Skip to main content

Showing 1–9 of 9 results for author: Deka, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.09788  [pdf, ps, other

    cs.IT

    Joint Optimization of IRS Deployment and Passive Beamforming to Enhance the Received Power

    Authors: Jyotsna Rani, Deepak Mishra, Ganesh Prasad, Ashraf Hossain, Swades De, Kuntal Deka

    Abstract: Intelligent reflecting surface (IRS) has recently emerged as a promising technology for beyond fifth-generation (B5G) and 6G networks conceived from metamaterials that smartly tunes the signal reflections via a large number of low-cost passive reflecting elements. However, the IRS-assisted communication model and the optimization of available resources needs to be improved further for more efficie… ▽ More

    Submitted 18 August, 2023; originally announced August 2023.

  2. arXiv:2308.01322  [pdf, ps, other

    cs.DS

    An Algorithm for the Constrained Longest Common Subsequence and Substring Problem

    Authors: R. Li, J. Deka, K. Deka, D. Li

    Abstract: Let $Σ$ be an alphabet. For two strings $X$, $Y$, and a constrained string $P$ over the alphabet $Σ$, the constrained longest common subsequence and substring problem for two strings $X$ and $Y$ with respect to $P$ is to find a longest string $Z$ which is a subsequence of $X$, a substring of $Y$, and has $P$ as a subsequence. In this paper, we propose an algorithm for the constrained longest commo… ▽ More

    Submitted 2 August, 2023; originally announced August 2023.

    Comments: arXiv admin note: text overlap with arXiv:2308.00925

  3. arXiv:2308.00925  [pdf, ps, other

    cs.DS

    An Algorithm for the Longest Common Subsequence and Substring Problem

    Authors: R. Li, J. Deka, K. Deka

    Abstract: In this note, we first introduce a new problem called the longest common subsequence and substring problem. Let $X$ and $Y$ be two strings over an alphabet $Σ$. The longest common subsequence and substring problem for $X$ and $Y$ is to find the longest string which is a subsequence of $X$ and a substring of $Y$. We propose an algorithm to solve the problem.

    Submitted 1 August, 2023; originally announced August 2023.

  4. arXiv:2306.02032  [pdf, ps, other

    cs.IT

    ADMM-based Detector for Large-scale MIMO Code-domain NOMA Systems

    Authors: Vinjamoori Vikas, Kuntal Deka, Sanjeev Sharma, A. Rajesh

    Abstract: Large-scale multi-input multi-output (MIMO) code domain non-orthogonal multiple access (CD-NOMA) techniques are one of the potential candidates to address the next-generation wireless needs such as massive connectivity, and high reliability. This work focuses on two primary CD-NOMA techniques: sparse-code multiple access (SCMA) and dense-code multiple access (DCMA). One of the primary challenges i… ▽ More

    Submitted 3 June, 2023; originally announced June 2023.

  5. arXiv:2007.05012  [pdf, ps, other

    cs.IT

    Design of Puncturing for Length-Compatible Polar Codes Using Differential Evolution

    Authors: Kuntal Deka, Sanjeev Sharma

    Abstract: This paper presents a puncturing technique to design length-compatible polar codes. The punctured bits are identified with the help of differential evolution (DE). A DE-based optimization framework is developed where the sum of the bit-error-rate (BER) values of the information bits is minimized. We identify a set of bits which can be avoided for puncturing in the case of additive white Gaussian n… ▽ More

    Submitted 9 July, 2020; originally announced July 2020.

    Comments: Accepted for presentation at SPCOM 2020

  6. arXiv:2005.03216  [pdf, ps, other

    cs.IT eess.SP

    OTFS-NOMA based on SCMA

    Authors: Kuntal Deka, Anna Thomas, Sanjeev Sharma

    Abstract: Orthogonal Time Frequency Space (OTFS) is a $\text{2-D}$ modulation technique that has the potential to overcome the challenges faced by orthogonal frequency division multiplexing (OFDM) in high Doppler environments. The performance of OTFS in a multi-user scenario with orthogonal multiple access (OMA) techniques has been impressive. Due to the requirement of massive connectivity in 5G and beyond,… ▽ More

    Submitted 8 May, 2020; v1 submitted 6 May, 2020; originally announced May 2020.

    Comments: 12 pages, to be submitted to IEEE journal

  7. arXiv:2003.03569  [pdf, ps, other

    cs.IT eess.SP

    Design of SCMA Codebooks Using Differential Evolution

    Authors: Kuntal Deka, Minerva Priyadarsini, Sanjeev Sharma, Baltasar Beferull-Lozano

    Abstract: Non-orthogonal multiple access (NOMA) is a promising technology which meets the demands of massive connectivity in future wireless networks. Sparse code multiple access (SCMA) is a popular code-domain NOMA technique. The effectiveness of SCMA comes from: (1) the multi-dimensional sparse codebooks offering high sha** gain and (2) sophisticated multi-user detection based on message passing algorit… ▽ More

    Submitted 15 February, 2021; v1 submitted 7 March, 2020; originally announced March 2020.

    Comments: Accepted for presentation in IEEE ICC'20 Workshop - NOMA5G

  8. arXiv:1711.02313  [pdf, other

    cs.NI

    Cooperative Spectrum Sensing Scheduling in Multi-channel Cognitive Radio Networks: A broad perspective

    Authors: Prakash Chauhan, Sanjib K. Deka, Monisha Devi, Nityananda Sarma

    Abstract: Cooperative spectrum sensing has been proven to improve sensing performance of cognitive users in presence of spectral diversity. For multi-channel CRN (MC-CRN), designing a cooperative spectrum sensing scheme becomes quite challenging as it needs an optimal sensing scheduling scheme, which schedules cognitive users to different channels such that a good balance between detection performance and t… ▽ More

    Submitted 7 November, 2017; originally announced November 2017.

    Comments: 6 pages, 4 figure

  9. arXiv:1710.08628  [pdf, other

    cs.NI cs.CR

    DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment

    Authors: Rup Kumar Deka, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita

    Abstract: The future of the Internet is predicted to be on the cloud, resulting in more complex and more intensive computing, but possibly also a more insecure digital world. The presence of a large amount of resources organized densely is a key factor in attracting DDoS attacks. Such attacks are arguably more dangerous in private individual clouds with limited resources. This paper discusses several promin… ▽ More

    Submitted 24 October, 2017; originally announced October 2017.

    Journal ref: Big Data Analytics for Internet of Things, 2020