نتایج جستجو برای: asymmetric channel
تعداد نتایج: 287637 فیلتر نتایج به سال:
We introduce two notions of discrepancy between binary vectors, which are not metric functions in general but nonetheless capture the mathematical structure asymmetric channel. These lead to new fundamental parameters error-correcting codes, both measure probability that maximum likelihood decoder fails. then derive various bounds for cardinality and weight distribution a code terms these param...
Totally asymmetric simple exclusion processes, consisting of two coupled parallel lattice chains with particles interacting with hard-core exclusion and moving along the channels and between them, are considered. In the limit of strong coupling between the channels, the particle currents, density profiles and a phase diagram are calculated exactly by mapping the system into an effective one-cha...
We discuss several aspects of coding for the asymmetric channel, with emphasis on iterative coding. We implement turboand LDPC decoders for the Z-channel, and a novel coding scheme designed to approach the optimum input distribution for the channel. Index terms Z-channel, iterative decoding, channel capacity.
This paper studies the channel asymmetric characteristic between a downlink and an uplink channel in orthogonal frequency division multiple access (OFDMA)/ time division duplexing (TDD) systems. To investigate the downlink and uplink channel asymmetry, we derive a propagation loss mo-del and a shadowing model taking into consideration geometrical information and inter-cell interference. Then, t...
Computational investigations have been performed into the behavior of an incompressible fluid flow in the vicinity of a plane symmetric channel contraction. Our aim is to determine the critical Reynolds number, above which the flow becomes asymmetric with respect to the channel geometry using the bifurcation diagram. Three channels, which are characterized by the contraction ratio, are studied ...
Side-channel attacks (SCAs) are powerful that could be used to retrieve keys from electronic devices. Several physical leakage sources can exploited in SCAs, such as power, time, heat, and so on. Heat is one of the side-channels not frequently analyzed by attackers literature due high noise associated with thermal traces. This article investigates practicality adapting power-based SCAs [i.e., c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید