Vector Orthogonal Frequency Division Multiplexing (V-OFDM) for single transmit antenna systems is a generalization of OFDM where Single-Carrier Frequency Domain Equalization (SC-FDE) and OFDM are two special cases. It...
详细信息
ISBN:
(纸本)9781479913510
Vector Orthogonal Frequency Division Multiplexing (V-OFDM) for single transmit antenna systems is a generalization of OFDM where Single-Carrier Frequency Domain Equalization (SC-FDE) and OFDM are two special cases. It has been shown to be able to collect multipath diversity and thus generally outperforms OFDM. The performance of OFDM under phase noise has been extensively studied in literature. These effects can be summarized as introducing a Common Phase Error (CPE) and Inter Carrier Interference (ICI) resulting in poor performance. The performance of V-OFDM under phase noise still remains uninvestigated and in this paper it is shown that phase noise in V-OFDM systems leads to a Common Vector Block Phase Error (CVBPE) as well as an Inter Vector Block Carrier Interference (IVBCI) effect. Both of these effects are detrimental to the performance of a V-OFDM system. An exact expression for the Signal to Interference Noise Ratio (SINR) for a V-OFDM system is derived and found to agree closely with simulation results.
According to the classical rough set, the attribute reduction set may be far from satisfactory due to the non-existence of core in the attribute reduction process of decision table. Aiming at this issue, this paper pu...
详细信息
As a safe and economical method the pipeline is widely used to transport the oil and gas. At present, most of serious pipeline accidents are the artificial damages. The traditional leakage detection methods only infer...
详细信息
A type of chaotic enciyption scheme by combining circular bit shift with XOR operations was proposed in2006 based on iterating chaotic *** after the proposal,it was cryptanalyzed and ***,there are still two drawbacks ...
详细信息
A type of chaotic enciyption scheme by combining circular bit shift with XOR operations was proposed in2006 based on iterating chaotic *** after the proposal,it was cryptanalyzed and ***,there are still two drawbacks in the two improved *** strengthen the performance of the focused type of scheme,a new improved scheme based on Chen’s chaotic system is proposed in this *** results and theoretical analysis show that our improved scheme is immune to information extracting by chosen plaintext attack and has expected cryptographic properties.
This paper presents a dynamic probabilistic marking algorithm with multiple routing address tags, which allows the vic- tim to traceback the origin of ICMP (Internet Control Message Pro- tocol)-based direct and refl...
详细信息
This paper presents a dynamic probabilistic marking algorithm with multiple routing address tags, which allows the vic- tim to traceback the origin of ICMP (Internet Control Message Pro- tocol)-based direct and reflective DoS attacks. The proposed ap- proach makes full use of scalable data space of ICMP packet to achieve multiple information tags. The difference between this pro- posal and previous proposals lies in two points. First, the number of packets needed by the victim to reconstruct the attack path is greatly reduced because of three key mechanisms: multi-tag, uniform left- over probability, and tag location choice based on the module of accommodated tag numbers within a packet. Second, the true origin of both direct and reflective ICMP-based DoS attacks can be traced.
This The IEEE 802.15.4 devices are proposed to operate in the 2.4 GHz industrial, scientific and medical(ISM) band. The other devices that use IEEE 802.11 b, g and n share the same frequency band. The interference cau...
详细信息
This The IEEE 802.15.4 devices are proposed to operate in the 2.4 GHz industrial, scientific and medical(ISM) band. The other devices that use IEEE 802.11 b, g and n share the same frequency band. The interference caused by these technologies can degrade the performance of an IEEE 802.15.4 based wireless network. In this paper we study such degrading effects on a network equipped with IEEE 802.15.4 devices that is exposed to interference in turn with IEEE 802.11 b, g and n. The performance measure in this paper is the link Packet Receive Rate(PRR). Measurements are performed with real-life equipment, in order to quantify coexistence issues. We test all 16 channels of IEEE 802.15.4 in 2.4G band and the results show the decrease of PRR when suffering in close frequency with IEEE 802.11. The connection between energy detection and PRR is also exhibited in this paper.
This paper presents a method to improve the payload of spread spectrum (SS) based audio watermarking via an M-ary SS modulation technique called code phase shift keying (CPSK), in which the code phase of the spreading...
详细信息
ISBN:
(纸本)9781467327626
This paper presents a method to improve the payload of spread spectrum (SS) based audio watermarking via an M-ary SS modulation technique called code phase shift keying (CPSK), in which the code phase of the spreading sequence is modulated with multiple data bits. Compared with the code division multiple access (CDMA) based watermarking with the same transparency and payload, the proposed scheme provides better robustness against common attacks for large M, and requires lower embedding and extraction complexity.
Protein remote homology detection is a key problem in ***,the discriminative methods,such as Support Vector Machine(SVM),can achieve the best *** most efficient approa
Protein remote homology detection is a key problem in ***,the discriminative methods,such as Support Vector Machine(SVM),can achieve the best *** most efficient approa
Protein remote homology detection is a key problem in ***,the discriminative methods,such as Support Vector Machine(SVM),can achieve the best *** most efficient approach to improve the performance of the SVM-based met...
详细信息
Protein remote homology detection is a key problem in ***,the discriminative methods,such as Support Vector Machine(SVM),can achieve the best *** most efficient approach to improve the performance of the SVM-based methods is to find a general protein representation method that is able to convert proteins with different lengths into fixed length vectors and captures the different properties of the proteins for the *** bottleneck of designing the protein representation method is that native proteins have different *** by the success of the pseudo amino acid composition(PseAAC) proposed by Chou,we applied this approach for protein remote homology *** new indices derived from the amino acid index(AAIndex) database are incorporated into the PseAAC to improve the generalization ability of this *** experiments on a well-known benchmark show this method achieves superior or comparable performance with current state-of-the-art methods.
Correction for ‘Differential structural dynamics and antigenicity of two similar influenza H5N1 virus HA-specific HLA-A*0201-restricted CLT epitopes’ by Yeping Sun et al., RSC Adv., 2015, 5, 2318–2327.
Correction for ‘Differential structural dynamics and antigenicity of two similar influenza H5N1 virus HA-specific HLA-A*0201-restricted CLT epitopes’ by Yeping Sun et al., RSC Adv., 2015, 5, 2318–2327.
暂无评论