نتایج جستجو برای: channel construction
تعداد نتایج: 429805 فیلتر نتایج به سال:
This paper addresses the initial stages for the design, construction and testing of a two-channel, twostage downconverter from Ku-band to IF, where the emphasis on relative phase accuracy and inter-channel cross-talk requirements are critical design elements in the application of the downconverter for interferometric radar applications.
We present a comparative study of the performance of various polar code constructions in an additive white Gaussian noise (AWGN) channel. A polar code construction is any algorithm that selects K best among N possible polar bit-channels at the design signal-to-noise-ratio (design-SNR) in terms of bit error rate (BER). Optimal polar code construction is hard and therefore many suboptimal polar c...
We show that in the context of the Iyer et al. 67-variable cardiac myocycte model (IMW), it is possible to replace the detailed 13-state probabilistic model of the sodium channel dynamics with a much simpler Hodgkin-Huxley (HH)-like two-state sodium channel model, while only incurring a bounded approximation error. The technical basis for this result is the construction of an approximate bisimu...
Recently, a purely quantum version of polar codes has been proposed in~\cite{DGMS19} based on channel combining and splitting procedure, where randomly chosen two-qubit Clifford unitary acts as operation. Here, we consider the code construction using same procedure in~\cite{DGMS19}, but with fixed unitary. For family Pauli channels, show that polarization happens in multi-levels, synthesized vi...
This paper deals with the application of Iterative Learning Control (ILC) to further improve the performance of teleoperation systems based on Smith predictor. The goal is to achieve robust stability and optimal transparency for these systems. The proposed control structure make the slave manipulator follow the master in spite of uncertainties in time delay in communication channel and model pa...
Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...
This paper presents a new statistical approach to the blind estimation of linear multiple-input multiple-output (MIMO) channels with finite impulse response. A matrix pencil is constructed from a set of fourth-order cumulant matrices of the channel output signals. The MIMO channel impulse responses can then be efficiently estimated from the generalized eigendecomposition of this cumulant matrix...
This paper considers the use of the best high-rate k/(k+1) convolutional codes obtained using the new construction technique described in [1] in a concatenated scheme. Simulation results for an AWGN channel and for a realistic magnetic recording channel are reported. It is shown that these codes, endowed with a decoding algorithm working on the dual code, yield performance improvements over the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید