首页 > 最新文献

2008 International Symposium on Information Theory and Its Applications最新文献

英文 中文
Nonlinear feedback control of stabilization problem via formal linearization using Taylor expansion 采用泰勒展开形式线性化的非线性反馈镇定问题控制
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895657
K. Komatsu, H. Takata
In this paper we consider a nonlinear feedback control problem for stabilizing multidimensional nonlinear systems using a formal linearization method based on Taylor expansion. Our goal is to design a nonlinear feedback control which stabilizes the nonlinear system in wider region of state space with less restricted conditions. The single-input multidimensional nonlinear system is transformed into an approximated bilinear system with respect to a formal linearization function by a formal linearization method using Taylor expansion. Substituting the ordinary LQ control function to the bilinear terms, a linear system with respect to the formal linearization function is derived and a feedback control is obtained. Finally, we illustrate some simulations to verify our approach.
本文利用基于泰勒展开的形式线性化方法,研究了稳定多维非线性系统的非线性反馈控制问题。我们的目标是设计一种非线性反馈控制,使非线性系统在更大的状态空间区域内以较少的限制条件稳定。采用泰勒展开的形式线性化方法,将单输入多维非线性系统转化为关于形式线性化函数的近似双线性系统。将普通LQ控制函数代入双线性项,推导出关于形式线性化函数的线性系统,得到反馈控制。最后,我们举例说明了一些仿真来验证我们的方法。
{"title":"Nonlinear feedback control of stabilization problem via formal linearization using Taylor expansion","authors":"K. Komatsu, H. Takata","doi":"10.1109/ISITA.2008.4895657","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895657","url":null,"abstract":"In this paper we consider a nonlinear feedback control problem for stabilizing multidimensional nonlinear systems using a formal linearization method based on Taylor expansion. Our goal is to design a nonlinear feedback control which stabilizes the nonlinear system in wider region of state space with less restricted conditions. The single-input multidimensional nonlinear system is transformed into an approximated bilinear system with respect to a formal linearization function by a formal linearization method using Taylor expansion. Substituting the ordinary LQ control function to the bilinear terms, a linear system with respect to the formal linearization function is derived and a feedback control is obtained. Finally, we illustrate some simulations to verify our approach.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130131861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A proposal of gateway decentralization method in wireless mesh networks and its evaluation 无线网状网络中网关去中心化方法的提出及其评价
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895412
M. Ito, T. Shikama, A. Watanabe
We proposed the session distribution method as one of the multi GW selection methods. Based on the results of the simulation, we came to the conclusion that the TCP throughput becomes larger in the session distribution method compares with the session distribution method. As the next step, we are going to make the implementation of the session distribution method.
我们提出了会话分配方法作为多GW选择方法之一。根据仿真结果,我们得出的结论是,与会话分配方法相比,会话分配方法的TCP吞吐量更大。下一步,我们将实现会话分发方法。
{"title":"A proposal of gateway decentralization method in wireless mesh networks and its evaluation","authors":"M. Ito, T. Shikama, A. Watanabe","doi":"10.1109/ISITA.2008.4895412","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895412","url":null,"abstract":"We proposed the session distribution method as one of the multi GW selection methods. Based on the results of the simulation, we came to the conclusion that the TCP throughput becomes larger in the session distribution method compares with the session distribution method. As the next step, we are going to make the implementation of the session distribution method.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"23 90","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132476967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards universal cover decoding 走向通用覆盖解码
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895386
N. Axvig, D. Dreher, K. Morrison, E. Psota, L. C. Pérez, J.L. Walker
In this paper, the non-codeword errors was analyzed that occur during parallel, iterative decoding with the min-sum decoder. Recently, work has been done relating the min-sum decoder to the linear programming (LP) decoder via graph covers. The LP decoder recasts the problem of decoding as an optimization problem whose feasible set is a polytope defined by the parity-check matrix of a code. It was shown that LP decoding can be realized as a decoder operating on graph covers.
分析了最小和译码器并行迭代译码过程中出现的非码字错误。最近,人们通过图盖将最小和解码器与线性规划(LP)解码器联系起来。LP解码器将译码问题转化为一个优化问题,其可行集是由码的奇偶校验矩阵定义的多面体。结果表明,LP译码可以作为对图盖的译码器来实现。
{"title":"Towards universal cover decoding","authors":"N. Axvig, D. Dreher, K. Morrison, E. Psota, L. C. Pérez, J.L. Walker","doi":"10.1109/ISITA.2008.4895386","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895386","url":null,"abstract":"In this paper, the non-codeword errors was analyzed that occur during parallel, iterative decoding with the min-sum decoder. Recently, work has been done relating the min-sum decoder to the linear programming (LP) decoder via graph covers. The LP decoder recasts the problem of decoding as an optimization problem whose feasible set is a polytope defined by the parity-check matrix of a code. It was shown that LP decoding can be realized as a decoder operating on graph covers.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131329790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi-bit revocable network coding scheme for butterfly-like network 蝶形网络的多比特可撤销网络编码方案
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895450
H. Kuwakado, M. Mori
This paper argues a network coding scheme with revocation. dasiaRevocationpsila means that a source can dynamically select sinks that cannot obtain information, and even if revoked sinks are changed, encoding rules of all nodes are unchanged. This scheme is called a revocable network coding scheme. For butterfly-like networks, only a one-bit revocable network coding scheme was studied. In this paper, we first introduce two network models for revocation. We next propose multi-bit revocable network coding schemes for butterfly-like networks on two network models.
