-
361
Double-component combined generalized weighted fractional Fourier transform based waveform design for massive MIMO
Published 2023-12-01“…In order to overcome the drawback of conventional diversity technologies that sacrificing valuable communication resources such as data rate or bandwidth in massive multiple input multiple output (MIMO) systems, a double-component combined generalized weighted fractional Fourier transform (DCGWFRFT) based waveform design method was proposed.The concept of computational diversity was introduced, and the diversity performance was improved via moderate computational resources without requiring channel state information at the transmitter.The principle of computational diversity of DCGWFRFT based waveform was firstly analyzed, and a DCGWFRFT based waveform design and transform process, which could be adopted combined with existing diversity methods, was then proposed according to the principle.Theoretical analysis proves that the proposed waveform design and transform process can perfectly recover the original transmitted signal in noise-free case, and the power of error of proposed waveform is distributed more evenly than that of untransformed waveform in noisy case.Simulation results show that the performance of DCGWFRFT based waveform has an advantage of at least 1.7 dB in bit signal-to-noise ratio compared with untransformed waveform when bit error rate is 10<sup>-3</sup>.…”
Get full text
Article -
362
Dünya Klasiklerini Blog Tasarımı Yoluyla Okuma Deneyimi -Bir Uygulama Çalışması-
Published 2020-12-01“…Bu araştırma, öğretmen adaylarının bilgi ve iletişim teknolojileri (BİT) kullanımı ve eleştirel okumaya ilişkin öz yeterlilik düzeylerini belirlemeyi amaçlamaktadır. …”
Get full text
Article -
363
An Image Encryption Algorithm Based on the Improved Sine-Tent Map
Published 2021-01-01“…In the encryption step, a method of replacing the most significant bit and scrambling-diffusion algorithm is designed to encrypt the plaintext image. …”
Get full text
Article -
364
Modified Tang and Pun’s Current Comparator and Its Application to Full Flash and Two-Step Flash Current Mode ADCs
Published 2017-01-01“…The application of the proposed current comparator has also been put forth by implementing a 3-bit current mode (CM) ADC and a two-step 3-bit CM ADC. …”
Get full text
Article -
365
Digital Simulation of Superconductive Memory System Based on Hardware Description Language Modeling
Published 2018-01-01“…We attained the low power by connecting a shared/common bit line and using a 1-bit memory cell. Through our design we may attain 2.5–3.5 microwatts of power using lower input voltage of 0.6 millivolts. …”
Get full text
Article -
366
Flow consistency in an intensive SDN security architecture with multiple controllers
Published 2017-12-01“…As critical components in SDN,controllers are prone to suffer from a series of potential attacks which result in system crashes.To prevent the compromise caused by single failure of controller or flow-tampering attacks,Mcad-SA,an aware decision-making security architecture with multiple controllers was proposed,which coordinates heterogeneous controllers internally as an“associated”controller.This architecture extends existing control plane and takes advantage of various controllers’merits to improve the difficulty and cost of probes and attacks from attackers.In this framework,flow rules distributed to switches are no longer relying on a single controller but according to the vote results from the majority of controllers,which significantly enhances the reliability of flow rules.As to the vote process of flow rules,segmentation and grading is adopted to pick up the most trustful one from multiple flow rules and implement flow consistency.This mechanism avoids comparison between rules via bit by bit which is impractical among several controllers.Theory analysis and simulation results demonstrates the effectiveness,availability and resilience of the proposed methods and their better security gain over general SDN architectures.…”
Get full text
Article -
367
Dual functional radar communication based on serial time division CC-CDMA
Published 2023-09-01“…In order to improve the performance of target detection and solve the problem of self-interference and mutual interference between multiple targets and multiple users, a radar communication integration system based on serial time division CC-CDMA was proposed.Firstly, the code division multiplexing mechanism was used to adjust the spread spectrum sequence of different subcodes in the complementary code to the signals on different time slices at the transmitter through the generalized PTM sequence to generate the integrated signal of radar communication.Secondly, the receiving end of the radar processed the data twice, and the point-by-point minimization method was used to fuse the processing results to improve the target detection capability of the radar subsystem.Lastly, at the receiving end of communication, the subcodes corresponding to the spread spectrum sequence at the transmitting end were used to de-amplify the received signals, and the bit error ratio was further reduced by interleaved coding and Hamming coding.Simulation results show that compared with other radar communication integration systems, the proposed system has lower bit error rate, higher Doppler resolution and better side lobe suppression performance.…”
Get full text
Article -
368
Method for generating pseudo random numbers based on cellular neural network
Published 2016-10-01“…To overcome the degradation characteristics of chaos system due to finite precision effect and improve the sta-tistical performance of the random number,a new method based on 6th-order cellular neural network (CNN) was given to construct a 64-bit pseudo random number generation (PRNG).In the method,the input and output data in every iteration of 6th-order CNN were controlled to improved the performance of the random number affected by chaos degradation.Then the data were XORed with a variable parameter and the random sequences generated by a Logistic map,by which the repeat of generated sequences was avoided,and the period of output sequences and the key space were expended.Be-sides,the new method was easy to be realized in the software and could generate 64 bit random numbers every time,thus has a high generating efficiency.Test results show that the generated random numbers can pass the statistical test suite NIST SP800-22 completely and thus has good randomness.The method can be applied in secure communication and other fields of information security.…”
