Showing 141 - 160 results of 376 for search 'Communications in Numerical Analysis', query time: 0.08s Refine Results
  1. 141

    Nondata-aided error vector magnitude performance analysis over κ−μ shadowed fading channel by Fan YANG, Xiaoping ZENG, Haiwei MAO, Xin JIAN, Derong DU, Xiaoheng TAN, Yiwen GAO

    Published 2018-05-01
    “…The performance prediction of wireless system over κ−μ shadowed fading channels was a challenging problem of wireless communications,which affects transmission scheme design seriously.To solve this problem,a novel method of quantifying the κ−μ shadowed fading channels performance based on nondata-aided error vector magnitude (NDA-EVM) was proposed.NDA-EVM was considered as a new metric to evaluate the change of the channels.The unified model to calculate different modulation order of NDA-EVM was analytically derived by maximum likelihood criterion.Moreover,the relationship between the κ−μ distribution and the NDA-EVM was built by using the attenuation factor of the channel as intermediate variable.Thereafter,the lower bounds of the NDA-EVM over the κ−μ shadowed fading channels were formulated,which was also simplified for various typical channels.The theoretical analysis was taken,moreover,numerical results were also conducted to verify the effectiveness of the derived formulation.It shows that NDA-EVM estimation has the lest root mean square error than data-aided signal to noise ratio (DA-SNR) estimation and error vector magnitude (DA-EVM) estimation over the κ−μ shadowed fading channels.The derived lower bounds closely match the theoretical values,especially at low SNR.In addition,the lower bounds are negatively related to all of the parameters of the κ−μ shadowed fading channels,which make it sensitive to the change of the fading channels.…”
    Get full text
    Article
  2. 142
  3. 143
  4. 144

    Secure OFDM transmission scheme based on two-stage chaos mapping by Ying WANG, Xiao-zhong ZHANG, Juan ZENG, Yong-ming WANG

    Published 2016-07-01
    “…The characteristics of pseudo-random and sensitivity to initial condi-tions of chaos sequences were employed. Numerical results and analysis show that the scheme canensure secure informa-tion transmission,and improve the pseudo-randomness of transmitted signals. …”
    Get full text
    Article
  5. 145

    Optimal resource allocation for two-stage connectionless access with collision detection by Xin JIAN, Fang WANG, Jian SONG, Shu FU, Xiaoheng TAN, Xiaoping ZENG

    Published 2019-05-01
    “…Connectionless access allows massive machine type communication (mMTC) devices to transmit small packets without establishment of radio bearers,significantly reducing device power consumption and control signaling overhead.Two-stage connectionless access (TSCLA) improves throughput and resource efficiency by optimally allocating resources between scheduling request (SR) phase and data transmission phase,which can be used for bigger packets and high traffic load.Based on this,a comprehensive theoretical analysis of one kind of TSCLA with collision detection was conducted to investigate its performance limit and devise its optimal resource allocation scheme.In addition,to avoid the complexity of user number estimation,a dynamic resource allocation algorithm with feedback control was proposed.Numerical results are provided to validate the effectiveness of aforementioned theoretical results and show that comparing with the genie aided algorithm known exactly the number of users,the performance loss of the proposed algorithm is within 4%.These works together provide good references for appropriate resource dimensioning for mMTC related protocols.…”
    Get full text
    Article
  6. 146

    Stability Analysis of Networked Control Systems with Random Time Delays and Packet Dropouts Modeled by Markov Chains by Li Qiu, Fengqi Yao, Xiaopin Zhong

    Published 2013-01-01
    “…This paper investigates the stability analysis problem for a class of discrete-time networked control systems (NCSs) with random time delays and packet dropouts based on unified Markov jump model. …”
    Get full text
    Article
  7. 147
  8. 148

    Coverage analysis of millimeter-wave frequency sharing between fixed service and cellular systems by stochastic geometry by Nimer Rodriguez-Uro, Dunker Callo-Roque, Marco Pinares-Mamani, Alexander Hilario-Tacuri

    Published 2025-03-01
    “…Employing the obtained numerical results demonstrates an efficient analysis of the interference impact from a cellular network on a fixed service system, reducing the computational cost of evaluating the interference process between both systems.…”
    Get full text
    Article
  9. 149
  10. 150

    Asymptotic characterisation of regularised zero‐forcing receiver for imperfect and correlated massive multiple‐input multiple‐output systems by Ayed M. Alrashdi

    Published 2022-06-01
    “…Abstract In this work, the authors present an asymptotic high‐dimensional analysis of the regularised zero‐forcing receiver in terms of its mean‐squared error (MSE) and bit error rate (BER) when used for the recovery of binary phase‐shift keying (BPSK) modulated signals in a massive multiple‐input multiple‐output communication system. …”
    Get full text
    Article
  11. 151
  12. 152
  13. 153
  14. 154
  15. 155
  16. 156
  17. 157

    Predicting User Engagement in Health Misinformation Correction on Social Media Platforms in Taiwan: Content Analysis and Text Mining Study by Hsin-Yu Kuo, Su-Yen Chen

    Published 2025-01-01
    “…ResultsOn the basis of the results of the regression analysis, risk (β=.07; P=.001), awareness (β=.09; P<.001), and facts (β=.14; P<.001) predicted higher shares; awareness (β=.07; P=.001) and facts (β=.24; P<.001) increased reactions; and awareness (β=.06; P=.005), numeric representations (β=.06; P=.02), and facts (β=.19; P<.001) increased comments. …”
    Get full text
    Article
  18. 158

    Analysis of vulnerability, its drivers, and strategies applied towards reducing the pastoral and agro-pastoral livelihood vulnerability to climatic shocks by Daniel Assefa Tofu, Tegegn Dilbato, Chalchisa Fana, Niguse Bekele Dirbaba, Gutu Tesso

    Published 2025-01-01
    “…Furthermore, despite the government’s numerous efforts to lesson enduring vulnerabilities and their effects, progress has not been encouraging because of lack of proactive action when faced with emergences. …”
    Get full text
    Article
  19. 159
  20. 160