-
141
Nondata-aided error vector magnitude performance analysis over κ−μ shadowed fading channel
Published 2018-05-01“…The performance prediction of wireless system over κ−μ shadowed fading channels was a challenging problem of wireless communications,which affects transmission scheme design seriously.To solve this problem,a novel method of quantifying the κ−μ shadowed fading channels performance based on nondata-aided error vector magnitude (NDA-EVM) was proposed.NDA-EVM was considered as a new metric to evaluate the change of the channels.The unified model to calculate different modulation order of NDA-EVM was analytically derived by maximum likelihood criterion.Moreover,the relationship between the κ−μ distribution and the NDA-EVM was built by using the attenuation factor of the channel as intermediate variable.Thereafter,the lower bounds of the NDA-EVM over the κ−μ shadowed fading channels were formulated,which was also simplified for various typical channels.The theoretical analysis was taken,moreover,numerical results were also conducted to verify the effectiveness of the derived formulation.It shows that NDA-EVM estimation has the lest root mean square error than data-aided signal to noise ratio (DA-SNR) estimation and error vector magnitude (DA-EVM) estimation over the κ−μ shadowed fading channels.The derived lower bounds closely match the theoretical values,especially at low SNR.In addition,the lower bounds are negatively related to all of the parameters of the κ−μ shadowed fading channels,which make it sensitive to the change of the fading channels.…”
Get full text
Article -
142
-
143
Capacity analysis for MISO-UWOC systems over GGD weak turbulence with zero boresight pointing error
Published 2023-08-01Get full text
Article -
144
Secure OFDM transmission scheme based on two-stage chaos mapping
Published 2016-07-01“…The characteristics of pseudo-random and sensitivity to initial condi-tions of chaos sequences were employed. Numerical results and analysis show that the scheme canensure secure informa-tion transmission,and improve the pseudo-randomness of transmitted signals. …”
Get full text
Article -
145
Optimal resource allocation for two-stage connectionless access with collision detection
Published 2019-05-01“…Connectionless access allows massive machine type communication (mMTC) devices to transmit small packets without establishment of radio bearers,significantly reducing device power consumption and control signaling overhead.Two-stage connectionless access (TSCLA) improves throughput and resource efficiency by optimally allocating resources between scheduling request (SR) phase and data transmission phase,which can be used for bigger packets and high traffic load.Based on this,a comprehensive theoretical analysis of one kind of TSCLA with collision detection was conducted to investigate its performance limit and devise its optimal resource allocation scheme.In addition,to avoid the complexity of user number estimation,a dynamic resource allocation algorithm with feedback control was proposed.Numerical results are provided to validate the effectiveness of aforementioned theoretical results and show that comparing with the genie aided algorithm known exactly the number of users,the performance loss of the proposed algorithm is within 4%.These works together provide good references for appropriate resource dimensioning for mMTC related protocols.…”
Get full text
Article -
146
Stability Analysis of Networked Control Systems with Random Time Delays and Packet Dropouts Modeled by Markov Chains
Published 2013-01-01“…This paper investigates the stability analysis problem for a class of discrete-time networked control systems (NCSs) with random time delays and packet dropouts based on unified Markov jump model. …”
Get full text
Article -
147
-
148
Coverage analysis of millimeter-wave frequency sharing between fixed service and cellular systems by stochastic geometry
Published 2025-03-01“…Employing the obtained numerical results demonstrates an efficient analysis of the interference impact from a cellular network on a fixed service system, reducing the computational cost of evaluating the interference process between both systems.…”
Get full text
Article -
149
A Clinical Data Analysis Based Diagnostic Systems for Heart Disease Prediction Using Ensemble Method
Published 2023-12-01Get full text
Article -
150
Asymptotic characterisation of regularised zero‐forcing receiver for imperfect and correlated massive multiple‐input multiple‐output systems
Published 2022-06-01“…Abstract In this work, the authors present an asymptotic high‐dimensional analysis of the regularised zero‐forcing receiver in terms of its mean‐squared error (MSE) and bit error rate (BER) when used for the recovery of binary phase‐shift keying (BPSK) modulated signals in a massive multiple‐input multiple‐output communication system. …”
Get full text
Article -
151
-
152
-
153
Robust Malware identification via deep temporal convolutional network with symmetric cross entropy learning
Published 2023-08-01Get full text
Article -
154
Cultural Tourism Management: Advanced Tools and Technologies
Published 2025-01-01Get full text
Article -
155
-
156
-
157
Predicting User Engagement in Health Misinformation Correction on Social Media Platforms in Taiwan: Content Analysis and Text Mining Study
Published 2025-01-01“…ResultsOn the basis of the results of the regression analysis, risk (β=.07; P=.001), awareness (β=.09; P<.001), and facts (β=.14; P<.001) predicted higher shares; awareness (β=.07; P=.001) and facts (β=.24; P<.001) increased reactions; and awareness (β=.06; P=.005), numeric representations (β=.06; P=.02), and facts (β=.19; P<.001) increased comments. …”
Get full text
Article -
158
Analysis of vulnerability, its drivers, and strategies applied towards reducing the pastoral and agro-pastoral livelihood vulnerability to climatic shocks
Published 2025-01-01“…Furthermore, despite the government’s numerous efforts to lesson enduring vulnerabilities and their effects, progress has not been encouraging because of lack of proactive action when faced with emergences. …”
Get full text
Article -
159
-
160
Novel criterion function for minor subspace tracking based on Rayleigh quotient
Published 2019-11-01Get full text
Article