Showing 441 - 460 results of 2,355 for search '"symbol"', query time: 0.04s Refine Results
  1. 441

    İLK DÖNEM KUR’AN TASAVVURU VE DÖNÜŞÜMÜ -Kimlik ve Kitâb İlişkisi Bağlamında- by Selim Türcan

    Published 2008-11-01
    “…Ka’bah was the central symbol. But Arabs were emulating their neighbours and they were desiring to achieve a scripture like them. …”
    Get full text
    Article
  2. 442

    Joint blinding estimation of the spread-spectrum sequence and information sequence for short-code DS-SS signal by Xiao-tian REN, Hui XU, Zhi-tao HUANG, Feng-hua WANG

    Published 2012-04-01
    “…The problem of joint blinding estimation of the spread-spectrum sequence and information sequence of DS-SS signals was studied.First,the received signal is divided into double-symbol-period-length temporal vectors,with one-symbol-period overlapping,accumulates of these vectors one by one to form the signal matrix.Then,an operation of singular value decomposition (SVD) may be applied to the matrix to estimate the spread-spectrum and information sequence jointly.The algorithm makes use of a single vector space to estimate the spread-spectrum sequence and information sequence blindly,without known the desynchronization time,even in low SNR.The algorithm is not only unaffected by the type of spreading spectrum sequence,but also avoids to solving the problem of the phase ambiguity when use two vectors to reconstruct spread-spectrum sequence,which based on EVD blinding estimate algorithm.So it heightens the validity of blinding estimation.At last,simulation results demonstrate the validity of the algorithm.…”
    Get full text
    Article
  3. 443

    Index modulation aided frequency hopping anti-jamming and encryption method based on rotation scrambling by Xinjin LU, Jing LEI, Yuxin SHI

    Published 2021-12-01
    “…In order to improve the anti-jamming ability and security of the wireless communication system, an index frequency-hopping anti-interference encryption method based on rotation scrambling was designed, which could be simply called encrypted index modulation frequency hopping spread spectrum (EIM-FHSS).Firstly, the wireless secret key was used to control multiple orthogonal frequency hopping patterns to determine the available frequencies at the current moment.The index of the active frequency (the frequency point with the modulation symbol) was used to transmit the bit information.Secondly, the secret key was used to employ scrambling encryption on the mapping table between information bits and the indexes, to ensure the security of the index bits.Finally, constellation rotation encryption was used on the symbols transmitted on the active frequency in the scheme, which ensured the security of symbol bits.Theoretical analysis and simulation results show that the proposed EIM-FHSS method has stronger security and anti-jamming abilities than the traditional IM-FHSS methods.…”
    Get full text
    Article
  4. 444

    Britannia : Grandeur et infortune d’une allégorie nationale dans l’univers du cartoon britannique 1842-1999 by Gilbert Millat

    Published 2003-01-01
    “…They turned her into a definitely helpless and obsolete symbol whose identity was sometimes usurped by such anti-heroes as Colonel Blimp. …”
    Get full text
    Article
  5. 445

    SER Performance of Enhanced Spatial Multiplexing Codes with ZF/MRC Receiver in Time-Varying Rayleigh Fading Channels by In-Ho Lee

    Published 2014-01-01
    “…The proposed E-SMC allows a transmitted symbol to be repeated over time to achieve further diversity gain at the cost of the encoding rate. …”
    Get full text
    Article
  6. 446

    Overview of research progress on blind separation methods for single channel communication signal by Wen DENG, Zhitao HUANG, Xiang WANG

    Published 2023-08-01
    “…Significant progress has been made in the research of single channel blind signal separation (SCBSS) methods, as the theoretical and practical applications of SCBSS technology have been continuously improved.A new classification framework for blind signal separation (BSS) of communication signal problems was proposed based on an analysis of a large number of academic research results from both domestic and international sources.The division of SCBSS problems into four levels: multi-signal waveform separation, single-signal waveform separation, multi-signal symbol sequence separation, and single-signal symbol sequence separation was determined by taking into consideration the demand for output results of BSS systems in different application scenarios.Subsequently, the research status of SCBSS methods was systematically reviewed.Furthermore, the current research status of data-driven SCBSS was summarized, and the problems and solutions that needed to be addressed in data-driven SCBSS technology were explored.Finally, several potential research directions for SCBSS were analyzed and forecasted.The aim is to provide a reference for the research and application of SCBSS.…”
    Get full text
    Article
  7. 447

