Search results for "Receivers"
showing 10 items of 13 documents
Error-Based Interference Detection in WiFi Networks
2017
In this paper we show that inter-technology interference can be recognized by commodity WiFi devices by monitoring the statistics of receiver errors. Indeed, while for WiFi standard frames the error probability varies during the frame reception in different frame fields (PHY, MAC headers, payloads) protected with heterogeneous coding, errors may appear randomly at any point during the time the demodulator is trying to receive an exogenous interfering signal. We thus detect and identify cross-technology interference on off-the-shelf WiFi cards by monitoring the sequence of receiver errors (bad PLCP, bad PCS, invalid headers, etc.) and develop an Artificial Neural Network (ANN) to recognize t…
Design and validation of a wireless Body Sensor Network for integrated EEG and HD-sEMG acquisitions
2022
Sensorimotor integration is the process through which the human brain plans the motor program execution according to external sources. Within this context, corticomuscular and corticokinematic coherence analyses are common methods to investigate the mechanism underlying the central control of muscle activation. This requires the synchronous acquisition of several physiological signals, including EEG and sEMG. Nevertheless, physical constraints of the current, mostly wired, technologies limit their application in dynamic and naturalistic contexts. In fact, although many efforts were made in the development of biomedical instrumentation for EEG and High Density-surface EMG (HD-sEMG) signal ac…
Improved GNSS positioning exploiting a vehicular P2P infrastructure
2010
This paper considers the possibility to exploit external altitude measurements to improve the performance of a Kalman based GNSS receiver. The altitude measurements are provided by means of a peer to peer network, that is supposed to be based on the evolution of the 802.11 standard for the vehicular environment, namely the WAVE (802.11p). The performance of such a system are investigated for different characteristics of the aiding measurement and for a different number and disposals of the aiding peers. The aiding measurement is obtained starting from the altitude measurements that the other peers in the network send to the aided user. The experiments highlight the need for a parameter that…
Interference Cancellation for LoRa Gateways and Impact on Network Capacity
2021
In this paper we propose LoRaSyNc (LoRa receiver with SyNchronization and Cancellation), a second generation LoRa receiver that implements Successive Interference Cancellation (SIC) and time synchronization to improve the performance of LoRa gateways. Indeed, the chirp spread spectrum modulation employed in LoRa experiences very high capture probability, and cancelling the strongest signal in case of collisions can significantly improve the cell capacity. An important feature of LoRaSyNc is the ability to track the frequency and clock drifts between the transmitter and receiver, during the whole demodulation of the interfered frame. Due to the use of low-cost oscillators on end-devices, a s…
Detection of Signals in MC–CDMA Using a Novel Iterative Block Decision Feedback Equalizer
2022
This paper presents a technique to mitigate multiple access interference (MAI) in multicarrier code division multiple access (MC-CDMA) wireless communications systems. Although under normal circumstances the MC-CDMA system can achieve high spectral efficiency and resistance towards inter symbol interference (ISI) however when exposed to substantial nonlinear distortion the issue of MAI manifests. Such distortion results when the power amplifiers are driven into saturation or when the transmit signal experiences extreme adverse channel conditions. The proposed technique uses a modified iterative block decision feedback equalizer (IB-DFE) that uses a minimal mean square error (MMSE) receiver …
Energy-Efficient Resource Optimization with Wireless Power Transfer for Secure NOMA Systems
2018
In this paper, we investigate resource allocation algorithm design for secure non-orthogonal multiple access (NOMA) systems empowered by wireless power transfer. With the consideration of an existing eavesdropper, the objective is to obtain secure and energy efficient transmission among multiple users by optimizing time, power and subchannel allocation. Moreover, we also take into consideration for the practical case that the statistics of the channel state information of the eavesdropper is not available. In order to address the optimization problem and its high computational complexity, we propose an iterative algorithm with guaranteed convergence to deliver a suboptimal solution for gene…
1 Tb/s·km WDM transmission over multimode fibre link
2008
We demonstrate 1 Tb/smiddotkm WDM error-free transmission (highest reported value to our knowledge) over a MMF link by a combination of low-linewidth lasers and central launch.
Upgrade of the ATLAS Level-1 trigger with an FPGA based Topological Processor
2013
The ATLAS experiment is located at the European Centre for Nuclear Research (CERN) in Switzerland. It is designed to measure decay properties of high energetic particles produced in the protons collisions at the Large Hadron Collider (LHC). The LHC has a proton collision at a frequency of 40 MHz, and thus requires a trigger system to efficiently select events down to a manageable event storage rate of about 400Hz. Event triggering is therefore one of the extraordinary challenges faced by the ATLAS detector. The Level-1 Trigger is the first rate-reducing step in the ATLAS Trigger, with an output rate of 75kHz and decision latency of less than 2.5$\mu$s. It is primarily composed of the Calori…
I beni confiscati come nuovo spazio pubblico
2014
Nel territorio a nord-est di Palermo la criminalità organizzata, in molte occasioni, ha condizionato il potere politico e amministrativo e inciso su valori e abitudini collettive, esercitando unʼinfluenza determinante nellʼespansione periurbana e nella conseguente trasformazione del paesaggio agrario. Alcuni dei principali centri oggetto della ricerca hanno governato il territorio sotto il controllo sistematico della mafia rendendo necessario lʼintervento dello Stato. Esaminare i rapporti tra amministrazioni locali e Cosa nostra in quei luoghi permette di individuare ricorrenze criminali nella gestione dei beni collettivi e di concentrare lʼattenzione sulle proprietà confiscate. In the nort…
Clientelismo e metodo mafioso: network Criminali e pubblica amministrazione in Sicilia
2011
Quale relazione lega clientelismo e mafia? Quali elementi accomunano crimine dei potenti e metodo mafioso? Come si strutturano i sistemi criminali nelle realtà locali? Il saggio presenta una selezione ragionata di studi sulle relazioni tra clientelismo e mafia (par. 1) e sulle reti che si configurano nell’interconnessione tra sistemi criminali e pubblica amministrazione (par. 2). Tali studi permettono di leggere tanto fenomeni storici, come i comitati d’affari che asservivano i poteri pubblici nella Palermo degli anni Cinquanta (par. 3), tanto fenomeni più recenti, come quelli che, dal 1991 in poi, rientrano nella fattispecie dei Comuni e degli enti locali commissariati per infiltrazioni ma…