Get full text
Article -
369
Multiagent Systems as an Approach to Building Fuzzy voter Communities using fuzzy languages
Published 2025-01-01Get full text
Article -
370
Numerical Simulation and Experimental Study on Flow of Polymer Aqueous Solution in Porous Jet Nozzle
Published 2020-01-01“…In this paper, a self-propelled porous jet bit with a support plate is designed, which can prevent the drill bit from jamming due to the jet nozzle against the bottom of the well during the drilling process. …”
Get full text
Article -
371
Analysis of Transmission Characteristics on an MSK-Based Rotating Magnet-Based Mechanical Antenna
Published 2022-01-01“…The simulation results show that when the inertia is less than 0.0128 kg∙m2 and the symbol rate is less than 4 bit/s, the bit error rate is less than 10%, thereby improving the transmission capacity. …”
Get full text
Article -
372
Performance Analysis of Iteratively Decoded Convergent Source Mapping with Sphere Packing-Assisted Differential Space-Time Spreading Technique for Efficient Video Transmission
Published 2021-01-01“…The proposed system follows the concept of iterations between the Soft-Bit Source-Decoder (SBSD) and Recursive Systematic Convolutional (RSC) decoder. …”
Get full text
Article -
373
Optimized SM4 Hardware Implementations for Low Area Consumption
Published 2024-01-01“…As a result, we report a 1-bit-serial SM4 encryption circuit that occupies 1771 GE with a latency of 2,336 cycles. …”
Get full text
Article -
374
Improved LDPC-based short-range frequency-hopping wireless communication system
Published 2017-12-01“…In short-range wireless communication system(SWCS),the complex scenarios make its transmission face the diverse interference,and lower hardware resource leads to its limited anti-interference capability.To achieve the reliable transmission,a frequency-hopping-based SWCS (FH-SWCS)with improved LDPC (I-LDPC) code was constructed.In FH-SWCS,a low-complexity check-sum updating(LCU)algorithm was proposed to reduce the amount of computation.LCU-based multi-threshold bit flipping (LCU-MTBF) algorithm was given to increase the reliability of bit-flipping, improving decoding performance and reduce the complexity of decoding.The simulation results demonstrate that LCU is suitable for multiple hard decisions decoding algorithm,and it can reduce the computational complexity of original decoding algorithm without affecting its performance.When BER is 10<sup>−5</sup>,and iterations number is 5,0.15dB performance gain can be achieved,and the number of additions algorithm can be reduced about 40% in LCU-MTBF.In FH-SWCS with I-LDPC,when BER is 10<sup>−4</sup>,and SNR is 15dB,the performance gain about 7dB can be achieved to improve the anti-interference of the system effectively.…”
Get full text
Article -
375
Ghadeer-speech-crowd-corpus: Speech datasetMendeley Data
Published 2025-02-01“…Additionally, it is a mono dataset and contains 15,626 audio samples recorded at a sampling rate of 44,100 Hz, 16-bit depth, and bit rate of 705.6 kb/s. The recordings were conducted at the Academy for Media Training of the College of Media, University of Baghdad.…”
Get full text
Article -
376
SSCANL decoder based joint iterative detection and decoding algorithm
Published 2022-10-01“…In order to improve the receiver performance of the sparse code multiple access (SCMA) system based on polar codes, the cyclic redundancy check (CRC) aided joint iterative detection and decoding receiver scheme based on simplify soft cancellation list (SSCANL) decoder (C-JIDD-SSCANL) was proposed.A polar code decoder in the C-JIDD-SSCANL receiver used the SSCANL algorithm.In this algorithm, decoding node deletion technology was used to simplify L times of soft cancellation (SCAN) decoding required by soft cancellation list (SCANL) algorithm by deleting frozen bit nodes, then the computational process of soft information update between nodes was simplified, and the computational complexity of decoding algorithm was reduced.The simulation results show that the SSCANL algorithm can obtain the same performance as the SCANL algorithm, and its computational complexity is reduced compared with the SCANL algorithm.Compared with the joint iterative detection and decoding scheme based on SCAN decoder (JIDD-SCAN) and the CRC aided joint iterative detection and decoding scheme based on SCAN decoder (C-JIDD-SCAN), the performance of C-JIDD-SSCANL receiver scheme based on SSCANL decoder is improved by about 0.65 dB and 0.59 dB respectively when the bit error rate is 10<sup>-4</sup>.…”
Get full text
Article -
377
Switching MIMO System with Adaptive OFDM Modulation for Indoor Visible Light Communication
Published 2018-01-01“…The adaptive OFDM modulation, which is realized by power and bit allocation on OFDM subchannels, is utilized to achieve the maximum channel capacity under a given target bit error rate (BER). …”
Get full text
Article -
378
Reflected entropy in random tensor networks. Part III. Triway cuts
Published 2024-12-01“…Minimal triway cuts can be formulated as integer programs which cannot be relaxed to find a dual maximal flow/bit-thread description. This sheds light on the gap between the existence of tripartite entanglement in holographic states and the bipartite entanglement structure motivated by bit-threads. …”
Get full text
Article -
379
A Hybrid Multiuser Detector Based on MMSE and AFSA for TDRS System Forward Link
Published 2014-01-01“…The simulation results show that the bit error ratio and near-far resistance performances of the proposed detector are much better, compared with MF, DEC, and MMSE, and are quite close to OMD. …”
Get full text
Article -
380