提出了一种具有可撤销性的网络编码方案。dasiaRevocationpsila意味着一个源可以动态地选择不能获取信息的sink,即使被撤销的sink发生了变化,所有节点的编码规则也不会改变。该方案称为可撤销网络编码方案。对于类蝴蝶网络,只研究了一种1位可撤销的网络编码方案。本文首先介绍了两种网络撤销模型。接下来,我们提出了基于两种网络模型的类蝴蝶网络的多比特可撤销网络编码方案。
{"title":"Multi-bit revocable network coding scheme for butterfly-like network","authors":"H. Kuwakado, M. Mori","doi":"10.1109/ISITA.2008.4895450","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895450","url":null,"abstract":"This paper argues a network coding scheme with revocation. dasiaRevocationpsila means that a source can dynamically select sinks that cannot obtain information, and even if revoked sinks are changed, encoding rules of all nodes are unchanged. This scheme is called a revocable network coding scheme. For butterfly-like networks, only a one-bit revocable network coding scheme was studied. In this paper, we first introduce two network models for revocation. We next propose multi-bit revocable network coding schemes for butterfly-like networks on two network models.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126357369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A DWT-based Video watermarking scheme resilient to MPEG-2 compression and collusion attacks 一种抗MPEG-2压缩和合谋攻击的基于dwt的视频水印方案
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895528
R. Martinez, R. Reyes, C. Cruz, M. Nakano, H. Pérez
A blind watermarking algorithm for digital video resilient to MPEG-2 compression combined with several attacks is proposed. The proposed algorithm embeds binary visually recognizable patterns, such as the owner's logotype, in the DWT domain of some randomly selected video frames. To increase the security, the watermark data is transformed into a noise-like pattern by using a chaotic mixing method before the embedding process. The main advantage of the proposed algorithm is its simplicity, blindness and robustness. Extensive simulations show the watermark imperceptibility and robustness against several video degradations and other combined attacks. These results also show that the extracted watermark data from the watermarked video sequences using the proposed blind scheme is enough clear even after several attacks.
提出了一种适应MPEG-2压缩和多种攻击的数字视频盲水印算法。该算法在随机选择的视频帧的DWT域中嵌入二进制视觉可识别模式,如所有者的标识。为了提高水印的安全性,水印数据在嵌入前采用混沌混合方法转换成类噪声模式。该算法具有简单、盲性和鲁棒性等优点。大量的仿真结果表明,该算法对多种视频降级和其他组合攻击具有不可感知性和鲁棒性。实验结果还表明,在经过多次攻击后,采用盲法提取的水印数据仍然足够清晰。
{"title":"A DWT-based Video watermarking scheme resilient to MPEG-2 compression and collusion attacks","authors":"R. Martinez, R. Reyes, C. Cruz, M. Nakano, H. Pérez","doi":"10.1109/ISITA.2008.4895528","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895528","url":null,"abstract":"A blind watermarking algorithm for digital video resilient to MPEG-2 compression combined with several attacks is proposed. The proposed algorithm embeds binary visually recognizable patterns, such as the owner's logotype, in the DWT domain of some randomly selected video frames. To increase the security, the watermark data is transformed into a noise-like pattern by using a chaotic mixing method before the embedding process. The main advantage of the proposed algorithm is its simplicity, blindness and robustness. Extensive simulations show the watermark imperceptibility and robustness against several video degradations and other combined attacks. These results also show that the extracted watermark data from the watermarked video sequences using the proposed blind scheme is enough clear even after several attacks.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116538549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A distance spectrum estimation method of turbo codes 一种turbo码的距离谱估计方法
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895620
T. Sakai, K. Shibata
This study shows a new algorithm for distance spectrum (DS) estimation of turbo codes. We propose fundamental error event whose intervals of the consecutive two non zero inputs are less than the fundamental period. The DS is recursively estimated by some consecutive zero inputs with length of the fundamental period and the combination of fundamental error events. The proposed method also reduces the complexity of the calculation of codeword weight by looking up the tables of the number of weights and state transition instead of traversing over the trellis diagram.
