نتایج جستجو برای: time code

تعداد نتایج: 2017764  

1999
Dimitris Kalogiros Vassilis Stylianakis

The traditional waveform coding techniques for digital communication systems convert the original analog input signal into a digital bit stream using uniform sampling in the time domain, i.e., PCM, DM, ADPCM. In this paper we propose the Time Code Modulation (TCM) technique as an alternative coding scheme, where information is extracted from the signal, only at the time instants when necessary....

Journal: :IEEE Trans. Communications 2000
Hamid Jafarkhani

It has been shown that a complex orthogonal design that provides full diversity and full transmission rate for a space–time block code is not possible for more than two antennas. Previous attempts have been concentrated in generalizing orthogonal designs which provide space–time block codes with full diversity and a high transmission rate. In this work, we design rate one codes which are quasi-...

2015
Daniel Prokesch Peter Puschner

Prohibiting external control is one of the key principles engineers apply when building time-predictable computer systems (e.g., time-triggered computer systems do not react to any external interrupts from sensors or devices, but all actions of these computer systems are triggered solely by the progression of the local clock). In this paper we apply this principle of prohibiting external contro...

Journal: :IEEE Trans. Vehicular Technology 2008
Chau Yuen Yong Liang Guan Tjeng Thiang Tjhung

—In this paper, we propose two new systematic ways to construct amicable orthogonal designs (AOD), with an aim to facilitate the construction of power-balanced orthogonal space-time block codes (O-STBC) with favorable practical attributes. We also show that an AOD can be constructed from an Amicable Family (AF), and such a construction is crucial for achieving a power-balanced O-STBC. In additi...

Journal: :IACR Cryptology ePrint Archive 2013
Daniel J. Bernstein Tung Chou Peter Schwabe

This paper presents extremely fast algorithms for code-based public-key cryptography, including full protection against timing attacks. For example, at a 2 security level, this paper achieves a reciprocal decryption throughput of just 60493 cycles (plus cipher cost etc.) on a single Ivy Bridge core. These algorithms rely on an additive FFT for fast root computation, a transposed additive FFT fo...

Journal: :EURASIP Journal on Wireless Communications and Networking 2013

Journal: :Research and Development on Information and Communication Technology 2018

Journal: :International Journal of Communications, Network and System Sciences 2009

Journal: :MATEC web of conferences 2021

In the recent years, design of any order space-time block code did not appear in previous. this paper, we investigate criterion that how to Multiple input multiple output(MIMO) visible light communication(VLC) system. Based on second code, give arbitrary order. Then discuss difference between traditional MIMO system and optical It is found codes can be modified by it also realize independent de...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید