BINARY DATA TRANSMISSION ON CHAOTICALLY FORMED CARRIER FREQUENCIES

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Carrier Frequencies, Holomorphy, and Unwinding

We prove that functions of intrinsic-mode type (a classical models for signals) behave essentially like holomorphic functions: adding a pure carrier frequency eint ensures that the anti-holomorphic part is much smaller than the holomorphic part ‖P−(f)‖L2 ‖P+(f)‖L2 . This enables us to use techniques from complex analysis, in particular the unwinding series. We study its stability and convergenc...

متن کامل

Adaptive Maximum-Likelihood Receiver for Carrier-Modulated Data-Transmission Systems

A new look is taken at maximum-likelihood sequence estimation in the presence of intersymbol interference. A uniform receiver structure for linear carrier-modulated data-transmission systems is derived which for decision making uses a modified version of the Viterbi algorithm. The algorithm operates directly on .the output signal of a complex matched filter and, in contrast to the original algo...

متن کامل

On Clustering Binary Data

Clustering is the problem of identifying the distribution of patterns and intrinsic correlations in large data sets by partitioning the data points into similarity classes. This paper studies the problem of clustering binary data. This is the case for market basket datasets where the transactions contain items and for document datasets where the documents contain “bag of words”. The contributio...

متن کامل

Block Codes for Asynchronous Data Transmission Designed from Binary Trees

We describe a class of codes that can be effectively used when one of qn vectors of length n has to be delivered to the receiver over a noiseless q-ary channel in asynchronous mode assuming that the latter one receives the transmitted vector with the delay τ ∈ {0, . . . , n − 1}, unknown in advance, while all other received symbols are arbitrarily chosen. The codes are specified for any n by a ...

متن کامل

Secure Operations on Tree-Formed Verification Data

We define secure operations with tree-formed, protected verification data registers. Functionality is conceptually added to Trusted Platform Modules (TPMs) to handle Platform Configuration Registers (PCRs) which represent roots of hash trees protecting the integrity of tree-formed Stored Measurement Logs (SMLs). This enables verification and update of an inner node of an SML and even attestatio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Russian Universities. Radioelectronics

سال: 2018

ISSN: 1993-8985

DOI: 10.32603/1993-8985-2018-21-5-5-12