• Home
  • R.A. Antonio Carrasco
R.A. Antonio Carrasco

R.A. Antonio Carrasco
Newcastle University ,UK · Electrical and Electronic Engineering

BSc(hons),PhD,DSc, CEng, FIET, IEE Heaviside premium

About

340
Publications
22,221
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,103
Citations
Additional affiliations
September 2004 - present
The University of Newcastle, Australia
Position
  • Professor Emeritus
Description
  • scholars.Google.co.uk/citations?hl=en&user=GKEmUJoAAAJ
Education
August 1976 - December 1979
Newcastle University , United Kingdom
Field of study
  • Signal Prcessing and Communications

Publications

Publications (340)
Book
la importancia de desarrollar una buena calidad de la educacion , manejo de nuevos conceptos y metodologias innovadoras. Particular enfasis se otorga a la ensenhanza online
Book
Full-text available
Se provee informacion sobre las tendencias actuales del cambio tecnolgico y su impacto en diversas areas del quehacer economico y social, junto a la exposicion teoricas que han dado lugar a las aplicaciones en automatizacion e inteligencia artificial, asi como las perspectivas de nuevo desarrollos
Data
Es la critica de la presentacion del libro 'Innovación para crecer en calidad Propuesta para una mejor educacion' por el Profesor Claro y ex-decano de la universidad catolica de Chile,
Article
Full-text available
In this paper, density evolution-based construction methods to design good polar codes on impulsive noise channels for single-carrier and multi-carrier systems are proposed and evaluated. For a single-carrier system, the tight bound of the block error probability (BLEP) is derived by applying density evolution and the performance of the proposed co...
Article
Full-text available
This paper proposes a new cryptosystem system that combines DNA cryptography and algebraic curves defined over different Galois fields. The security of the proposed cryptosystem is based on the combination of DNA encoding, a compression process using a hyperelliptic curve over a Galois field \(GF\left( 2^{p}\right) \), and coding via an algebraic g...
Chapter
This paper presents a dynamic stochastic model to support decision-making in investment on information security. This is caused by the fact that some of the key aspects in a company is information security. One of the issues highlighted in this model is the classification of information. It uses a set of digital signal methods to handle the complex...
Article
Full-text available
A system that achieves compression using artificial DNA packaging with the support of two algebraic curves is presented, whereby the Hermitian channel code algorithm introduces gain and safety. Additionally, performance results are presented with a gain of 7 dB against uncoded quadrature phase shift keying and 1 dB against McEliece, for a bit error...
Article
Full-text available
This paper presents a multi-criteria decision model based upon user judgments to assist the evaluation process of an Information and Communication Technology (ICT) network system in health care to improve the quality of service (QoS). Measuring quality in health care services is not an easy task, as there are many competing goals involved, human, e...
Article
Full-text available
A framework to support the appraisal process to improve the quality of service (QoS) of an Information and Communication Technology (ICT) network system in health care service is presented. Most of health-related activities stand to benefit from ICT endorsement; however, technical problems may appear, as an inadequate physical infrastructure, insuf...
Article
This chapter is aimed at analyzing the factors that may contribute to improve the Chilean Higher Education System -CHES overall effectiveness. The context of analysis will be the present characteristics of the CHES together with the national policies that condition it, on one hand, and the demands arising from the economic and social sectors, on th...
Conference Paper
This paper presents the development of a mathematical model to improve quality of service but including the reduction of the carbon path in a Mobile Virtual Network Operator (MVNO), based on semi-group theory. Through a case study presents the method of construction and calculation of the elements in the kernel that allows disconnection or connecti...
Article
Full-text available
This paper proposes a message partitioning-based distributed amplify-and-forward (MPDAF) cooperative scheme. In this scheme, the message transmitted by a user is partitioned into several equal parts, each of which will be relayed by a different user. It enables the cooperative users to share the relaying burden in a distributed network. As a result...
Conference Paper
Full-text available
Distributed spatial diversity systems, such as multi-relay and multi-user networks, have drawn significant attention from the research community. However, their feasibility in a practical environment remains an open concern. Most notably, how to optimize cooperation between multiple users with individual interests and how practical systems issues c...
Article
This paper proposes an opportunistic nonorthogonal amplify-and-forward (ONAF) scheme, assisted by intelligent relay selection. Through analysing the mutual information of the scheme, the novel optimal relay selection criterion is proposed along with its implementation strategy. In order to reduce the system complexity, a sub-optimal selection crite...
Article
Full-text available
Cooperative communication looks very promising as a next-generation wireless network architecture. Li Chen, Rolando Carrasco and Ian Wassell tell us why and how they are working to improve system performance
Article
Full-text available
We consider decode-and-forward cooperative networks and we derive analytical expressions as well as tractable asymptotic approximations for the outage probability of a network node. Our analysis sheds more light on the interplay between the channel conditions, the network size and the adopted transmission scheme, and provides a useful tool for the...
Article
Safety is an element of extreme priority in mining operations, currently many traditional mining countries are investing in the implementation of wireless sensors capable of reducing the number of accidents; through early warning signs to prevent injuries, dead and significant economic losses. The application of sensors capable of measuring in real...
Conference Paper
In this paper, we derive stability conditions for nonbinary low-density-parity-check (LDPC) codes with Gray mapped M-ary phase-shift keying (M-PSK) and M-ary quadrate-amplitude-modulation (M-QAM) constellations. The stability of the GF (q) LDPC decoder with higher order modulation schemes is examined on both additive-white-Gaussian-noise (AWGN) and...
Article
Over the last decade, VoIP has had a fast growth particularly in Small Office Home Office environments overloading the wireless accesses in the last mile. Network Coding schemes have advantageous features for throughput performance but VoIP is a delay critical service requiring fast routing algorithms. In this paper, we design, implement and measur...
Conference Paper
Full-text available
The aim of this paper is to first review power allocation solutions for wireless relay networks and show how channel state information (CSI) availability and system diversity are the dominant factors, as opposed to relaying protocols: i.e., amplify or decode and forward. We then introduce power allocation solutions for a cooperative network, where...
Conference Paper
In this paper, we investigate the use of pilot symbols assisted channel estimation over broadband fixed wireless access system where pilot tones are transmitted over equally spaced sub-carriers of OFDM. The Least Square Error (LSE) algorithm is investigated to estimate broadband Fixed Wireless Access (FWA) channels. The performance in terms of Symb...
Conference Paper
Full-text available
Optimal power allocation for pure relay networks utilizing repetition codes has drawn a great deal of attention. However, power allocation in a cooperative network, where users who act as relays for each other and who utilize non-trivial codes, remains a challenge. With the aid of theoretical frame error rate expressions, we explore the performance...
Conference Paper
As fading due to multipath propagation is an important issue in wireless systems, diversity techniques are employed in order to reduce the multipath fading effect. Cooperative communication represents a new class of diversity schemes in which multiple nodes equipped with a single antenna cooperate to generate a virtual multiple-antenna transmission...
Conference Paper
Full-text available
This paper proposes a novel Distributed Amplify-and-Forward (DAF) cooperative scheme, achieving higher diversity order and yet maintaining the same transmission freedom as the conventional Amplify-and-Forward (AF) scheme. In the DAF scheme, a user's transmitted symbols are partitioned into several sequences in order to be relayed by different users...
Conference Paper
In this work we present a model to simulate high traffic load using Manet. The Manet topology is studied in three different scenarios with different loads and the minimal capacities for wireless connection between cluster heads, among nodes with corresponding cluster heads, and the minimal capacity for a node to become a cluster head is attained in...
Conference Paper
This paper presents a methodology to analyze and evaluate the support of quality of service (QoS) of information and communication technology (ICT) system in healthcare service. The user interface perception and resources for ICT network support are investigated through a case study for Chilean hospitals. The integration of the multi-criterial deci...
Conference Paper
Future networks are aiming to hold more interactive services resulting in higher traffic volume, however Voice over Internet Protocol's (VoIP) high network resource allocation is still a handicap. Recent studies on network coding have proved greater throughput performance by combining packets before broadcasting them. This paper presents a design a...
Conference Paper
In this paper, we derive stability conditions for low-density-parity-check (LDPC) codes with Gray mapped M-ary phase-shift keying (M-PSK) and M-ary quadrate-amplitude-modulation (M-QAM) constellations. The stability of the LDPC decoder with higher order modulation schemes is examined on both additive-white-Gaussian-noise (AWGN) and block Rayleigh f...
Article
The emergence of the Voice over Internet Protocol (VoIP) services requires interconnection between different technologies. In this paper we present an embedded Session Initiation Protocol (SIP) Proxy Gateway (GW) to a Mobile Network with Forward Error Corrections (FEC). Our server registers, locates and forwards the calls of an end user providing i...
