首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Low-density generator matrix (LDGM) codes have recently drawn researchers’ attention thanks to their satisfying performance while requiring only moderate encoding/decoding complexities as well as to their applicability to network codes. In this paper, we aim to propose a fast simulation method useful to investigate the performance of LDGM code. Supported by the confidence interval analysis, the presented method is, for example, 108 times quicker than the Monte-Carlo computer simulation for bit-error-rate (BER) in 10−10 region.  相似文献   

2.
在采用空时码的无线通信系统中,收发2端较差的路径会降低系统的性能.提出了多速率线性离散码(LDC),并对其进行了分析,给出了一种基于矩阵扩展方法的设计算法.多速率LDC是传统LDC和LDC-TAS的BER性能的折中.进而提出了一种性能优于传统LDC-A-TAS算法的多速率LDC自适应发送天线选择(A.TAS)算法.  相似文献   

3.
The average level crossing rate (LCR) and average fading duration (AFD) criterions are applied to analyze the selection combining (SC) diversity for wireless communication systems over correlated-Rayleigh and correlated-Rice fading in this paper. The scenarios of the fading channel models are characterized as 4 generalized and experimental distributions, e.g., Rayleigh, Rice, Nakagami-m, and Weibull distributed statistics. Moreover, both of independent and correlated proprieties between branches are also involved for consideration. For purpose of unifying and clarifying the average LCR and AFD performance formulas results from the evaluation for SC diversity, it is not only the results from our research presented, but some of the published results are also cited and illustrated by numerical evaluation again in this study.  相似文献   

4.
Cooperative diversity has been widely used in wireless communication systems since they greatly improves and enhances the quality of service as being virtual antennas without physically placing multiple antennas at the transmitter or the receiver sides. In this paper, we consider the amplify and forward (AF) relay-based communication systems under the influence of Nakagami-m multipath fading channels in both channel links. Several performance metrics are considered in this study, including, the bit error rate (BER), the ergodic channel capacity, and the outage capacity. The obtained expressions are in closed-form and can reduce to the Rayleigh channel model, as a special case. Numerical results are also provided for the obtained expressions and some conclusions are drawn.  相似文献   

5.
To retrieve the information from the serious distorted received signal is the key challenge of communication signal processing. The chaotic baseband communication promises theoretically to eliminate the inter-symbol interference (ISI), however, it needs complicated calculation, if it is not impossible. In this paper, a genetic algorithm support vector machine (GA-SVM) based symbol detection method is proposed for chaotic baseband wireless communication system (CBWCS), by this way, treating the problem from a different viewpoint, the symbol decoding process is converted to be a binary classification through GA-SVM model. A trained GA-SVM model is used to decode the symbols directly at the receiver, so as to improve the bit error rate (BER) performance of the CBWCS and simplify the symbol detection process by removing the channel identification and the threshold calculation process as compared to that using the calculated threshold to decode symbol in the traditional methods. The simulation results show that the proposed method has better BER performance in both the static and time-varying wireless channels. The experimental results, based on the wireless open-access research platform, indicate that the BER of the proposed GA-SVM based symbol detection approach is superior to the other counterparts under a practical wireless multipath channel.  相似文献   

6.
A new stochastic fading channel model called cascaded Weibull fading is introduced and the associated capacity is derived in closed form. This model is generated by the product of independent, but not necessarily identically distributed, Weibull random variables (RVs). By quantifying the convergence rate of the central limit theorem as pertaining to the multiplication of Weibull distributed RVs, the statistical basis of the lognormal distribution is investigated. By performing Kolmogorov-Smirnov tests, the null hypothesis for this product to be approximated by the lognormal distribution is studied. Another null hypothesis is also examined for this product to be approximated by a Weibull distribution with properly adjusted statistical parameters.  相似文献   

7.
One of the main challenges of coding theory is to construct linear codes with the best possible parameters. Various algebraic and combinatorial methods along with computer searches are used to construct codes with better parameters. Given the computational complexity of determining the minimum distance of a code, exhaustive searches are not feasible for all but small parameter sets. Therefore, codes with certain algebraic structures are preferred for both theoretical and practical reasons. In this work we focus on the class of constacyclic codes to first generate all constacyclic codes exhaustively over small finite fields of order up to 9 to create a database of best constacyclic codes. We will then use this database as a building block for a search algorithm for new quasi-twisted codes. Our search on constacyclic codes has revealed 16 new codes, i.e. codes with better parameters than currently best-known linear codes. Given that constacyclic codes are well known, this is a surprising result. Moreover, using the standard constructions of puncturing, shortening or extending a given code, we also derived 55 additional new codes from these constacyclic codes. Hence, we achieved improvements on 71 entries in the database of best-known codes. We use a search strategy that is comprehensive, i.e. it computes every constacyclic code for a given length and shift constant, and it avoids redundantly examining constacyclic codes that are equivalent to either cyclic codes or other constacyclic codes.  相似文献   

