首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8篇
  免费   0篇
数学   3篇
无线电   5篇
  2013年   1篇
  2008年   1篇
  2005年   2篇
  2003年   1篇
  2002年   2篇
  2001年   1篇
排序方式: 共有8条查询结果,搜索用时 8 毫秒
1
1.
This paper considers the problem of wireless location in code-divisionmultiple-access (CDMA)cellular system. Through the method of jointly estimating angle of arrival(AOA) and time ofarrival (TOA), a novel scheme is proposed for radiolocation in multipathenvironment, especiallywhen line-of-sight (LOS) path is not available to every base station involvedin location servicefor a mobile subscriber. The Cramer-Rao bound (CRB) is derived for the jointestimator. Based onsimulation results, the accuracy of the proposed wireless location scheme inCDMA system is assessed.  相似文献   
2.
In this paper, a media access control (MAC) protocol is proposed for multimedia traffic in slotted CDMA wireless communication systems. The channel resource is partitioned into four compartments: video, voice and data compartments, and common resource pool (CRP) which can be used by either voice or data. Video is only permitted to use its pre-allocated channels. Besides assigning voice to its own compartment, a threshold type decision policy is introduced to regulate voice call admission control in CRP. Data can use not only data and CRP compartments, but also the idle capacity of both video and voice. The proposed protocol provides a simple and flexible resource allocation decision for the multimedia traffic such that the bandwidth can be utilized efficiently while satisfying the quality of service (QoS) requirement for each traffic category. Two mathematical analysis methods are applied to evaluate the system performance. The first, Traditional Markov Analysis (TMA) is used to calculate the video and the voice blocking probabilities, and the second, Transient Fluid Analysis (TFA) is adopted to evaluate the average data delay and the channel utilization. Computer simulations verify the accuracy of mathematical models.Miao Ma received the B.Eng. and M.Eng. degrees in Electrical Engineering from Harbin Institute of Technology, China in 1992 and 1996, respectively, and the Ph.D degree in Electrical and Electronic Engineering from Nanyang Technological University, Singapore in 2003. She is a research scientist in the Institute for Infocomm Research in Singapore. Her research interests include network security, media access control, wireless communications and computer networking.Erry Gunawan received the B.Sc. degree in electrical and electronic engineering from the University of Leeds, U.K., in 1983 and the M.B.A. and the Ph.D. degrees, both from Bradford University, in 1984 and 1988, respectively. From 1984 to 1988, he was a Satellite Communication System Engineer at Communication Systems Research Ltd., Ilkley, U.K. In 1988, he moved to Space Communication (SAT-TEL) Ltd, Northampton, U.K. He joined the School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, in 1989, and currently, he is an Associate Professor in the same school. His research interests include the fields of digital communications, mobile and satellite communications, error coding, and spread spectrum. He has published over 60 international research papers and has been a consultant to a local company on the study of DECT system and BLUETOOTH.  相似文献   
3.
We propose iterative multiuser detectors for asynchronous code-division multiple-access with parallel-concatenated convolutional codes (turbo codes) and with serially concatenated convolutional codes (SCCC). At each iteration we update and exchange the extrinsic information from the multiuser detector and channel decoders and regenerate soft information between constituent convolutional decoders. Simulation results show that with the proposed structure, near-single-user performance can be achieved. We also propose two reduced-complexity techniques, i.e., the reduced-state iterative multiuser detector based on the T-MAP algorithm and the iterative interference canceler based on a noise-whitening filter. Simulation results show a small performance degradation for these two techniques, particularly for the T-MAP receiver  相似文献   
4.
5.
Recently, some multiplicative groups of algebraic integers wereused to obtain quadrature amplitude modulation (QAM) signalspaces and to design error-correcting codes. This paper showsthat one subgroup of the multiplicative group of units in thealgebraic integer ring of each quadratic number field with uniquefactorization property Q(m), modulo the ideal (2n), can be usedto obtain a QAM signal space of 22n–2 points with goodgeometrical properties, where n 3, m 1 (mod 8) and m is asquare-free rational integer. These QAM signals can be codedsuch that a differentially coherent method can be applied todemodulate the QAM signals. The multiplicative subgroups canalso be used to construct block codes over Gaussian integerswhich are able to correct some error patterns.  相似文献   
6.
This paper derives an algorithm for constructing codes overfinite fields of the algebraic integer ring of the cyclotomicfield Q(e2i/n) modulo irreducible elements with the norm p2,where n {3, 4, 5, 7, 8, 9, 11, 12, 13, 15, 16, 17, 19, 20,21, 24, 25, 27, 28, 32, 33, 35, 36, 40, 44, 45, 48, 60, 84},where p x n and p is a prime number.  相似文献   
7.
A MAC protocol for new and handoff calls with a finite populationof users, rather than with an infinite user population as indynamic channel reservation scheme (DCRS), is considered. Similarto DCRS, we divide the wireless channels into shared channels andreserved channels. The handoff calls access any available channelwith probability of one, while the new calls access a sharedchannel with probability of one and access a reserved channel witha request probability. We propose three simpler formulae than thatused in the existing DCRS in setting the request probability. Inaddition, the handoff calls in our proposed protocol are allowedto queue in a finite buffer. To evaluate the system performance, amathematical model based on queuing theory, rather than asimulation method used in DCRS, is developed. It is a generalmodel that can be adopted for any types of request probabilitiesincluding DCRS. Suggestions of how to get the optimum values ofthe design parameters are also given.  相似文献   
8.
This paper studies the possibility of distinguishing between benign and malignant masses by exploiting the morphology-dependent temporal and spectral characteristics of their microwave backscatter response in ultra-wideband breast cancer detection. The spiculated border profiles of 2-D breast masses are generated by modifying the baseline elliptical rings based upon the irregularity of their peripheries. Furthermore, the single- and multilayer lesion models are used to characterize a distinct mass region followed by a sharp transition to background, and a blurred mass border exhibiting a gradual transition to background, respectively. Subsequently, the complex natural resonances (CNRs) of the backscatter microwave signature can be derived from the late-time target response and reveal diagnostically useful information. The fractional sequence CLEAN algorithm is proposed to estimate the lesions' delay intervals and identify the late-time responses. Finally, it is shown through numerical examples that the locations of dominant CNRs are dependent on the lesion morphologies, where 2-D computational breast phantoms with single and multiple lesions are investigated. The analysis is of potential use for discrimination between benign and malignant lesions, where the former usually possesses a better-defined, more compact shape as opposed to the latter.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号