The entire IT sector has been altered by Cloud engineering, which is also continually coming up with new, creative solutions to everyday issues. A systematic method for the commoditization, standardization, and govern...
详细信息
This paper deals with network slicing in 5G networks, where a slice is defined as a set of virtual network function (VNF) instances that collaborate to create an end-toend (E2E) virtual network. A set of slices is imp...
详细信息
The generalized index modulation (G-IM) technique provides an improvement in bit error rate (BER), spectral efficiency (SE), and/or energy efficiency (EE) over traditional digital modulation schemes. However, G-IM tec...
详细信息
ISBN:
(纸本)9798350378511
The generalized index modulation (G-IM) technique provides an improvement in bit error rate (BER), spectral efficiency (SE), and/or energy efficiency (EE) over traditional digital modulation schemes. However, G-IM techniques suffer from the propagation of errors due to the incorrect detection of indices for higher modulation order (M > 4). To alleviate the risk of error propagation, the enhancement of the correct indices detection probability is a crucial requirement for G-IM systems. This paper presents an error propagation-free generalized index modulation (G-IM) system with adaptive coding modulation in which the indices bits are coded independently on the information bits. The main focus of this study is to derive a quantitative relation between the target system BER and the required indices error rate and, hence, to derive the overall system error probability. In particular, an analytical total BER formula for the error propagation-free G-IM system is provided and compared to the total BER of the classical counterpart modulation techniques. Hence, a direct relationship between the BER of index bits and the ordinary modulation BER is represented, providing an approximate threshold after which the target BER of the G-IM system outperforms the traditional modulation techniques. To validate our established results, the G-IM system with low density parity check code with binary phase shift keying modulation technique (LDPC-BPSK), as a simple satellite coding-modulation scheme which is used in satellite digital video broadcasting TV (DVB-T2) and deep-space communications, is described as a possible direct application for the G-IM system. once the index BER exceeds the threshold, the LDPC-BPSK modulated G-IM system significantly outperforms the classical BPSK modulation while keeping the same EE or SE yet on the expense of added encoder complexity. Moreover, once the index error tends to the zero point, the total G-IM BER reaches its lower limit, a 3 dB gain, thanks t
The process of choosing and narrowing down universities for graduate program admission plays a crucial role in the overall application procedure. This project aims to examine the uses of machine learning models to pre...
详细信息
Isolated sign language recognition is a vital area of research that aims to bridge the communication gap between the hearing-impaired community and the general population. Sign language is the main medium of communica...
详细信息
Cervical Cancer (CC) is the fourth frequent dreadful cancers that prevails in women across the globe. Cervical cytology is being adopted as the standard technique for the screening of pre-cancerous stage and cancerous...
详细信息
Paper review and publishing is an important part of a researcher's life. It is where a researcher's time and resources that he has spent bears fruit. And this is enabled by getting his work reviewed by differe...
详细信息
It is usually difficult to communicate with someone who has hearing loss. Sign language is a way of communication used by dumb and deaf people. Each country has its own unique sign language. Being an Indian, it's ...
详细信息
Many species around the globe heavily depend on flowers, and even the use of flowers for medical purposes is enormous, which has been in practice since ancient times. In modern botany, agronomy, and species research, ...
详细信息
The use of Smart Contracts and Blockchains has experienced a significant rise, leading to the automation of various financial and corporate operations. However, the occurrence of flaws and vulnerabilities in smart con...
详细信息
暂无评论