This thesis designs a low-complexity dual Pseudorandom Noise (PN) scheme for identity (ID) detection and coarse frame synchronization. The two PN sequences for a node are identical and are separated by a specified length of gap which serves as the ID of different sensor nodes. The dual PN sequences are short in length but are capable of combating severe underwater acoustic (UWA) multipath fading channels that exhibit time varying impulse responses up to 100 taps. The receiver ID detection is implemented on a microcontroller MSP430F5529 by calculating the correlation between the two segments of the PN sequence with the specified separation gap. When the gap length is matched, the correlator outputs a peak which triggers the wake-up enable. T...
PhD ThesisMULTI-access techniques have been adopted widely for communications in underwater acousti...
In this dissertation, efficient receiver algorithms and architectures for digital communications are...
PhD ThesisThis thesis describes the development and implementation multi-user detection strategies f...
This thesis designs a low-complexity dual Pseudorandom Noise (PN) scheme for identity (ID) detection...
This paper proposes a low-complexity dual pseudorandom noise (PN) scheme for identity (ID) detection...
We present an always-on acoustic wake-up sensor interface, designed for prolonging the autonomy of e...
[EN] Wireless technology for underwater communication possesses a wide range of potential applicatio...
AbstractIn underwater acoustic communication, the power consumption of the underwater communication ...
This paper is focused on the description of the physical layer of a new acoustic modem called ITACA....
This dissertation proposes three low-complexity iterative receiver algorithms for multiple-input mul...
This dissertation proposes three new algorithms for underwater acoustic wireless communications. One...
Author Posting. © IEEE, 2006. This article is posted here by permission of IEEE for personal use, n...
To achieve efficient underwater acoustic (UWA) signal detection in low signal-to-noise ratio (SNR) s...
To enable long-term, large-scale, dense underwater sensor networks or Internet of Underwater Things ...
This paper compares the performance of single pseudo-noise (PN) and dual PN (DPN) sequences for time...
PhD ThesisMULTI-access techniques have been adopted widely for communications in underwater acousti...
In this dissertation, efficient receiver algorithms and architectures for digital communications are...
PhD ThesisThis thesis describes the development and implementation multi-user detection strategies f...
This thesis designs a low-complexity dual Pseudorandom Noise (PN) scheme for identity (ID) detection...
This paper proposes a low-complexity dual pseudorandom noise (PN) scheme for identity (ID) detection...
We present an always-on acoustic wake-up sensor interface, designed for prolonging the autonomy of e...
[EN] Wireless technology for underwater communication possesses a wide range of potential applicatio...
AbstractIn underwater acoustic communication, the power consumption of the underwater communication ...
This paper is focused on the description of the physical layer of a new acoustic modem called ITACA....
This dissertation proposes three low-complexity iterative receiver algorithms for multiple-input mul...
This dissertation proposes three new algorithms for underwater acoustic wireless communications. One...
Author Posting. © IEEE, 2006. This article is posted here by permission of IEEE for personal use, n...
To achieve efficient underwater acoustic (UWA) signal detection in low signal-to-noise ratio (SNR) s...
To enable long-term, large-scale, dense underwater sensor networks or Internet of Underwater Things ...
This paper compares the performance of single pseudo-noise (PN) and dual PN (DPN) sequences for time...
PhD ThesisMULTI-access techniques have been adopted widely for communications in underwater acousti...
In this dissertation, efficient receiver algorithms and architectures for digital communications are...
PhD ThesisThis thesis describes the development and implementation multi-user detection strategies f...