17,551 research outputs found

    Subspace-Based Blind Channel Identification for Cyclic Prefix Systems Using Few Received Blocks

    Get PDF
    In this paper, a novel generalization of subspace-based blind channel identification methods in cyclic prefix (CP) systems is proposed. For the generalization, a new system parameter called repetition index is introduced whose value is unity for previously reported special cases. By choosing a repetition index larger than unity, the number of received blocks needed for blind identification is significantly reduced compared to all previously reported methods. This feature makes the method more realistic especially in wireless environments where the channel state is usually fast-varying. Given the number of received blocks available, the minimum value of repetition index is derived. Theoretical limit allows the proposed method to perform blind identification using only three received blocks in absence of noise. In practice, the number of received blocks needed to yield a satisfactory bit-error-rate (BER) performance is usually on the order of half the block size. Simulation results not only demonstrate the capability of the algorithm to perform blind identification using fewer received blocks, but also show that in some cases system performance can be improved by choosing a repetition index larger than needed. Simulation of the proposed method over time-varying channels clearly demonstrates the improvement over previously reported methods

    Discrete Multitone Modulation for Maximizing Transmission Rate in Step-Index Plastic Optical Fibres

    Get PDF
    The use of standard 1-mm core-diameter step-index plastic optical fiber (SI-POF) has so far been mainly limited to distances of up to 100 m and bit-rates in the order of 100 Mbit/s. By use of digital signal processing, transmission performance of such optical links can be improved. Among the different technical solutions proposed, a promising one is based on the use of discrete multitone (DMT) modulation, directly applied to intensity-modulated, direct detection (IM/DD) SI-POF links. This paper presents an overview of DMT over SI-POF and demonstrates how DMT can be used to improve transmission rate in such IM/DD systems. The achievable capacity of an SI-POF channel is first analyzed theoretically and then validated by experimental results. Additionally, first experimental demonstrations of a real-time DMT over SI-POF system are presented and discusse

    An Interactive and comprehensive software tool to promote active learning in the Loop Shaping Control System design

    Get PDF
    The classical loop shaping is a design procedure that explicitly involves the shaping of the open loop transfer function L(s), within a desired frequency spectrum by manipulating the poles, zeros, and gain of the controller C(s). Interactive software tools have proven as, particularly, useful techniques with high impact on control education. This kind of interactive tools has demonstrated in the past that students learn in a much more active way. This paper presents the basic functionality of the linear control system design (LCSD), an interactive tool for analysis and design of linear control systems with special emphasis on the classical loop shaping design. The software tool is implemented in Sysquake, a MATLAB-like language with fast execution and excellent facilities for interactive graphics, and is delivered as a stand-alone executable that is readily accessible to students and instructors. Several design problems are used to illustrate the main features of the LCSD tool to perform classical loop shaping.Postprint (published version

    Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers

    Full text link
    Machine Learning (ML) algorithms are used to train computers to perform a variety of complex tasks and improve with experience. Computers learn how to recognize patterns, make unintended decisions, or react to a dynamic environment. Certain trained machines may be more effective than others because they are based on more suitable ML algorithms or because they were trained through superior training sets. Although ML algorithms are known and publicly released, training sets may not be reasonably ascertainable and, indeed, may be guarded as trade secrets. While much research has been performed about the privacy of the elements of training sets, in this paper we focus our attention on ML classifiers and on the statistical information that can be unconsciously or maliciously revealed from them. We show that it is possible to infer unexpected but useful information from ML classifiers. In particular, we build a novel meta-classifier and train it to hack other classifiers, obtaining meaningful information about their training sets. This kind of information leakage can be exploited, for example, by a vendor to build more effective classifiers or to simply acquire trade secrets from a competitor's apparatus, potentially violating its intellectual property rights

    New Blind Block Synchronization for Transceivers Using Redundant Precoders

    Get PDF
    This paper studies the blind block synchronization problem in block transmission systems using linear redundant precoders (LRP). Two commonly used LRP systems, namely, zero padding (ZP) and cyclic prefix (CP) systems, are considered in this paper. In particular, the block synchronization problem in CP systems is a broader version of timing synchronization problem in the popular orthogonal frequency division multiplexing (OFDM) systems. The proposed algorithms exploit the rank deficiency property of the matrix composed of received blocks when the block synchronization is perfect and use a parameter called repetition index which can be chosen as any positive integer. Theoretical results suggest advantages in blind block synchronization performances when using a large repetition index. Furthermore, unlike previously reported algorithms, which require a large amount of received data, the proposed methods, with properly chosen repetition indices, guarantee correct block synchronization in absence of noise using only two received blocks in ZP systems and three in CP systems. Computer simulations are conducted to evaluate the performances of the proposed algorithms and compare them with previously reported algorithms. Simulation results not only verify the capability of the proposed algorithms to work with limited received data but also show significant improvements in the block synchronization error rate performance of the proposed algorithms over previously reported algorithms
    • 

    corecore