期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
A VERTICAL LAYERED SPACE-TIME CODE AND ITS CLOSED-FORM BLIND SYMBOL DETECTION 被引量:1
1
作者 Zhao Zheng Yin Qinye Zhang Hong Feng Aigang (Institute of Information Engineering, Xi’an .Jiaotong University, Xi’an 710049) 《Journal of Electronics(China)》 2003年第2期102-109,共8页
Vertical layered space-time codes have demonstrated the enormous potential to accommodate rapid flow data. Thus far, vertical layered space-time codes assumed that perfect estimates of current channel fading condition... Vertical layered space-time codes have demonstrated the enormous potential to accommodate rapid flow data. Thus far, vertical layered space-time codes assumed that perfect estimates of current channel fading conditions are available at the receiver. However, increasing the number of transmit antennas increases the required training interval and reduces the available time in which data may be transmitted before the fading coefficients change. In this paper, a vertical layered space-time code is proposed. By applying the subspace method to the layered space-time code, the symbols can be detected without training symbols and channel estimates at the transmitter or the receiver. Monte Carlo simulations show that performance can approach that of the detection method with the knowledge of the channel. 展开更多
关键词 layered space-time code Array signal processing Subspace method Blind symbol detection
在线阅读 下载PDF
BLIND MULTIUSER DETECTION FOR V-BLAST CODED MULTICARRIER CDMA SYSTEM
2
作者 Deng Ke Yin Qinye Zhang Hong 《Journal of Electronics(China)》 2006年第1期14-19,共6页
Focusing on the space-time coded multiuser mobile communication systems in the frequency-selective fading environment, this paper proposes a Vertical Bell labs LAyered Space-Time (V-BLAST) coded Multicarrier Code-Divi... Focusing on the space-time coded multiuser mobile communication systems in the frequency-selective fading environment, this paper proposes a Vertical Bell labs LAyered Space-Time (V-BLAST) coded Multicarrier Code-Division Multiple-Access (MC-CDMA) scheme and its blind channel identification algorithm. This algorithm employs an ESPRIT-like method and the singular value decomposition, and the channels between every transmit antenna of every user and every receive antenna of the base station are blindly estimated with a closed-form solution. Based on it, an equivalent Minimum Mean-Squared Error (MMSE) time-domain multiuser detector is derived. Moreover, the proposed scheme exploits the precoding in the transmitter in order to eliminate the constraint of more receive antennas than transmit ones, required by most conventional V-BLAST codec schemes. Computer simulation results demonstrate the validity of this proposed scheme. 展开更多
关键词 MULTICARRIER code-division multiple-access Vertical Bell labs layered space-time code Multiuser detection
在线阅读 下载PDF
A Physical Layer Network Coding Based Tag Anti-Collision Algorithm for RFID System 被引量:3
3
作者 Cuixiang Wang Xing Shao +1 位作者 Yifan Meng Jun Gao 《Computers, Materials & Continua》 SCIE EI 2021年第1期931-945,共15页
In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,w... In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93. 展开更多
关键词 Radio frequency identification(RFID) tag anti-collision algorithm physical layer network coding binary search tree algorithm
在线阅读 下载PDF
Effects of Substrate Pretreatment Conditions on Quality of GaN Epilayer
4
作者 QINFu-wen GUBiao 《Semiconductor Photonics and Technology》 CAS 2003年第1期26-29,40,共5页
The pure cubic GaN(c-GaN) has been grown on (001)GaAs substrates by ECR-PAMOCVD technique at low temperature using TMGa and high pure N2 as Ga and N sources, respectively. The effects of substrate pretreatment conditi... The pure cubic GaN(c-GaN) has been grown on (001)GaAs substrates by ECR-PAMOCVD technique at low temperature using TMGa and high pure N2 as Ga and N sources, respectively. The effects of substrate pretreatment conditions on quality of cubic GaN epilayer are investigated by the measurements of TEM and XRD.It is found that hydrogen plasma cleaning, nitridation and buffer layer growth are very important for quality of cubic GaN epilayer. 展开更多
关键词 ECR-PAMOCVD Cubic GaN Hydrogen plasma NITRIDATION Buffer layer CLC number:TN312 +.8 Document code:
在线阅读 下载PDF
Scalable broadcast with network coding in heterogeneous networks
5
作者 SI Jing-jing ZHUANG Bo-jin CAI An-ni 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2010年第5期72-79,共8页
This article studies the scalable broadcast scheme realized with the joint application of layered source coding,unequal error protection (UEP) and random network coding from the theoretical point of view.The success... This article studies the scalable broadcast scheme realized with the joint application of layered source coding,unequal error protection (UEP) and random network coding from the theoretical point of view.The success probability for any non-source node in a heterogeneous network to recover the most important layers of the source data is deduced.This probability proves that in this broadcast scheme every non-source node with enough capacity can always recover the source data partially or entirely as long as the finite field size is sufficiently large.Furthermore,a special construction for the local encoding kernel at the source node is proposed.With this special construction,an increased success probability for partial decoding at any non-source node is achieved,i.e.,the partial decodability offered by the scalable broadcast scheme is improved. 展开更多
关键词 network coding linear broadcast layered source coding UEP
原文传递
Optimal energy-efficient scheme for two-way relay channel using physical layer network coding
6
作者 ZHOU Min CUI Qi-mei +3 位作者 WANG Hui TAO Xiao-feng TIAN Hui MIKKO Valkama 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2011年第6期51-58,共8页
Systems are always designed and optimized based on full traffic load in the current literatures. However, practical systems are seldom operating at full load, even at peak traffic hours. Instead of maximizing system r... Systems are always designed and optimized based on full traffic load in the current literatures. However, practical systems are seldom operating at full load, even at peak traffic hours. Instead of maximizing system rate to achieve the full load, an optimal energy-efficient scheme to minimize the transmit power with required rates is investigated in this article. The considered scenario is a two-way relay channel using amplify-and-forward protocol of physical layer network coding, where two end nodes exchange messages via multiple relay nodes within two timeslots. A joint power allocation and relay selection scheme is designed to achieve the minimum transmit power. Through convex optimization theory, we firstly prove that single relay selection scheme is the most energy-efficient way for physical layer network coding. The closed-form expressions of power allocation are also given. Numerical simulations demonstrate the performance of the designed scheme as well as the comparison among different schemes. 展开更多
关键词 ENERGY-EFFICIENT two-way relay channel physical layer network coding power allocation relay selection rate constraints
原文传递
Forced Collision:Detecting Wormhole Attacks with Physical Layer Network Coding
7
作者 Zhiwei Li Di Pu +1 位作者 Weichao Wang Alex Wyglinski 《Tsinghua Science and Technology》 SCIE EI CAS 2011年第5期505-519,共15页
Previous research on security of network coding focused on the protection of data dissemination procedures and the detection of malicious activities such as pollution attacks. The capabilities of network coding to det... Previous research on security of network coding focused on the protection of data dissemination procedures and the detection of malicious activities such as pollution attacks. The capabilities of network coding to detect other attacks have not been fully explored. In this paper, we propose a new mechanism based on physical layer network coding to detect wormhole attacks. When two signal sequences collide at the receiver, the starting point of the collision is determined by the distances between the receiver and the senders. Therefore, by comparing the starting points of the collisions at two receivers, we can estimate the distance between them and detect fake neighbor connections via wormholes. While the basic idea is clear, we have proposed several schemes at both physical and network layers to transform the idea into a practical approach. Simulations using BPSK modulation at the physical layer show that the wireless nodes can effectively detect fake neighbor connections without the adoption of special hardware or time synchronization. 展开更多
关键词 physical layer network coding wormhole attacks cross-layer design
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部