Showing 361 - 380 results of 1,322 for search '"bit"', query time: 0.05s Refine Results
  1. 361

    Double-component combined generalized weighted fractional Fourier transform based waveform design for massive MIMO by Xingjian LI, Zhiqun SONG, Yong LI, Lizhe LIU, Bin WANG, Chang WANG

    Published 2023-12-01
    “…In order to overcome the drawback of conventional diversity technologies that sacrificing valuable communication resources such as data rate or bandwidth in massive multiple input multiple output (MIMO) systems, a double-component combined generalized weighted fractional Fourier transform (DCGWFRFT) based waveform design method was proposed.The concept of computational diversity was introduced, and the diversity performance was improved via moderate computational resources without requiring channel state information at the transmitter.The principle of computational diversity of DCGWFRFT based waveform was firstly analyzed, and a DCGWFRFT based waveform design and transform process, which could be adopted combined with existing diversity methods, was then proposed according to the principle.Theoretical analysis proves that the proposed waveform design and transform process can perfectly recover the original transmitted signal in noise-free case, and the power of error of proposed waveform is distributed more evenly than that of untransformed waveform in noisy case.Simulation results show that the performance of DCGWFRFT based waveform has an advantage of at least 1.7 dB in bit signal-to-noise ratio compared with untransformed waveform when bit error rate is 10<sup>-3</sup>.…”
    Get full text
    Article
  2. 362

    Dünya Klasiklerini Blog Tasarımı Yoluyla Okuma Deneyimi -Bir Uygulama Çalışması- by Funda Erdoğdu, Ayşe Derya Eskimen

    Published 2020-12-01
    “…Bu araştırma, öğretmen adaylarının bilgi ve iletişim teknolojileri (BİT) kullanımı ve eleştirel okumaya ilişkin öz yeterlilik düzeylerini belirlemeyi amaçlamaktadır. …”
    Get full text
    Article
  3. 363

    An Image Encryption Algorithm Based on the Improved Sine-Tent Map by Zijing Gao, Zeyu Liu, Lichan Wang

    Published 2021-01-01
    “…In the encryption step, a method of replacing the most significant bit and scrambling-diffusion algorithm is designed to encrypt the plaintext image. …”
    Get full text
    Article
  4. 364

    Modified Tang and Pun’s Current Comparator and Its Application to Full Flash and Two-Step Flash Current Mode ADCs by Veepsa Bhatia, Neeta Pandey

    Published 2017-01-01
    “…The application of the proposed current comparator has also been put forth by implementing a 3-bit current mode (CM) ADC and a two-step 3-bit CM ADC. …”
    Get full text
    Article
  5. 365

    Digital Simulation of Superconductive Memory System Based on Hardware Description Language Modeling by S. Narendran, J. Selvakumar

    Published 2018-01-01
    “…We attained the low power by connecting a shared/common bit line and using a 1-bit memory cell. Through our design we may attain 2.5–3.5 microwatts of power using lower input voltage of 0.6 millivolts. …”
    Get full text
    Article
  6. 366

    Flow consistency in an intensive SDN security architecture with multiple controllers by Ying-ying LV, Yun-fei GUO, Chao QI, Qi WU, Ya-wen WANG

    Published 2017-12-01
    “…As critical components in SDN,controllers are prone to suffer from a series of potential attacks which result in system crashes.To prevent the compromise caused by single failure of controller or flow-tampering attacks,Mcad-SA,an aware decision-making security architecture with multiple controllers was proposed,which coordinates heterogeneous controllers internally as an“associated”controller.This architecture extends existing control plane and takes advantage of various controllers’merits to improve the difficulty and cost of probes and attacks from attackers.In this framework,flow rules distributed to switches are no longer relying on a single controller but according to the vote results from the majority of controllers,which significantly enhances the reliability of flow rules.As to the vote process of flow rules,segmentation and grading is adopted to pick up the most trustful one from multiple flow rules and implement flow consistency.This mechanism avoids comparison between rules via bit by bit which is impractical among several controllers.Theory analysis and simulation results demonstrates the effectiveness,availability and resilience of the proposed methods and their better security gain over general SDN architectures.…”
    Get full text
    Article
  7. 367