8.
In this paper, we analyze detection of multilevel phase-shift keying (MPSK) signals transmitted over a Gamma shadowed Nakagami-m fading channel. We derive novel analytical expression, in terms of Meijer’s G function, for Fourier coefficients of the probability density function of the received signal composite phase. Under the assumption of the imperfect reference signal extraction in the receiver, which is performed from the pilot signal, the analytical expression is derived for the symbol error probability (SEP) in the form of convergent series. The existence of the error floor is identified, and expression for its computation is provided. Mathematical proofs for convergence of Fourier series are provided for both SEP and SEP floor, and novel expressions of upper bounds for truncation errors are derived in terms of elementary mathematical functions. The convergence rate of the derived expressions is examined. Numerical results are confirmed independently by Monte-Carlo simulations.  相似文献   

9.
GEO卫星通信的用户下行链路为典型的衰落信道,经卫星转发的信号如果经历大尺度衰落,则用户端接收到的信号将产生大范围失真。该文针对GEO卫星通信的特点,为了提高GEO卫星系统的通信性能,考虑将空时协同技术引入到GEO卫星通信中。并仿真分析了在不同信道环境下,使用不同分集方案时GEO卫星通信系统性能,结果显示使用空时协同技术后,系统的可靠性有明显提高。  相似文献   

10.
In most communication networks, error probabilities 1?→?0 and 0?→?1 are equally likely to occur. However, in some optical networks, such as local and access networks, this is not the case. In these networks, the number of received photons never exceeds the number of transmitted ones. Hence, if the receiver operates correctly, only 1?→?0 errors can occur. Motivated by this fact, in this paper, we present a class of integer codes capable of correcting burst and random asymmetric (1?→?0) errors within a b-bit byte. Unlike classical codes, the proposed codes are defined over the ring of integers modulo 2b ?1. As a result, they have the potential to be implemented in software without any hardware assist.  相似文献   

11.
We obtain extremal binary self-dual codes of parameters [64,32,12] as binary images of self-dual codes over R1, R2 and R3 by employing different methods. We then apply the extension theorem to these codes to obtain a number of extremal binary self-dual codes of length 66 with trivial automorphism groups. Fifteen of the codes we obtain have new ββ values in W66,3, of which only three were known to exist before. We also find nine codes with new ββ values in W66,1, thus updating the list of such known codes.  相似文献   

12.
13.
In this paper, a new technique is introduced for chaos secure data communication. In this approach, in addition to the usually used techniques for data encryption, the concept of carrier encryption is introduced to increase the security level of the secure communication scheme. To fulfill this objective, at the transmitting end, two chaotic oscillators are coupled, and a set of inequality time dependent constraints with time dependent bounds is imposed on the generated chaotic signals. Moreover, to increase system complexity and its security level, the imposed set of constraints and their bounds are allowed to be changeable from one time period to another during the transmission process. As a result, the patterns of the generated chaotic signals are completely changed and the chaotic oscillator is completely encrypted. At the receiving end, the newly developed Constrained Smoothed Regularized Least Square (CSRLS) observer is used to synchronize the received constrained chaotic signals and hence retrieve the transmitted data. Using such an approach, the quality of the received information, measured by the Bit Error Rate (BER), is highly improved due to the superior performance of the developed CSRLS observer. The stability of the observer is analyzed, and simulation results are presented to show the efficiency and effectiveness of the proposed secure communication scheme.  相似文献   

14.
Novel closed-form expressions for the probability density function and the average output signal-to-noise ratio at the output of a selection combiner in Weibull fading are derived. Using these expressions, the spectral efficiency of a direct sequence code division multiple access system is analytically obtained and performance evaluation results are presented.  相似文献   

15.
This paper investigates the passivity of Markovian jump discrete-time systems (MJDTSs) with channel fading via event-triggered state feedback control. First, the concerned MJDTSs contain infinitely distributed delays and switching rules with partially known transition probability (TP) information. Next, the fading channel, as an unreliable channel, is introduced into MJDTSs to better reflect the engineering practice in networked environment. Due to the present of channel fading, a series of random variables satisfying some certain probability density functions (PDFs) will be obstacles in the process of proof. Then, an event-triggered controller is designed for MJDTSs with channel fading and incomplete transition probability (ITP) for the first time. Thanks to this event-triggered mechanism, the state feedback control could greatly reduce energy consumption during transmission. Subsequently, under the above controller, we obtain some novel sufficient criteria in the form of linear matrix inequalities (LMIs) to ensure the passivity of closed-loop system. Finally, some simulation results are provided to demonstrate the feasibility and effectiveness of the proposed theoretical method.  相似文献   

16.
Transmit antenna selection with maximal ratio combining at the receiver (TAS/MRC) is a promising technique that can be used to avoid the hardware complexity of multiple input multiple output (MIMO) system without jeopardizing the diversity gain. The generalized Gaussian distribution (GGD) is used to model different kinds of additive noise including Gaussian, Laplacian, uniform, and impulsive. In this paper, we study the bit error performance of TAS/MRC system assuming flat Rayleigh fading channels perturbed by additive white generalized Gaussian noise (AWGGN). To this end, we provide a closed form expression for the average bit error rate of coherent modulation techniques in terms of Mejier’s G function that is readily available in many commercial mathematical software packages like MATLAB and Mathematica. Moreover, we study the asymptotic behavior of the BER at high signal to noise ratio (SNR). Analytical results are verified by simulation.  相似文献   

17.
In this paper, the event-triggered non-fragile H fault detection filter is designed for a class of discrete-time nonlinear systems subject to time-varying delays and channel fadings. The Lth Rice fading model is utilized to reflect the actual received measurement signals, and its channel coefficients own arbitrary probability density functions on interval [0,1]. The event-based filter is constructed to reduce unnecessary data transmissions in the communication channel, which only updates the measurement signal to the filter when the prespecified “event” is triggered. Multiplicative gain variations are utilized to describe the phenomenon of parameter variations in actual implementation of the filter. Based on Lyapunov stability theory, stochastic analysis technology along with linear matrix inequalities (LMIs) skills, sufficient conditions for the existence of the non-fragile fault detection filter are obtained which make the filtering error system stochastically stable and satisfy the H constraint. The gains of the filter can be calculated out by solving the feasible solution to a certain LMI. A simulation example is given to show the effectiveness of the proposed method.  相似文献   

18.
Extreme multistability is the coexistence of a large number of attractors which can be reached by varying initial conditions. In this paper we show how this fascinating phenomenon can be used for secure communication. The main advantage of the communication system based on extreme multistability over a conventional chaos-based communication system is its exceptionally high security. The proposed system consists of two identical six-order oscillators; one in the transmitter and another one in the receiver, each exhibiting the coexistence of a large number of chaotic attractors. The oscillators are synchronized using a private channel through one of the system variables, while the information is transmitted via a public channel through another variable. The information is encrypted by varying the initial condition of one of the state variables in the transmitter using a chaotic map, adhering message packages in a staggered form to the coexisting attractors within the same time series of another state variable, which leads to switching among the coexisting chaotic attractors. To ensure communication security, the duration of the packages is shorter than synchronization time, so that synchronization attacks are ineffective.  相似文献   

19.
The spectral efficiency of a multi-carrier direct-sequence code-division multiple-access (MC/DS-CDMA) system operating in a Rayleigh fading environment is investigated and evaluated in terms of the theoretically achievable channel capacity (in the Shannon sense) per user, estimated in an average sense. This short paper covers operation of the considered system over broadcast communication randomly time-varying channels as applicable to wireless radio networks and single-cell indoor mobile systems and leads to the derivation of a closed-form expression for the achieved spectral efficiency. Furthermore, the relation between the number of the employed sub-carriers and the achieved spectral efficiency is revealed.  相似文献   

20.
In this paper, the simultaneous H stabilization problem is investigated for a physically interconnected large-scale system which works in multiple operation modes. A distributed wireless networked control framework is introduced, in which the distributed dynamic output feedback controllers not only use the local measurements, but also receive the neighboring controllers’ broadcasts via wireless networks. The channel fading in wireless communications is described as the Rice fading model. Our focus is on the design of the distributed controllers such that the large-scale system is mean-square stable in each operation mode and achieves a prescribed H disturbance attenuation level. By employing the Lyapunov functional method and related stochastic analysis techniques, a sufficient condition on the existence of desired controllers is presented, and the parameterization of the controller gains is derived. Finally, a numerical example is utilized to illustrate the feasibility of the proposed scheme.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号