results that relate notion of energy and information. We then introduce a thermodynamic system that could be used to store information. The ideal gas is considered. We present the corresponding thermodynamic analysis and establish equivalence with the additive white Gaussian noise (AWGN) channel capacity formula. Specifically, we show that the average energy needed for adiabatic compression of the ideal gas to 1/N of its initial volume is the same as the average energy needed to achieve the capacity C = log, N of the equivalent AWGN channel. In addition, the analysis is extended to show a link between the gas volume and minimum squared codeword distance. Furthermore, we show that the ideal gas which went through the adiabatic compression, and later settled according to the second law of thermodynamics, will reach an equilibrium state which is directly related to Shannon random coding and joint typicality decoding.","PeriodicalId":151241,"journal":{"name":"2007 41st Annual Conference on Information Sciences and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128548796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discrete Memoryless Interference Channels with Fee back","authors":"Jinhua Jiang, Yan Xin, H. K. Garg","doi":"10.1109/CISS.2007.4298375","DOIUrl":"https://doi.org/10.1109/CISS.2007.4298375","url":null,"abstract":"We consider the discrete memoryIess two-sender-two-receiver interference channel in the setting where received signals are sent hack to their respective senders. The feedback signals enable each sender to crossly observe certain information transmitted by the other, and thus facilitate the senders to cooperate in resolving the remaining uncertainty in the previous transmission block. We develop a block Markov coding scheme for this channel, and obtain a corresponding achievable rate region. Furthermore, we also derive both implicit and explicit descriptions for the obtained achievable rate region.","PeriodicalId":151241,"journal":{"name":"2007 41st Annual Conference on Information Sciences and Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130557710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Study of Various Sparse Representation Methods Using Redundant Frames","authors":"M. Akçakaya, V. Tarokh","doi":"10.1109/CISS.2007.4298400","DOIUrl":"https://doi.org/10.1109/CISS.2007.4298400","url":null,"abstract":"Sparse representations have recently received wide attention because of their numerous potential applications. In this paper, we consider sparse representations of signals with at most L non-zero coefficients using a frame F of size M in CN. We bound the average distortion of such a representation for any arbitrary frame F by a numerical lower bound that is only a function of the sparsity epsiv = L/N of the representation, and the redundancy (r-1) = M/N-1 of F. This numerical lower bound is shown to be much stronger than the analytical and asymptotic bounds of in low dimensions (e.g. N = 6,8, 10), but it is much less straightforward to compute. We then study the performance of randomly generated frames with respect to this numerical lower bound, and to the analytical and asymptotic bounds. When the optimal sparse representation algorithm is used, it is observed that randomly generated frames perform about 2 dB away from the theoretical lower bound in low dimensions. We use the greedy orthogonal matching pursuit (OMP) algorithm to study the performance of randomly generated frames in higher dimensions. For small values of epsiv, randomly generated frames using OMP perform close to the lower bound and the results suggest that the loss of the sub-optimal search using orthogonal matching pursuit algorithm grows as a function of epsiv. As N grows, a concentration phenomenon for the performance of randomly generated frames about their average is observed in all cases, even when using the OMP algorithm.","PeriodicalId":151241,"journal":{"name":"2007 41st Annual Conference on Information Sciences and Systems","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123821930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Approach to Energy Efficient Signal Detection","authors":"Rick S. Blum, Brian M. Sadler","doi":"10.1109/CISS.2007.4298301","DOIUrl":"https://doi.org/10.1109/CISS.2007.4298301","url":null,"abstract":"Signal detection is one important application for which dedicated sensor networks have been proposed for both civilian and military applications. Joint signal processing and communication design of such networks has been of great interest recently. Several authors have made a strong case for a mode of operation called censoring in order to reduce the number of sensor transmissions such that energy usage will be reduced to allow longer network operation. There are some aspects of wireless sensor networks that have not yet been exploited by the proposed censoring schemes. For example, sufficiently close nodes can hear each others' transmissions. Such considerations lead to new classes of energy efficient signal detection procedures which we consider here. We demonstrate that these new approaches require fewer average sensor transmissions and that the savings can be significant in cases of interest. We demonstrate our new approach is optimum for minimizing a weighted sum of probability of error and the average number of sensor transmissions for a distributed mode of operation where each sensor node can operate autonomously.","PeriodicalId":151241,"journal":{"name":"2007 41st Annual Conference on Information Sciences and Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127994136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proposal for the Security of Peer-to-Peer (P2P) Networks: a pricing model inspired by the theory of complex networks","authors":"Daniel O. Rice","doi":"10.1109/CISS.2007.4298420","DOIUrl":"https://doi.org/10.1109/CISS.2007.4298420","url":null,"abstract":"This short research note proposes a peer-to-peer (P2P) network security pricing model that promotes the growth of P2P networks with an increased resistance to malicious code propagation. The security pricing model integrates findings from recent developments in complex network theory with incentive compatible pricing. The model links file download prices in P2P networks with a metric called the Pearson coefficient. The calculation of the Pearson coefficient indicates a structural dimension of networks called \"preferential attachment\". The security pricing model employs a mechanism that charges nodes (network users) higher prices for choosing \"bad\" links, that is links that decrease the Pearson coefficient, because these links inhibit preferential attachment in networks and ultimately degrade networks' resistance to malicious code propagation. The security pricing model provides incentives for nodes to choose the lower priced \"good\" links (that is, links that increase the Pearson coefficient). Continuing research will focus on formalizing and validating the P2P network security model. Simulation will be used to test the resistance of networks grown under this model to malicious code propagation. We demonstrate a different approach to P2P network security and hope that the final analysis will provide insights and provide a significant contribution to the future study of the security of distributed transient networks (DTN) including P2P, ad hoc, and other computer based networks.","PeriodicalId":151241,"journal":{"name":"2007 41st Annual Conference on Information Sciences and Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130472451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}