Conference Paper
Full-text available
We derive an adaptive power control method for a collaborative network utilizing partner selection that aims to minimize the frame error rate (FER). We model a decode-and-forward (DF) collaborative network under block fading conditions, which contains M independent users utilizing codes, whose performance can be expressed by a signal to noise (SNR)...
Conference Paper
Full-text available
In this paper, we consider cooperative networks of users that implement an unselfish protocol to decode and forward packets of their partners. In unselfish cooperation, a user that has successfully retrieved the source data of a partner, will unconditionally assist that partner in its transmission to the destination. We use a threshold-based model...
Conference Paper
The cross interaction of technologies has become standard practice to add more constraints to Voice over Internet Protocol sessions (VoIP). In this paper, a self developed end to end VoIP simulator to predict speech quality is presented. This system has been validated with a real test bench and can provide up to three audio compressors and two chan...
Conference Paper
Full-text available
This paper proposes a new distributed Amplify-and-Forward (AF) scheme which is integrated with the Ring-Trellis Coded Modulation (TCM) codes in order to achieve both high spectral efficiency and large diversity gain. In the distributed AF scheme, more users cooperate with each other. Fach user still uses half of its transmission freedom for relayin...
Chapter
Full-text available
We have used PN to model and formally analyze a communication system which holds a elliptic curve encryption scheme and it could works on a WSN. The results obtained shows formally that our approach are correct. However, we plan increase the complexity of models. We should consider critical factors related to constrained capacities of sensors nodes...
Article
The first soft-decision decoding algorithm for algebraic-geometric codes is presented. This algorithm is developed based on the Koetter-Vardy algorithm, which was proposed for the decoding of Reed-Solomon codes. The interpolation process is modified by redefining the zero condition of a trivariate polynomial and introducing complexity reducing meth...
Article
Cooperative communication is becoming a promising technology for wireless networks by exploiting two key characteristics of the wireless medium: broadcast nature and spatial diversity. To integrate cooperation into practical systems, efficient protocols are needed across the entire protocol stack. This paper presents a novel cooperative relay-based...
Article
Full-text available
The objective of this paper is two-fold. Initially, we present an analytic technique to rapidly evaluate an approximation to the union bound on the bit error probability of turbo codes. This technique exploits the most significant terms of the union bound, which can be calculated straightforwardly by considering the properties of the constituent co...
Article
Full-text available
This paper proposes the first complete soft-decision list decoding algorithm for Hermitian codes based on the Koetter-Vardy's Reed-Solomon code decoding algorithm. For Hermitian codes, interpolation processes trivariate polynomials which are defined over the pole basis of a Hermitian curve. In this paper, the interpolated zero condition of a trivar...
Article
Full-text available
The quality of service (QoS) support for multimedia communications faces a big challenge in a fading wireless network. On one hand, conventional automatic repeat request (ARQ) schemes are not effective for small-scale fading channels with correlated errors due to consecutive retransmission failures. On the other hand, large-scale fading due to prop...
Article
Full-text available
Convolutional block codes, which are commonly used as constituent codes in turbo code configurations, accept a block of information bits as input rather than a continuous stream of bits. In this paper, we propose a technique for the calculation of the transfer function of convolutional block codes, both punctured and nonpunctured. The novelty of ou...
Conference Paper
Full-text available
We derive theoretical bit and frame error rate expressions for decode-and-forward (DF) collaborative networks containing M users, employing a variety of block codes over a Rayleigh block faded channel. With the aid of these expressions, we explore the performance of adaptive power control for such systems. This extends previous work by optimizing p...
Conference Paper
In this paper we present a coded cooperation scheme using nonbinary LDPC codes and show how it can be used in a multi-user environment to achieve full transmit diversity. It is well known that non-binary LDPC codes over GF(q) outperform binary LDPC codes, but at a cost of increased decoding complexity. To ensure that this scheme can be practically...
Conference Paper
Cooperative communication represents a new class of diversity techniques in which multiple nodes each with a single antenna cooperate to generate a virtual multiple-antenna transmission system and thus offer the benefits of spatial diversity. This paper proposes suitable array codes used as low-density parity-check (LDPC) codes to be applied in the...
Conference Paper
Full-text available
In a cooperative communication network, individual users are encouraged not only to transmit their own data, but also relay other user's data. This relaying transmission creates spatial diversity to combat the effect of individual severe fading and path loss. Since cooperative users utilize some degree of their transmission freedom for relaying oth...
Article
Full-text available
Proper selection of a signal-to-noise ratio threshold largely determines the tightness of an approximation to the frame error rate of a system over a quasistatic fading channel. It is demonstrated that the expression for the optimal threshold value, which has been established for single-input single-output (SISO) channels, remains unchanged for the...
