38 Hits in 6.1 sec

Overloaded array processing with spatially reduced search joint detection

J. Hicks, S. Bayram, W.H. Tranter, R.J. Boyle, J.H. Reed
2001 IEEE Journal on Selected Areas in Communications  
The technique is demonstrated to separate two near equal power QPSK signals with r= .35 root raised-cosine pulse shapes. iii ACKNOWLEDGMENTS I would like to thank all those who have made this thesis possible  ...  , who helped in this research effort; and finally, Daniel Sharp and Aristos Dimitriou for their practical input and encouragement.  ...  The output of the equalizer is decomposed into a Wiener Filter (WF) term and a misadjustment filter (MF) term.  ... 
doi:10.1109/49.942519 fatcat:sqxhxg6a7ra2fbypjgb4xgpaku

PLL Frequency Synthesizers: Phase Noise Issues and Wide Band Loops [chapter]

Marina de Queiroz Tavares
2000 Analog Circuit Design  
This thesis discusses and develops PLL system models to study stability and noise aspects. The model results are employed in IC and application design, being confirmed via measurements.  ...  A top-down system to circuit approach, studies noise generation and transmission. Finally testchip realizations of PLLs with fully gm-C integrated oscillators are presented.  ...  The drawbacks of these other structures are: their poorer phase noise performance as compared to LC resonators with high quality factors, and the impossibility to track the LC matched filters in the input  ... 
doi:10.1007/978-1-4757-3198-9_17 fatcat:tc4trqyzcve2dfj57xif7dgmka

Ray-Tracing-Based mm-Wave Beamforming Assessment

Vittorio Degli-Esposti, Franco Fuschini, Enrico M. Vitucci, Marina Barbiroli, Marco Zoli, Li Tian, Xuefeng Yin, Diego Andres Dupleich, Robert Muller, Christian Schneider, Reiner S. Thoma
2014 IEEE Access  
The use of large-size antenna arrays to implement pencil-beam forming techniques is becoming a key asset to cope with the very high throughput density requirements and high path-loss of future millimeter-wave  ...  paper through system simulation.  ...  A mm-wave BF prototype for 5G wireless systems is described in [33] and according to some tests the beam searching time has been estimated equal to 45 msec.  ... 
doi:10.1109/access.2014.2365991 fatcat:m7nslp5g25ap7kud43rncasycy

Efficient Transfer Entropy Analysis of Non-Stationary Neural Time Series

Patricia Wollstadt, Mario Martínez-Zarzuela, Raul Vicente, Francisco J. Díaz-Pernas, Michael Wibral, Daniele Marinazzo
2014 PLoS ONE  
, social, and artificial systems.  ...  We present an efficient implementation of the approach that deals with the increased computational demand of the ensemble method's practical application.  ...  Such learning effects may easily be tested for by comparing the first and second half of recorded repetitions with respect to equal variances and means.  ... 
doi:10.1371/journal.pone.0102833 pmid:25068489 pmcid:PMC4113280 fatcat:ozpjypudovdgbi5qq5jq4ai2ly

30th Annual Computational Neuroscience Meeting: CNS*2021–Meeting Abstracts

2021 Journal of Computational Neuroscience  
One of the goals of neuroscience is to understand the computational principles that describe the formation of behaviorally relevant signals in the brain, as well as how these computations are realized  ...  Acknowledgments Joseph Tharayil and Mickael Zbili contributed equally to this work.  ...  Here we extended the previous model with a detailed granular layer model (Cichon & Gan, 2015 Apr) to apply input to MFs.  ... 
doi:10.1007/s10827-021-00801-9 pmid:34931275 pmcid:PMC8687879 fatcat:evpmmfpaivgpxdqpive5xdgmwu

GELP: GAN-Excited Linear Prediction for Speech Synthesis from Mel-Spectrogram

Lauri Juvela, Bajibabu Bollepalli, Junichi Yamagishi, Paavo Alku
2019 Interspeech 2019  
F0 prediction modelThe F0 model takes a sequence of MFCCs as input and generates the corresponding F0 track and voicing information from it.  ...  Inputs to the module are the current input (x t ), previous timestep hidden output (h t−1 ), and cell state (c t−1 ) Figure 3 . 4 . 34 Block diagram view of a computation graph forward and backward passes  ... 
doi:10.21437/interspeech.2019-2008 dblp:conf/interspeech/JuvelaBYA19 fatcat:bd6cc74arvb3joauc3wbeqnkba

Multidimensional Data Interpretation of Vibration Signals Registered in Different Locations for System Condition Monitoring of a Three-Stage Gear Transmission Operating under Difficult Conditions

Grzegorz Wojnar, Rafał Burdzik, Andrzej N. Wieczorek, Łukasz Konieczny
2021 Sensors  
Using MATLAB software, a program was written that was calibrated and adapted to the specifics of the measuring equipment based on the collected test results.  ...  This article provides a discussion of the results of studies on the original system condition monitoring of a three-stage transmission with a bevel–cylindrical–planetary configuration installed in an experimental  ...  Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable.  ... 
doi:10.3390/s21237808 pmid:34883812 fatcat:apprh3xfmzb3zp4njl5odydd5m

