-
1
Pruning automatic sphere decoding algorithm and performance analysis
Published 2007-01-01Subjects: Get full text
Article -
2
Fast recursive algorithm for implementation of MIMO ZF-SIC detection
Published 2012-07-01Subjects: Get full text
Article -
3
Efficient Synthesis of Large Finite Patch Arrays for Scanning Wide-Angle Anomalous Reflectors
Published 2025-01-01Get full text
Article -
4
Two-Step Method for Millimeter-Wave Antenna Performance Assessment in 5G Smartphones
Published 2021-01-01Get full text
Article -
5
Performance study on a novel VBLAST modulation scheme under SUC detection
Published 2009-01-01“…A new modulation scheme was proposed to deal with the error propagation(EP) existing during the successive cancellation(SUC) detection in the VBLAST(vertical Bell labs layered space-time) system.In the scheme,the former demodulated signal was designed to use the modulation with better noise suppression performance(e.g.binary phase shift keying modulation),and the latter demodulated signal was suggested to employ the modulation with higher frequency ef-ficiency(e.g.multi-decimal modulations).Analysis and simulation results show that system reliability for SUC detection is improved without penalty to the system availability.…”
Get full text
Article -
6
Shock Pulse Shaping in a Small-Form Factor Velocity Amplifier
Published 2010-01-01Get full text
Article -
7
Learning under label noise through few-shot human-in-the-loop refinement
Published 2025-02-01Get full text
Article -
8
Space-time coding scheme for the paired weak user in MIMO-NOMA systems
Published 2018-06-01“…In view of the paired weak user’s poor outage performance in multiple-input multiple-output non-orthogonal multiple access (MIMO-NOMA) systems,Alamouti code was adopted to encode for the weak user in order to improve its outage performance by means of diversity,and the closed-form expression of the strong user’s ergodic capacity as well as the boundary-form expressions of the weak user’s ergodic capacity and outage probability was derived in the proposed model.Moreover,a power allocation algorithm for optimizing the system’s throughput was proposed.Finally,the numerical results show the accuracy of the derived expressions,the efficacy of the proposed algorithm,and that the weak user’s outage performance in the proposed coding scheme is far superior to that in the current coding scheme only adopting vertical Bell lab layered space-time (V-BLAST) code.…”
Get full text
Article