    Dual functional radar communication based on serial time division CC-CDMA by Yubo LI, Jian CUI, Junchao FENG, Xiaoyu CHEN

    Published 2023-09-01
    “…In order to improve the performance of target detection and solve the problem of self-interference and mutual interference between multiple targets and multiple users, a radar communication integration system based on serial time division CC-CDMA was proposed.Firstly, the code division multiplexing mechanism was used to adjust the spread spectrum sequence of different subcodes in the complementary code to the signals on different time slices at the transmitter through the generalized PTM sequence to generate the integrated signal of radar communication.Secondly, the receiving end of the radar processed the data twice, and the point-by-point minimization method was used to fuse the processing results to improve the target detection capability of the radar subsystem.Lastly, at the receiving end of communication, the subcodes corresponding to the spread spectrum sequence at the transmitting end were used to de-amplify the received signals, and the bit error ratio was further reduced by interleaved coding and Hamming coding.Simulation results show that compared with other radar communication integration systems, the proposed system has lower bit error rate, higher Doppler resolution and better side lobe suppression performance.…”
    Get full text
    Article
  8. 368

    Method for generating pseudo random numbers based on cellular neural network by Li-hua DONG, Guo-li YAO

    Published 2016-10-01
    “…To overcome the degradation characteristics of chaos system due to finite precision effect and improve the sta-tistical performance of the random number,a new method based on 6th-order cellular neural network (CNN) was given to construct a 64-bit pseudo random number generation (PRNG).In the method,the input and output data in every iteration of 6th-order CNN were controlled to improved the performance of the random number affected by chaos degradation.Then the data were XORed with a variable parameter and the random sequences generated by a Logistic map,by which the repeat of generated sequences was avoided,and the period of output sequences and the key space were expended.Be-sides,the new method was easy to be realized in the software and could generate 64 bit random numbers every time,thus has a high generating efficiency.Test results show that the generated random numbers can pass the statistical test suite NIST SP800-22 completely and thus has good randomness.The method can be applied in secure communication and other fields of information security.…”
    Get full text
    Article
  9. 369
  10. 370

    Numerical Simulation and Experimental Study on Flow of Polymer Aqueous Solution in Porous Jet Nozzle by Minghui Wei, Chenghuai Wu, Yanxi Zhou

    Published 2020-01-01
    “…In this paper, a self-propelled porous jet bit with a support plate is designed, which can prevent the drill bit from jamming due to the jet nozzle against the bottom of the well during the drilling process. …”
    Get full text
    Article
  11. 371

    Analysis of Transmission Characteristics on an MSK-Based Rotating Magnet-Based Mechanical Antenna by Xie He, Qiang Zhou, Jianya Zhang

    Published 2022-01-01
    “…The simulation results show that when the inertia is less than 0.0128 kg∙m2 and the symbol rate is less than 4 bit/s, the bit error rate is less than 10%, thereby improving the transmission capacity. …”
    Get full text
    Article
  12. 372

    Performance Analysis of Iteratively Decoded Convergent Source Mapping with Sphere Packing-Assisted Differential Space-Time Spreading Technique for Efficient Video Transmission by Ishtiaque Ahmed, Nasru Minallah, Jaroslav Frnda, Jan Nedoma

    Published 2021-01-01
    “…The proposed system follows the concept of iterations between the Soft-Bit Source-Decoder (SBSD) and Recursive Systematic Convolutional (RSC) decoder. …”
    Get full text
    Article
  13. 373

    Optimized SM4 Hardware Implementations for Low Area Consumption by Ruolin Zhang, Zejun Xiang, Shasha Zhang, Xiangyong Zeng, Min Song

    Published 2024-01-01
    “…As a result, we report a 1-bit-serial SM4 encryption circuit that occupies 1771 GE with a latency of 2,336 cycles. …”
    Get full text
    Article
  14. 374

    Improved LDPC-based short-range frequency-hopping wireless communication system by Wei-dong FANG, Wu-xiong ZHANG, Ming-ming HU, Wei CHEN, Yang YANG

    Published 2017-12-01
    “…In short-range wireless communication system(SWCS),the complex scenarios make its transmission face the diverse interference,and lower hardware resource leads to its limited anti-interference capability.To achieve the reliable transmission,a frequency-hopping-based SWCS (FH-SWCS)with improved LDPC (I-LDPC) code was constructed.In FH-SWCS,a low-complexity check-sum updating(LCU)algorithm was proposed to reduce the amount of computation.LCU-based multi-threshold bit flipping (LCU-MTBF) algorithm was given to increase the reliability of bit-flipping, improving decoding performance and reduce the complexity of decoding.The simulation results demonstrate that LCU is suitable for multiple hard decisions decoding algorithm,and it can reduce the computational complexity of original decoding algorithm without affecting its performance.When BER is 10<sup>−5</sup>,and iterations number is 5,0.15dB performance gain can be achieved,and the number of additions algorithm can be reduced about 40% in LCU-MTBF.In FH-SWCS with I-LDPC,when BER is 10<sup>−4</sup>,and SNR is 15dB,the performance gain about 7dB can be achieved to improve the anti-interference of the system effectively.…”
    Get full text
    Article
  15. 375

    Ghadeer-speech-crowd-corpus: Speech datasetMendeley Data by Ghadeer Qasim Ali, Husam Ali Abdulmohsin

    Published 2025-02-01
    “…Additionally, it is a mono dataset and contains 15,626 audio samples recorded at a sampling rate of 44,100 Hz, 16-bit depth, and bit rate of 705.6 kb/s. The recordings were conducted at the Academy for Media Training of the College of Media, University of Baghdad.…”
    Get full text
    Article
  16. 376

    SSCANL decoder based joint iterative detection and decoding algorithm by Chongyang LIU, Rui GUO

    Published 2022-10-01
    “…In order to improve the receiver performance of the sparse code multiple access (SCMA) system based on polar codes, the cyclic redundancy check (CRC) aided joint iterative detection and decoding receiver scheme based on simplify soft cancellation list (SSCANL) decoder (C-JIDD-SSCANL) was proposed.A polar code decoder in the C-JIDD-SSCANL receiver used the SSCANL algorithm.In this algorithm, decoding node deletion technology was used to simplify L times of soft cancellation (SCAN) decoding required by soft cancellation list (SCANL) algorithm by deleting frozen bit nodes, then the computational process of soft information update between nodes was simplified, and the computational complexity of decoding algorithm was reduced.The simulation results show that the SSCANL algorithm can obtain the same performance as the SCANL algorithm, and its computational complexity is reduced compared with the SCANL algorithm.Compared with the joint iterative detection and decoding scheme based on SCAN decoder (JIDD-SCAN) and the CRC aided joint iterative detection and decoding scheme based on SCAN decoder (C-JIDD-SCAN), the performance of C-JIDD-SSCANL receiver scheme based on SSCANL decoder is improved by about 0.65 dB and 0.59 dB respectively when the bit error rate is 10<sup>-4</sup>.…”
    Get full text
    Article
  17. 377

    Switching MIMO System with Adaptive OFDM Modulation for Indoor Visible Light Communication by Xinyue Guo, Keer Zhang, Xufa Huang

    Published 2018-01-01
    “…The adaptive OFDM modulation, which is realized by power and bit allocation on OFDM subchannels, is utilized to achieve the maximum channel capacity under a given target bit error rate (BER). …”
    Get full text
    Article
  18. 378

    Reflected entropy in random tensor networks. Part III. Triway cuts by Chris Akers, Thomas Faulkner, Simon Lin, Pratik Rath

    Published 2024-12-01
    “…Minimal triway cuts can be formulated as integer programs which cannot be relaxed to find a dual maximal flow/bit-thread description. This sheds light on the gap between the existence of tripartite entanglement in holographic states and the bipartite entanglement structure motivated by bit-threads. …”
    Get full text
    Article
  19. 379

    A Hybrid Multiuser Detector Based on MMSE and AFSA for TDRS System Forward Link by Zhendong Yin, Xu Jiang, Zhilu Wu, Xiaohui Liu

    Published 2014-01-01
    “…The simulation results show that the bit error ratio and near-far resistance performances of the proposed detector are much better, compared with MF, DEC, and MMSE, and are quite close to OMD. …”
    Get full text
    Article
  20. 380