نتایج جستجو برای: mono bit receiver
تعداد نتایج: 123602 فیلتر نتایج به سال:
In this paper, objective function based group-wise successive interference cancellation (GSIC) receiver is proposed for a dual-rate DS-CDMA system. In the receiver, user signals are divided into 2 groups for their data rates. Initial bit estimates for the users in the group 1 are obtained by its matched filter (MF) bank. The initial bit estimates for the group 1 users are fed into the multi-use...
The ANU 500 m dish has been in operation since 2010 with a mono-tube steam cavity receiver, the SG4 system for the production of steam used for electricity generation. Dynamic modelling of this system is crucial for achieving robust control and optimised performance. This paper presents ongoing work with the dynamic modelling and simulation of a mono-tube steam cavity receiver for direct steam ...
Yves Cyclic redundancy check-based detection algorithms for automatic identification system signals received by satellite. SUMMARY This paper addresses the problem of demodulating signals transmitted in the automatic identification system. The main characteristics of such signals consist of two points: (i) they are modulated using a trellis-coded modulation, more precisely a Gaussian minimum sh...
We study the joint optimization problem of a transmitter with multiple transmit antennas and a receiver with multiple receive antennas in a narrow-band communication system. We discuss the problem of designing a pre-filter at the transmitter, a post-filter at the receiver, and a bit allocation pattern to multiple symbols in the sense of minimizing the average bit error rate. With the optimized ...
in this work the performance of a wavelength division multiple access (wdma) system with direct detection receiver is investigated. for this purpose, the probability of error in a wdma network with ook modulation considering crosstalk, isi, photo detector noise and thermal noise is calculated and the effect of each on system performance is investigated. the system performance in presence of pin...
The Multi-User Detection in Code Division Multiple Access with Adpative Neuro-Fuzzy Inference System
In this paper, multi user detection in Code Division Multiple Access (CDMA) was realized with an adaptive neuro-fuzzy inference system (ANFIS) and the bit error rate (BER) performance was compared with the performances of the matched filter and a neural network receiver. Increment of the number of the active users and the receiving various user signals at the receiver input stage in different p...
Original scientific paper This paper presents coded differential TR (cDTR) receiver that transmits extra bit by mapping information in K different orthogonal codes. The performance of the coded DTR is analyzed and compared with the conventional DTR. Throughout the analysis, the performance of receivers in terms of bit error probability (BEP), data rate and receiver complexity are assessed. The ...
Recently, a digital communication receiver, called a third-generation receiver, has been developed. This receiver takes samples of the direct-sequence spread signal at a nonzero intermediate frequency (IF) instead of the zero IF (baseband), and quantizes the samples by employing a 1-b analog-to-digital (A/D) converter at the receiver front end. These 1-b samples are digitally processed for pseu...
This paper considers interference limited communication systems where the desired user and interfering users are symbol-synchronized. A novel adaptive beamforming technique is proposed for quadrature phase shift keying (QPSK) receiver based directly on minimizing the bit error rate. It is demonstrated that the proposed minimum bit error rate (MBER) approach utilizes the system resource (antenna...
RSA algorithm is an asymmetric key cryptography. It is a block cipher. RSA has stronger security than single key cryptography. RSA has a pair of keya private key a and public key. Sender sends the message encrypting it with the public key of receiver. Receiver receives the message by decrypting it with its private key. RSA provides authentication and integrity. So it is used in SSL for key exch...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید