In this paper, we propose a method-of-moments (MoM) analysis that includes the borehole effects on crosshole borehole radar, and we verify that the MoM represents the crosshole borehole radar data correctly. We derive...
详细信息
This paper describes a novel performance evaluation technique of combined Code Division Multiple Access (CDMA) and Space Division Multiple Access (SDMA) multiuser receiver. The receiver detects users based on their co...
详细信息
ISBN:
(纸本)9781424407781
This paper describes a novel performance evaluation technique of combined Code Division Multiple Access (CDMA) and Space Division Multiple Access (SDMA) multiuser receiver. The receiver detects users based on their code and spatial signatures. Exact calculation of the MAI interference is considered in this paper for a single sector cell that adopts combined CDMA-SDMA system, and accommodates an arbitrary K number of users transmitting their data. The Bit Error Rate (BER) expressions of any arbitrary user have been derived. Parallel Interference Canceller (PIC) is adopted as a suboptimum multiuser detector. Comparison between the performance of a CDMA system and Combined CDMA-SDMA system with and without PIC receivers are investigated. Our results show that the BER of a system with PIC is noticeably improved compared to the one without PIC (conventional multiuser receiver). Finally, the combined system enhances the system capacity by means of improving the BER performance.
In this work, we investigate the characteristics of the 2004 major storm events based on GPS-TEC measurement at Scott Base station Antarctica (77.9S, 166.8E). The F2 layer critical frequencies and peak height during t...
详细信息
Random Testing (RT) is a fundamental technique of software testing. Adaptive Random Testing (ART) has recently been developed as an enhancement of RT that has better fault detection effectiveness. Several methods (alg...
详细信息
This paper describes an optimal dynamic code assignment algorithm. This algorithm can be used to maximize the total number of users in a combined CDMA-SDMA multiple access system under minimum quality of service (QoS)...
详细信息
This paper describes an optimal dynamic code assignment algorithm. This algorithm can be used to maximize the total number of users in a combined CDMA-SDMA multiple access system under minimum quality of service (QoS) and under limited number of available spreading codes L. A single cell adopts a combined CDMA-SDMA system as the air interface, and accommodates an arbitrary number of users K distributed randomly within the cell. The probability of blocking was calculated through simulations to evaluate the system performance under different number of users and available spreading codes. The result shows that the system performance is significantly improved using the proposed algorithm. Additionally, the total number of users can be significantly increased by a small increase in the number of available spreading codes. Finally, the proposed assignment algorithm enhances the code reuse ratio and therefore increases the code efficiency.
The issue of collision avoidance in road vehicles has been investigated for years from very different points of view. A very interesting approach consists of the creation and interpretation of a scene of the vehicles ...
详细信息
The issue of collision avoidance in road vehicles has been investigated for years from very different points of view. A very interesting approach consists of the creation and interpretation of a scene of the vehicles that can be involved in a conflictive situation. In order to determine the role of the vehicle in the scene, having information of its position, orientation and velocity, as well as its current maneuver state is advisable. This paper is to present a solution based on a very low cost GPS/IMU navigation unit running an interactive multimodel filter (IMM). The description of the proposed architecture for scene creation, the multimodel filter developed and experimental trials in urban and highway scenarios are presented in this paper. The results obtained show the suitability of the proposed solution to the problem under consideration.
A lower power consumption and wider bandwidth low noise amplifier (LNA) operating at 5 GHz frequency band has been designed and simulated in a standard 0.18 mum CMOS technology. The proposed topology uses a capacitor ...
详细信息
A lower power consumption and wider bandwidth low noise amplifier (LNA) operating at 5 GHz frequency band has been designed and simulated in a standard 0.18 mum CMOS technology. The proposed topology uses a capacitor to decouple the AC and DC currents, isolating the circuit elements that are connected in series and share a common DC current. This is followed by the application of a varactor to create a wideband frequency response. The varactor has been swept with voltages stepped at 0.1, 0.5 and 0.9 V to create a wideband LNA working in the frequency range of 5.150 to 5.825 GHz. The LNA simulated provides a high gain of 36.69 dB, noise figure of less than 1.87 dB and draws current at 168.8 mA from a 1.8 power supply.
There is now an increasing demand for sharing images and image data for process integration among healthcare institutions. Web services technology has recently been widely proposed and gradually adopted as a platform ...
详细信息
Information security, including integrity and privacy, is an important concern among today's computer users due to increased connectivity. Despite a number of secure algorithms that have been proposed, the trade-o...
详细信息
Information security, including integrity and privacy, is an important concern among today's computer users due to increased connectivity. Despite a number of secure algorithms that have been proposed, the trade-offs made between security and performance demands further research toward improvement. In bulk data transfer, especially in large messages, the secured processing time takes much longer than non-secured processes. This is due to crypto operations, which include symmetric encryption operations and hashing functions. In the current bulk data transfer phase in secure socket layer (SSL), the server or the client firstly calculates the message authentication code (MAC) of the data using keyed-hash message authentication code (HMAC) operation, and then performs the symmetric encryption on the data together with the MAC. This paper proposes a new algorithm which provides a significant performance gain in bulk data transfer without compromising the security. The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. The server calculates the MAC of the data at the same time as the encryption process of the data. Once the calculation of the MAC is completed, only then the MAC will be encrypted. The algorithm was simulated in two processors with one processor performing the MAC calculation and the other on encrypting the data, simultaneously. The communication between the two processors was done via message passing interface (MPI). Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the current (sequential) algorithm.
暂无评论