66 research outputs found

    Peak factor in orthogonal multicarrier modulation with variable levels

    No full text

    Capacity of voiceband channel with speech signal interference

    No full text

    A Distribution-Function-Based AGC Method in OFDM Systems

    No full text

    Radar-Based, Simultaneous Human Presence Detection and Breathing Rate Estimation

    No full text
    Human presence detection is an application that has a growing need in many industries. Hotel room occupancy is critical for electricity and energy conservation. Industrial factories and plants have the same need to know the occupancy status to regulate electricity, lighting, and energy expenditures. In home security there is an obvious necessity to detect human presence inside the residence. For elderly care and healthcare, the system would like to know if the person is sleeping in the room, sitting on a sofa or conversely, is not present. This paper focuses on the problem of detecting presence using only the minute movements of breathing while at the same time estimating the breathing rate, which is the secondary aim of the paper. We extract the suspected breathing signal, and construct its Fourier series (FS) equivalent. Then we employ a generalized likelihood ratio test (GLRT) on the FS signal to determine if it is a breathing pattern or noise. We will show that calculating the GLRT also yields the maximum likelihood (ML) estimator for the breathing rate. We tested this algorithm on sleeping babies as well as conducted experiments on humans aged 12 to 44 sitting on a chair in front of the radar. The results are reported in the sequel

    Predistorter for MIMO System with Nonlinear Power Amplifiers

    No full text

    Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations

    No full text
    <p/> <p>A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in space to secure OFDM with low overheads on encryption, decryption, and key distribution. These properties make it a good alternative to traditional software-based information security algorithms in systems where the costs associated with such algorithms are an implementation obstacle. A necessary and sufficient condition for achieving information theoretic security in accordance with channel and system parameters is derived. Security by complexity is assessed for cases where the condition for information theoretic security is not satisfied. In addition, practical means for implementing the method are derived including generating robust joint constellations, decoding data with low complexity, and mitigating the effects of imperfections due to mobility, power control errors, and synchronization errors.</p

    Reduction of peak to mean ratio of multicarrier modulation using cyclic coding

    No full text
    • …
    corecore