A Journey from Improper Gaussian Signaling to Asymmetric Signaling

Sidrah Javed, Osama Amin, Basem Shihada, Mohamed-Slim Alouini
2020 IEEE Communications Surveys and Tutorials  
As such, the theory of impropriety has vast applications in medicine, geology, acoustics, optics, image and pattern recognition, computer vision, and other numerous research fields with our main focus  ...  systems.  ...  to the regular matrices in the sense that all decomposed factors must follow the similar block pattern structure [4] .  ... 
doi:10.1109/comst.2020.2989626 fatcat:zyno7ku6n5eqnp6rrcopczb4qu

Partial-Response and Decision-Feedback Equalization [chapter]

Jan W. M. Bergmans
1996 Digital Baseband Transmission and Recording  
The author also wishes to acknowledge the valuable discussions with Dr. K.A. Schouhamer Immink concerning the robustness of receivers.  ...  Acknowledgement I am indebted to Dr Ir A. J. E. M. Janssen for his valuable suggestions, many of which have been adopted in this paper. Acknowledgement The author is indebted to Dr. A.J.E.M.  ...  Application of adaptive equalization methods 5 ) can be regarded as the most natural solution to this problem.  ... 
doi:10.1007/978-1-4757-2471-4_6 fatcat:b5dwrmyhszbifo7a6rlwop6evu

The Evolution of Faster-than-Nyquist Signaling

Takumi Ishihara, Shinya Sugiura, Lajos Hanzo
2021 IEEE Access  
In [117] , FTN signaling was amalgamated with sparse code multiple access (SCMA) in the uplink, where CE, DD, and user-activity tracking were jointly carried out using a factor-graph-based message passing  ...  Frequencyflat system relying on a unity-rate recursive convolutional code and an iterative turbo equalizer, achieving better performance than the channel-encoded FTN system of [19] .  ... 
doi:10.1109/access.2021.3088997 fatcat:74jyv6hezjfnzmh3raawpzvoty

Advanced Astroinformatics for Variable Star Classification [article]

Kyle Burton Johnston
2020 arXiv   pre-print
With the advent of Big-Data in astronomy, professional astronomers are left with the problem of how to manage large amounts of data, and how this deluge of information can be studied in order to improve  ...  The complete development of a beginning-to-end system development strategy is presented as the following individual developments (simulation, training, feature extraction, detection, classification, and  ...  Acknowledgements The author is grateful for the valuable machine learning discussion with S. Wiechecki Vergara and R. Haber. Initial astroinformatics interest was provided by H. Oluseyi.  ... 
arXiv:2008.13775v1 fatcat:7pyngb7qlbfnddilfoe7d4mv5a

Large Multiuser MIMO Detection: Algorithms and Architectures [article]

Hadi Sarieddeen
2021 arXiv   pre-print
In this thesis, we investigate the problem of efficient data detection in large MIMO and high order MU-MIMO systems.  ...  Finally, we map the studied search-based detection schemes to low-resolution precoding at the transmitter side in massive MIMO and report the performance-complexity tradeoffs.  ...  In par- ticular, cognitive radio with adaptive MTs [64] is a promising future application of MC.  ... 
arXiv:1805.11514v2 fatcat:tjjwm6eaynf3ldwttx24y7wtbq

A Unified Multi-Functional Dynamic Spectrum Access Framework: Tutorial, Theory and Multi-GHz Wideband Testbed

Robert Qiu, Nan Guo, Husheng Li, Zhiqiang Wu, Vasu Chakravarthy, Yu Song, Zhen Hu, Peng Zhang, Zhe Chen
2009 Sensors  
The unifying theme of this paper is to spell out the convergence for cognitive radio, radar, and anti-jamming. Moore's law drives the system functions into digital parts.  ...  From a system viewpoint, this paper gives the first comprehensive treatment for the functions and the challenges of this multi-function (wideband) system.  ...  It uses a direct acyclic graph (DAG) to represent the dependency structure, in which each node denotes a random variable and each edge denotes the relation of dependency.  ... 
doi:10.3390/s90806530 pmid:22454598 pmcid:PMC3312458 fatcat:3hljqkjzxvgpfh5vue5gbdk65q

Distributed Detection in Cognitive Radio Networks

2019 International Journal of Engineering and Advanced Technology  
With the increase of wireless services and devices, and the need to maintain their QoS requirements,the demand for spectral bandwidth has increased in recent years.  ...  An energy efficient detection is also proposed in a distributed cognitive network for the case of a single SU and N PUs, where N>1.  ...  All the three proposed algorithms with fixed step size are able to track changes in received signal power and are usable in cognitive radio systems.  ... 
doi:10.35940/ijeat.a1037.1291s52019 fatcat:glze5kmscbg7bcd6diwpzhzwa4

When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges [article]

Qun Wang, Haijian Sun, Rose Qingyang Hu, Arupjyoti Bhuyan
2022 arXiv   pre-print
Complicated and dynamic SS systems can be exposed to different potential security and privacy issues, requiring protection mechanisms to be adaptive, reliable, and scalable.  ...  This comprehensive review is intended to provide the foundation for and facilitate future studies on exploring the potential of emerging ML for coping with increasingly complex SS and their security problems  ...  It usually maintains a surrogate model to mock the victim ML system with the same input and output data types.  ... 
arXiv:2201.04677v1 fatcat:gb73bku37fatncamax67buwkea
« Previous Showing results 1 — 15 out of 38 results