نتایج جستجو برای: multiple channel

تعداد نتایج: 959656  

Journal: :Inf. Sci. 1999
Lin Wu Pramod K. Varshney

Busy tone multiple access protocols have been used in multihop networks to reduce the effect of the hidden terminal problem. This paper demonstrates another approach to reduce the effect of the hidden terminal problem namely the use of multiple channel schemes. A protocol that uses both the busy tone and the multiple channel techniques achieves the best performance. Using a Markov chain model a...

2013
Lin Wu Pramod K. Varshney

Busy tone multiple access protocols have been used in multihop networks to reduce the effect of the hidden terminal problem. This paper demonstrates another approach to reduce the effect of the hidden terminal problem namely the use of multiple channel schemes. A protocol that uses both the busy tone and the multiple channel techniques achieves the best performance. Using a Markov chain model a...

2001
Nejat Kamaci Yucel Altunbasak Russell M. Mersereau

Abstract—An effective way of providing error resilience with a relatively small reduction in compression ratio is multiple description coding (MDC). All multiple description codes to date assume the existence of multiple independent “on-off” channels between the transmitter and receiver. Each link is either broken in which case the symbols or packets are completely lost, or it functions properl...

Journal: :CoRR 2017
Masahito Hayashi Ning Cai

Multiple-user information theory, or network information theory, was started by C. E. Shannon, the founder of Information Theory [1]. The only multiple-user channel in classical information theory whose single-letter capacity region is completely known, is the multiple access channel (MAC). MAC is a channel with a single output and two (or more) inputs. Its capacity region was determined by R. ...

2010
Marcin Bienkowski Marek Klonowski Miroslaw Korzeniowski Dariusz R. Kowalski

In this paper we consider the mutual exclusion problem on a multiple access channel. Mutual exclusion is one of the fundamental problems in distributed computing. In the classic version of this problem, n processes perform a concurrent program which occasionally triggers some of them to use shared resources, such as memory, communication channel, device, etc. The goal is to design a distributed...

2003
Hagen Spies Per-Erik Forssén

We present a two-dimensional information representation, where small but overlapping Gaussian kernels are used to encode the data in a matrix. Apart from points we apply this to constraints that restrict the solution to a linear subspace. A localised decoding scheme accurately extracts multiple solutions together with an estimate of the covariances. We employ the method in optical flow computat...

2003
M. ALVO

The eigenvalue densities of complex central Wishart matrices are investigated with the objective of studying an open problem in channel capacity. These densities are represented by complex hypergeometric functions of matrix arguments, which can be expressed in terms of complex zonal polynomials. The connection between the complex Wishart matrix theory and information theory is given. This facil...

Journal: :CoRR 2017
Rick Fritschek Gerhard Wunder

We study a deterministic approximation of the two-user multiple access wiretap channel. This approximation enables results beyond the recently shown 2 3 secure degrees of freedom (s.d.o.f.) for the Gaussian multiple access channel. While the s.d.o.f. were obtained by real interference alignment, our approach uses signal-scale alignment. We show an achievable scheme which is independent of the r...

Journal: :Journal of neuroscience methods 2007
Edward A Clancy Hongfang Xia Anita Christie Gary Kamen

Multiple-channels of electromyogram activity are frequently transduced via electrodes, then combined electronically to form one electrophysiologic recording, e.g. bipolar, linear double difference and Laplacian montages. For high quality recordings, precise gain and frequency response matching of the individual electrode potentials is achieved in hardware (e.g., an instrumentation amplifier for...

Journal: :IET Communications 2017
Bin Dai Zheng Ma

The physical layer security in the up-link of the wireless communication systems is often modeled as the multiple access wiretap channel (MAC-WT), and recently it has received a lot attention. In this paper, the MAC-WT has been re-visited by considering the situation that the legitimate receiver feeds his received channel output back to the transmitters via two noiseless channels, respectively....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید