نتایج جستجو برای: svd based channel decorrelation
تعداد نتایج: 3107684 فیلتر نتایج به سال:
This paper presents an analysis of the channel capacity for 2×2 multiple input multiple output (MIMO) antenna systems. In this research, channel capacity is simultaneously analyzed by arbitrary transmitting (Tx) and receiving (Rx) antenna correlation matrix with correlated fading channel matrix. The channel capacity for 2×2 MIMO system is calculated. Considered parameters include receiving sign...
A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in space to secure OFDM with low overheads on encryption, decryption, and key distribution. These prop...
In this paper, we try to improve the security of image transmission over IEEE 802.15.1 Bluetooth networks. We propose a new approach for audio watermarking using the singular value decomposition (SVD) mathematical technique. This approach is based on embedding the encrypted image in the singular values of the audio signal after transforming it into a 2D format. After watermark embedding, the au...
Recently, LSI (Latent Semantic Indexing) based on SVD (Singular Value Decomposition) is proposed to overcome the problems of polysemy and homonym in traditional lexical matching. However, it is usually criticized as with low discriminative power for representing documents although it has been validated as with good representative quality. In this paper, SVD on clusters is proposed to improve th...
Bistatic SAR systems are an emerging research field, in which context the Universitat Politecnica de Catalunya is developing a ground based bistatic system using ESA’s ENVISAT and ERS-2 as transmitters. The spatial resolution of this configuration is similar to that of their monostatic counterpart, although foreshortening effects have a lesser impact. The formulation of the interferometric phas...
The existing physical layer security algorithm, which is based on artificial noise, could affect legitimate receivers negatively when the number of users is no less than sending antennas in multi-user MIMO system. In order to improve security of multi-user MIMO system under this scenario, we propose a new multi-user MIMO system physical layer security algorithm based on joint channel state matr...
Realizing non-unitary transformations on unitary-gate based quantum devices is critically important for simulating a variety of physical problems including open systems and subnormalized states. We present dilation algorithm to simulate operations using probabilistic computing with only one ancilla qubit. utilize the singular-value decomposition (SVD) decompose any general operator into product...
In this paper we develop linear detectors suitable for a Code Division Multiple Access (CDMA) mobile receiver using long codes. The special signal structure in the downlink transmission is exploited to obtain a simple detection rule. A least-squares (LS) detector, a best linear unbiased estimator (BLUE) detector, and a linear minimum mean-square error (LMMSE) detector are derived. For the LMMSE...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید