Author Search Result

[Author] Kuen-Tsair LAY(6hit)

1-6hit
  • Optimal Censorial Relaying for Communications over Rayleigh Fading Channels

    Lun-Chung PENG  Kuen-Tsair LAY  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:8
      Page(s):
    2150-2161

    To provide robust wireless data transmission over fading channels, various schemes which involve the use of relays have been proposed. In some of those schemes, the relay chooses not to forward the received message if its reliability is deemed as too low. Some researchers refer to such schemes as selective decode-and-forward. Our work in this paper falls into such a category. More specifically speaking, the relay in our system is a censorial relay (a relay that performs censorial task). It evaluates the reliability, in terms of log likelihood ratio (LLR), of a received data bit (from the source). If its LLR magnitude is below some preset threshold, then it is censored (i.e. not sent to the destination). When the channel is Rayleigh faded, closed-form bit error rate (BER) expressions for the proposed system are derived for several scenarios. Those scenarios are differentiated by the availability of an energy detector (ED) and the various degrees of knowledge regarding the channel state information (CSI). Aided by those closed-form BER expressions, the system parameters can be efficiently optimized to achieve the minimum BER. Simulation results are observed to closely match theoretical values, as computed by the afore-mentioned closed-form BER expressions. As compared to some existing relay-assisted systems in which censoring is incorporated, the performance of our system is better in terms of BER when the same amount of CSI is exploited.

  • Finite Field Wavelet Spread Signature CDMA in a Multipath Fading Channel

    Jiann-Horng CHEN  Kuen-Tsair LAY  

     
    PAPER

      Vol:
    E86-B No:1
      Page(s):
    122-131

    We propose a new multiple access communication system based on finite field wavelet spread signature (FFWSS). In addition to the function of frequency diversity and multiple access, which are typically provided by traditional spreading codes, the FFWSS spreads data symbols in time, resulting in robustness against frequency selective slow fading. Using the FFWSS to spread a data symbol so that it is overlapped with neighboring symbols, a FFWSS-CDMA system is developed. It is observed that the ratio of the maximum nontrivial value of periodic correlation function to the code length of FFWSS is the same as that of a Sidelnikov sequence. Using RAKE-based receivers, simulation results show that the proposed FFWSS-CDMA system yields lower bit error rate (BER) than conventional DS-CDMA and MT-CDMA systems in multipath fading channels.

  • Packetization and Unequal Erasure Protection for Transmission of SPIHT-Encoded Images

    Kuen-Tsair LAY  Lee-Jyi WANG  

     
    PAPER-Multimedia Systems for Communications

      Vol:
    E97-B No:1
      Page(s):
    226-237

    Coupled with the discrete wavelet transform, SPIHT (set partitioning in hierarchical trees) is a highly efficient image compression technique that allows for progressive transmission. One problem, however, is that its decoding can be extremely sensitive to bit errors in the code sequence. In this paper, we address the issue of transmitting SPIHT-encoded images via noisy channels, wherein errors are inevitable. The communication scenario assumed in this paper is that the transmitter cannot get any acknowledgement from the receiver. In our scheme, the original SPIHT code sequence is first segmented into packets. Each packet is classified as either a CP (critical packet) or an RP (refinement packet). For error control, cyclic redundancy check (CRC) is incorporated into each packet. By checking the CRC check sum, the receiver is able to tell whether a packet is correctly received or not. In this way, the noisy channel can be effectively modeled as an erasure channel. For unequal error protection (UEP), each of those packets are repeatedly transmitted for a few times, as determined by a process called diversity allocation (DA). Two DA algorithms are proposed. The first algorithm produces a nearly optimal decoded image (as measured in the expected signal-to-noise ratio). However, its computation cost is extremely high. The second algorithm works in a progressive fashion and is naturally compatible with progressive transmission. Its computation complexity is extremely low. Nonetheless, its decoded image is nearly as good. Experimental results show that the proposed scheme significantly improves the decoded images. They also show that making distinction between CP and RP results in wiser diversity allocation to packets and thus produces higher quality in the decoded images.