    Put'-doroga ('Along the road') by V.V. Kolesov

    Published 2017-10-01
    “…., the constructs of its image, idea, symbol, and mental conceptum (original meaning). A mental paradigm is built out of four constituents – the initial foundation and etiological forms having causative relations – condition, real cause, and final cause, i.e., aim. …”
    Get full text
    Article
  8. 448

    The Greek Vision of America during the Greek War of Independence (1821-1830) by Konstantinos Diogos

    Published 2022-04-01
    “…This powerful symbol of liberty was integrated in the Greek vision of freedom. …”
    Get full text
    Article
  9. 449

    Performance analysis of DSSS system with periodic sequence against CW interference1 by WEI An-quan1, SHEN Lian-feng 1

    Published 2007-01-01
    “…Based on the brief account of the performance analysis result of direct sequence spread spectrum(DSSS) system against single tone continuous wave(CW) interference obtained from the traditional stand Gaussian approximation(SGA) hypothesis,the mathematical expression of the interference component of the symbol decision variable in the periodic sequence DSSS system under CW interference was deduced and the actual performance of DSSS system with a periodic sequence against CW interference was researched by theoretical analysis and numerical simulations.The results indicate that the interference component of the symbol decision variable in the periodic sequence DSSS system under CW interference takes on a constant level or a monochromatic fluctuation,which does not approach the standard Gaussian distribution,and the actual performance of DSSS system with a periodic sequence against CW interference is completely different from the analytic result resorted to the stand Gaussian approximation(SGA).The bit error performance is correlative not only with the interference-signal ratio(ISR),with the frequency offset and with phase of the CW interference sensitively,but also with the individual spread spectrum code sequence.…”
    Get full text
    Article
  10. 450

    M-APSK phase detection algorithm and parallel carrier synchronization method by Hao HUAN, Kexue REN

    Published 2024-03-01
    “…In order to realize the precise phase correction of high order modulation in M-APSK modem, the Q-power non-data aided phase detection method recommended by DVB-S2 standard for 16APSK and 32APSK was extended to 64APSK, 128APSK and 256APSK.An improved algorithm was proposed to solve the problem of unstable loop operation when the proportion of constellation points used for phase detection in high-order modulation was low.By using threshold judgment on the amplitude of the received symbol after power normalization, phase detection was performed only when the amplitude was higher than the threshold, and the filter state and phase compensation value were not changed when the amplitude was lower than the threshold, so as to improve the phase detection effectiveness and reliability of constellation points and reduce the lock threshold.Aiming at the problem that the symbol rate of high-speed data transmission was very high but the working clock frequency of the processor was relatively low, a parallel carrier synchronization method for M-APSK was proposed, which could meet the needs of the receiver’s working clock.Compared with the traditional constant coding and modulation (CCM) carrier synchronization loop, the parallel method could also be applied to the frequency tracking of variable coding and modulation (VCM) system.…”
    Get full text
    Article
  11. 451

    Kosova’s Goddess on the Throne: Critical Fabulation as an Anthropological Method by Drita Bruqi Kabashi

    Published 2023-12-01
    “…In addition to being an important Neolithic artifact, this enigmatic figurine has become the symbol of Prishtina, Kosova. Empirical evidence from the Balkan Neolithic can help theorize aspects of the goddess’s usage and meaning, but little can be known definitively (for example, the perceived gender of the figurine). …”
    Get full text
    Article
  12. 452

    Chased by a Unicorn by Georgios Orfanidis

    Published 2021-01-01
    “…The parable of the Futile Life, which is an excerpt of the medieval, multilingual novel Barlaam and Josaphat, conceals a unique interpretative approach, in terms of symbolism, of an ancient and intercultural mythological symbol, that of the unicorn. …”
    Get full text
    Article
  13. 453

    Optimizing Cooperative Cognitive Radio Networks with Opportunistic Access by Ammar Zafar, Mohamed-Slim Alouini, Yunfei Chen, Redha M. Radaydeh

