In this paper, a visible light communication transmitter using a LED matrix with low-cost LEDs is shown. This design use a DAC to control the LED drivers, through a discrete…
…price, which facilitate the integration of communication, computation, and block resources. Subsequently, several performance analyses show that the proposed learning framework can strengthen the privacy protection, approach the optimal time…
…(UL) within a resource block. We tackle the combined optimization of the DL precoders and combiners at the APs and DL UEs, respectively, together with the UL combiners and precoders…
…dynamic radio connectivity at high frequencies, augmented with timely positioning-related information, becomes instrumental to improve communication performance and facilitate efficient computation offloading. Our work reviews the main research challenges and…
Many computer vision applications require robust and efficient estimation of camera geometry from a minimal number of input data measurements. Minimal problems are usually formulated as complex systems of sparse…
…communication (URLLC) services. However, bandwidth limited and congested sub-6GHz bands are incapable of fulfilling this coexistence. In this paper, we consider a reconfigurable intelligent surface (RIS)-aided wideband terahertz (THz) communication…
…features are computed with classical MFCCs. Feature selection is implemented using the wrapper approach. At the next stage, these motion and audio features are merged to form combined feature vectors…
…two of the most common HAR interaction techniques: gestures and voice commands. Our findings show that there may not be a significant difference in the overall UX between these controls…
Ensuring an effective coexistence of conventional broadband cellular users with machine type communications (MTCs) is challenging due to the interference from MTCs to cellular users. This interference challenge stems from…
The authentication protocols existing in the realm of mobile satellite communication networks, usually employ the one-time shared secret technique. Although the technique combats well against replay attacks, however, it is…