  • Data Rate Maximization under Joint Energy and DOS Constraints in Multichannel Communications

    Chih-Tsung HUNG  Kuen-Tsair LAY  

     
    PAPER-Fundamental Theories

      Vol:
    E85-B No:11
      Page(s):
    2369-2378

    In this paper, three algorithms are proposed for rate maximization (RM) of transmitted data in multichannel (MC) communications, subject to joint constraints on available energy budget and tolerable degradation of service (DOS). Altogether referred to as the RM algorithms, they consist of the EADRM, the DADRM, and the fDADRM algorithms. Based on the rate-distortion optimization theory, closed-form expressions for optimally distributing the energy (for EADRM) or DOS (for DADRM and fDADRM ) among the subchannels (SC's) are derived, when the bit allocation is pre-specified. The specification of bit allocations is achieved by the use of the so-called eligible bit allocation matrix (EBAM), which is a function of the total data rate and the number of SC's. A greedy approach is adopted, where the total data rate is kept on raising until the relevant constraints can no longer be satisfied. While all three RM algorithms essentially generate identical maximum data rates, the fDADRM algorithm is much faster than the other two in computation. As compared to the result achievable by a single-channel communication scheme, the RM algorithms produce a much higher data rate for spectrally shaped channels.

  • Mobile Positioning and Tracking Based on TOA/TSOA/TDOA/AOA with NLOS-Reduced Distance Measurements

    Wei-Kai CHAO  Kuen-Tsair LAY  

     
    PAPER-Navigation, Guidance and Control Systems

      Vol:
    E90-B No:12
      Page(s):
    3643-3653

    In this paper, we address the issue of mobile positioning and tracking after measurements have been made on the distances and possibly directions between an MS (mobile station) and its nearby base stations (BS's). The measurements can come from the time of arrival (TOA), the time sum of arrival (TSOA), the time difference of arrival (TDOA), and the angle of arrival (AOA). They are in general corrupted with measurement noise and NLOS (non-line-of-sight) error. The NLOS error is the dominant factor that degrades the accuracy of mobile positioning. Assuming specific statistic models for the NLOS error, however, we propose a scheme that significantly reduces its effect. Regardless of which of the first three measurement types (i.e. TOA, TSOA, or TDOA) is used, the proposed scheme computes the MS location in a mathematically unified way. We also propose a method to identify the TOA measurements that are not or only slightly corrupted with NLOS errors. We call them nearly NLOS-error-free TOA measurements. From the signals associated with TOA measurements, AOA information can be obtained and used to aid the MS positioning. Finally, by combining the proposed MS positioning method with Kalman filtering, we propose a scheme to track the movement of the MS.

  • An Embedding Scheme for Binary and Grayscale Watermarks by Spectrum Spreading and Its Performance Analysis

    Ming-Chiang CHENG  Kuen-Tsair LAY  

     
    PAPER-Image

      Vol:
    E90-A No:3
      Page(s):
    670-681

    Digital watermarking is a technique that aims at hiding a message signal in a multimedia signal for copyright claim, authentication, device control, or broadcast monitoring, etc. In this paper, we focus on embedding watermarks into still images, where the watermarks themselves can be binary sequences or grayscale images. We propose to scramble the watermark bits with pseudo-noise (PN) or orthogonal codes before they are embedded into an image. We also try to incorporate error correction coding (ECC) into the watermarking scheme, anticipating reduction of the watermark bit error rate (WBER). Due to the similarity between the PN/orthogonal-coded watermarking and the spread spectrum communication, it is natural that, following similar derivations regarding data BER in digital communications, we derive certain explicit quantitative relationships regarding the tradeoff between the WBER, the watermark capacity (i.e. the number of watermark bits) and the distortion suffered by the original image, which is measured in terms of the embedded image's signal-to-noise ratio (abbreviated as ISNR). These quantitative relationships are compactly summarized into a so-called tradeoff triangle, which constitutes the major contribution of this paper. For the embedding of grayscale watermarks, an unequal error protection (UEP) scheme is proposed to provide different degrees of robustness for watermark bits of different degrees of significance. In this UEP scheme, optimal strength factors for embedding different watermark bits are sought so that the mean squared error suffered by the extracted watermark, which is by itself a grayscale image, is minimized while a specified ISNR is maintained.

FlyerIEICE has prepared a flyer regarding multilingual services. Please use the one in your native language.