This paper investigates the achievable sum-rate of massive multiple-input multiple-output (MIMO) systems in the presence of channel aging. For the uplink, by assuming that the base station (BS) deploys maximum ratio c...
详细信息
This paper investigates the achievable throughput of a multi-antenna two-hop relay link under hybrid full/half-duplex operation. The analysis is facilitated by realistic waveform simulations, which explicitly model al...
详细信息
ISBN:
(纸本)9781479980925
This paper investigates the achievable throughput of a multi-antenna two-hop relay link under hybrid full/half-duplex operation. The analysis is facilitated by realistic waveform simulations, which explicitly model all the essential circuit impairments occurring in the relay transceiver together with degrading channel estimation and self-interference cancellation. The obtained results indicate that pure full-duplex operation does not ensure optimal performance but additional half-duplex transmission periods are usually needed to maximize the end-to-end throughput. Especially, it is shown that the estimation of the self-interference channel within the relay should be performed when the source is not transmitting anything while also the source should be allowed to transmit alone to avoid making the first hop a bottleneck. These findings form a solid basis for optimizing the full-duplex MIMO relay deployments in future mobile networks.
Detector-device-independent quantum key distribution (DDI-QKD) held the promise of being robust to detector side channels, a major security loophole in quantum key distribution (QKD) implementations. In contrast to wh...
详细信息
Detector-device-independent quantum key distribution (DDI-QKD) held the promise of being robust to detector side channels, a major security loophole in quantum key distribution (QKD) implementations. In contrast to what has been claimed, however, we demonstrate that the security of DDI-QKD is not based on postselected entanglement, and we introduce various eavesdropping strategies that show that DDI-QKD is in fact insecure against detector side-channel attacks as well as against other attacks that exploit devices’ imperfections of the receiver. Our attacks are valid even when the QKD apparatuses are built by the legitimate users of the system themselves, and thus, free of malicious modifications, which is a key assumption in DDI-QKD.
A rigorous performance analysis of Fano coding is presented, providing an upper bound on the average codeword length of binary and ternary Fano codes for an arbitrary discrete memoryless source. The performance bound ...
详细信息
ISBN:
(纸本)9781467377058
A rigorous performance analysis of Fano coding is presented, providing an upper bound on the average codeword length of binary and ternary Fano codes for an arbitrary discrete memoryless source. The performance bound is slightly better than Shannon's well-known bound for Shannon coding. As a by-product a novel general lower bound on Shannon entropy is derived that might be of interest also in a different context. This bound is expressed with the help of variational distance and provides a special case of a reverse Pinsker inequality.
In the recent past the concept of MIMO (multiple input multiple output) transmission over multimode fibers has attracted increasing interest in the optical fiber transmission community, targeting at increased fiber th...
详细信息
In the recent past the concept of MIMO (multiple input multiple output) transmission over multimode fibers has attracted increasing interest in the optical fiber transmission community, targeting at increased fiber th...
详细信息
暂无评论