Article
Full-text available
The improper nature of intersymbol interference (ISI) for signals transmitted over frequency-selective channels is investigated in this paper. Our analysis reveals that for real signals, the improperness originates from both improper signal modulation and the interference cancellation process, whereas for most complex signals, the improperness is o...
Conference Paper
In a cooperative communication network, individual users are encouraged not only to transmit their own data, but also relay other user's data. This relaying transmission creates spatial diversity to combat the effect of individual severe fading and path loss. Since cooperative users utilize some degree of their transmission freedom for relaying oth...
Conference Paper
Full-text available
In this paper, we consider cooperative networks of users that implement a selfish protocol to decode and forward packets of their partners. We use a threshold-based model to derive an analytical expression for the end-to-end packet error probability and we validate our approach comparing theoretical to simulation results. Furthermore, we explore th...
Chapter
Full-text available
WiMAX is an ideal solution for providing high data rate communications where traditional landlines are either unavailable or too costly to be installed. It is set to become the most popular way to meet escalating business demand for rapid Internet connection and integrated data, voice, and video services. In this book chapter, we consider a number...
Chapter
In this chapter the user interface perception and resources for mobile technology (MT) support in health care service activities is investigated. Most procedures oriented to provide better operation and quality of health service depend on the existing information and communication technology (ICT) system. However, the implementation of new technolo...
Article
IntroductionThe Turbo EncoderThe Turbo DecoderNon-Binary Turbo CodesConclusions References
Article
Full-text available
List decoding Hermitian codes using the Guruswami-Sudan (GS) algorithm can correct errors beyond half the designed minimum distance. It consists of two processes: interpolation and factorisation. By first defining a Hermitian curve, these processes can be implemented with an iterative polynomial construction algorithm and a recursive coefficient se...
Article
This paper presents a multi-criteria decision making (MCDM) model for evaluating an Information and Communication Technology (ICT) network system in health care .The competing goals existing in Health Institutions need a special treatment, thus the MCDM approach is essential for identifying ICT network quality of service (QoS) requirements and impl...
Conference Paper
The Quality of Service (QoS) support in Wireless Local Area Networks (WLANs) faces a big challenge due to time- correlated fading channel. Conventional Automatic Repeat reQuest (ARQ) schemes based on time diversity may result in consecutive retransmission failures degrading QoS severely. This paper proposes a novel Differentiated Cooperative Medium...
Conference Paper
Resource allocation is an important topic in networks with inappropriate resource allocation causing congestion and unfairness to users. However, resource allocation is more crucial for wireless networks, in particular for Mobile Ad Hoc Networks (MANETs), as nodes interfere with each other due to each node being equally equipped with the same frequ...
Conference Paper
Full-text available
Low-density parity check (LDPC) codes are known to perform well in the presence of additive white Gaussian noise (AWGN) but for very large block lengths. It has been proposed to define the codes over high order Galois fields to overcome this limitation. In this paper we construct new quasi-cyclic non-binary LDPC codes with moderate code lengths fro...
Conference Paper
Full-text available
Cooperative communication uses multipath transmission to combat the effect of individual severe fading and path loss. So far, there are mainly three types of cooperative schemes: Amplify-and-Forward, Decode-and-Forward, and Coded Cooperation. This paper presents a convolutional coded system model and performance comparison between these three schem...
Conference Paper
The objective of this paper is to develop and to validate a competition model which allows to determine when a cryptosystem type is the best-suiteddest to transmit in a communications channel, depending on the kind of technological used device (cellular phone, PDA, notebook, other ones). The results obtained for this dynamic analysis determine the...
Conference Paper
In this paper a solution for the facility location problem is presented over an m-commerce infrastructure. An extensive comparison is performed for different scenario. Also delay studies and comparisons on m-transactions are carried out. Numeric and analytical results are presented.
Conference Paper
In this paper, we propose a public key encryption scheme for wireless sensor networks. This scheme is based on elliptic curves defined over binary finite field and code low density parity check. A simplified model of the communication system is presented using Petri nets and also performance results for one peer to peer link are included.
Conference Paper
Full-text available
The aim of this paper is to study the impact of security protocols on the quality of Voice over Internet Protocol (VoIP) in a third generation (3G) network. Long distance calls are expensive and the potential of cost saving is the most attractive feature in VoIP. In VoIP, voice traffic travels using the Internet protocol instead of using a conventi...