    Published 2012-01-01
    “…Resource allocation is based on minimizing the symbol error rate at the receiver. Both the cases of all-participate relaying and selective relaying are considered. …”
    Get full text
    Article
  14. 454

    A Bit-Parallel Tabu Search Algorithm for Finding Es2-Optimal and Minimax-Optimal Supersaturated Designs by Luis B. Morales, Dursun A. Bulutoglu

    Published 2023-01-01
    “…We prove the equivalence of two-symbol supersaturated designs (SSDs) with N (even) rows, m columns, and smax=4t+i, where i∈0,2 and t∈ℤ≥0 and resolvable incomplete block designs (RIBDs) whose any two blocks intersect in at most N+4t+i/4 points. …”
    Get full text
    Article
  15. 455

    Estimation of FBMC/OQAM Fading Channels Using Dual Kalman Filters by Mahmoud Aldababseh, Ali Jamoos

    Published 2014-01-01
    “…Once the fading channel coefficients at pilot symbol positions are estimated by the proposed method, the fading channel coefficients at data symbol positions are then estimated by using some interpolation methods such as linear, spline, or low-pass interpolation. …”
    Get full text
    Article
  16. 456

    Sparse Representation Based Range-Doppler Processing for Integrated OFDM Radar-Communication Networks by Bo Kong, Yuhao Wang, Henry Leung, Xiaohua Deng, Huilin Zhou, Fuhui Zhou

    Published 2017-01-01
    “…Numerical simulations show that the proposed method outperforms the traditional modulation Symbol-Domain method under ideal and realistic nonideal scenarios.…”
    Get full text
    Article
  17. 457

    Tehnici auctoriale de încriptare a simbolului infantil. Studiu de caz: Jean-Jacques Rousseau, Émile by Cristina Deutsch

    Published 2018-12-01
    “…Seen, in fact, as a conventional symbol in fiction, the child will be viewed in this case more as an incarnation of the natural child, changing, in this way, the previous perceptions of childhood, both at a scientific level and at a literary one. …”
    Get full text
    Article
  18. 458

    Without Pictorial Detour: Benjamin, Mies and the Architectural Image by Lutz Robbers

    Published 2016-04-01
    “…Especially the architectural image, whether in the form of a printed drawing, photographic illustration, or an actual built object, appears to have been crucial for placing the history of media technologies (architecture being one of these media) in a constellation with the ‘archaic symbol-worlds of mythologies.’ If architecture is, as Benjamin claims in his initial notes for The Arcades Project, ‘the most important testimony to latent “mythology,”’ the architectural image might very well be the agent that causes the moment of awakening, the instance when a constellation between technology and ancient symbol worlds is formed. …”
    Get full text
    Article
  19. 459

    Crime mapping features by O. V. Manzhai, А. О. Потильчак

    Published 2020-12-01
    “…A method of mapping using proportional symbol mapping is disclosed when the increase in the size of the symbol denoting a point on the map is proportional to the increase in the number of events or other parameters at these coordinates. …”
    Get full text
    Article
  20. 460

    Performance analysis of generalized orthogonal code index modulation system by Lina BIAN, Huizhen FENG, Xiaoping JIN, Weizhong LOU, Chongxiao QU

    Published 2022-08-01
    “…In order to improve the transmission efficiency of the code index modulation (CIM) system, a generalized orthogonal code index modulation (GQCIM) system with lower complexity was proposed, which was a single input single output (SISO) system.CIM system used spreading codes and constellation symbols to transmit information, but only activated two spreading code indexes and one modulation symbol.GQCIM system overcame the limitation of only activating one modulation symbol at a time in a novel way, at the same time, made full use of the orthogonality of modulation symbols, increased the spreading code index to transmit more additional information bits, and improved the transmission efficiency of the system.In addition, the theoretical performance of GQCIM system was analyzed and derived the upper bound of bit error rate performance.Then the performance of GQCIM was verified by Monte Carlo simulation, and the theoretical and simulation performance of GQCIM system was found to be consistent.And under the same transmission efficiency, the results show that the performance of GQCIM system is better than the same orthogonal modulation system, such as generalized code index modulation (GCIM) system, CIM system, code index modulation aided quadrature spatial modulation (CIM-QSM) system, code index modulation aided spatial modulation (CIM-SM) system, pulse index modulation (PIM) system.…”
    Get full text
    Article