提出了一种新的turbo码距离谱估计算法。提出了连续两个非零输入的间隔小于基本周期的基本误差事件。DS由若干具有基本周期长度和基本误差事件组合的连续零输入递归估计。该方法通过查找码字权值表和状态转移表,而不是遍历栅格图,从而降低了码字权值计算的复杂性。
{"title":"A distance spectrum estimation method of turbo codes","authors":"T. Sakai, K. Shibata","doi":"10.1109/ISITA.2008.4895620","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895620","url":null,"abstract":"This study shows a new algorithm for distance spectrum (DS) estimation of turbo codes. We propose fundamental error event whose intervals of the consecutive two non zero inputs are less than the fundamental period. The DS is recursively estimated by some consecutive zero inputs with length of the fundamental period and the combination of fundamental error events. The proposed method also reduces the complexity of the calculation of codeword weight by looking up the tables of the number of weights and state transition instead of traversing over the trellis diagram.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116637713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Asymptotic performance bounds of joint channel estimation and multiuser detection in frequency-selective fading DS-CDMA channels 频率选择衰落DS-CDMA信道联合信道估计和多用户检测的渐近性能界
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895438
K. Takeuchi, M. Vehkapera, T. Tanaka, R. Muller
We derive asymptotic upper bounds of the performance of a one-shot MMSE multiuser detector (MUD) and an optimal MUD in frequency-selective fading DS-CDMA channels with imperfect CSI at the receiver, using the replica method. We find that the performance bound of the one-shot MMSE MUD is indistinguishable from the performance of the one-shot LMMSE MUD analyzed by Evans and Tse when signal-to-noise ratio is high and the system load is small, and that the performance gap between the optimal MUD and the one-shot LMMSE MUD is also small on the same conditions.
我们利用复制方法推导了一炮MMSE多用户检测器(MUD)性能的渐近上界,以及在接收端CSI不完美的频率选择性衰落DS-CDMA信道中最优MUD的性能。我们发现,当信噪比较高且系统负载较小时,单次MMSE MUD的性能界限与Evans和Tse分析的单次LMMSE MUD的性能界限没有区别,并且在相同条件下,最优MUD与单次LMMSE MUD的性能差距也很小。
{"title":"Asymptotic performance bounds of joint channel estimation and multiuser detection in frequency-selective fading DS-CDMA channels","authors":"K. Takeuchi, M. Vehkapera, T. Tanaka, R. Muller","doi":"10.1109/ISITA.2008.4895438","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895438","url":null,"abstract":"We derive asymptotic upper bounds of the performance of a one-shot MMSE multiuser detector (MUD) and an optimal MUD in frequency-selective fading DS-CDMA channels with imperfect CSI at the receiver, using the replica method. We find that the performance bound of the one-shot MMSE MUD is indistinguishable from the performance of the one-shot LMMSE MUD analyzed by Evans and Tse when signal-to-noise ratio is high and the system load is small, and that the performance gap between the optimal MUD and the one-shot LMMSE MUD is also small on the same conditions.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"7 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114040542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MIMO relay design for multiple link pairs based on SINR constraints 基于SINR约束的多链路对MIMO中继设计
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895493
Jiun-Je Jian, Hsuan-Jung Su, Hsueh-Jyh Li
We address the problem of multiple-input multiple-output (MIMO) relay design for multiple distributed source and destination pairs with signal-to-interference-plus-noise-ratio (SINR) constraints. Multiple link pairs communicating through a relay can be beneficial in the wireless digital home network (DHN) scenario where various equipments exchange or share digital media contents. In the first hop from the source nodes to the relay, cooperative transmit-receive beamforming design is performed to maximize SINR at the relay. Then joint power allocation and transmit-receive beamforming is conducted in the second hop from the relay to the destination nodes based on the SINR constraints for each link pair. The beamforming filter is a group maximum SINR filter which exploits intra-group cooperation. The group-based uplink-downlink duality property in downlink channel is adopted and modified for amplify-and-forward (AF) relaying. An iterative algorithm is then proposed to solve the problem. Simulation results show the superiority of the proposed algorithm over other methods.
我们解决了具有信噪比(SINR)约束的多输入多输出(MIMO)中继设计问题。在各种设备交换或共享数字媒体内容的无线数字家庭网络(DHN)场景中,通过中继通信的多个链路对可能是有益的。在从源节点到中继的第一跳中,为了使中继处的信噪比最大化,采用了协同发送-接收波束形成设计。然后根据各链路对的信噪比约束,在中继到目的节点的第二跳中进行联合功率分配和收发波束形成。波束形成滤波器是一种利用群内协作的群最大信噪比滤波器。采用并改进了下行信道中基于分组的上行-下行双重性,实现了放大-转发中继。然后提出了一种迭代算法来求解这一问题。仿真结果表明了该算法的优越性。
{"title":"MIMO relay design for multiple link pairs based on SINR constraints","authors":"Jiun-Je Jian, Hsuan-Jung Su, Hsueh-Jyh Li","doi":"10.1109/ISITA.2008.4895493","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895493","url":null,"abstract":"We address the problem of multiple-input multiple-output (MIMO) relay design for multiple distributed source and destination pairs with signal-to-interference-plus-noise-ratio (SINR) constraints. Multiple link pairs communicating through a relay can be beneficial in the wireless digital home network (DHN) scenario where various equipments exchange or share digital media contents. In the first hop from the source nodes to the relay, cooperative transmit-receive beamforming design is performed to maximize SINR at the relay. Then joint power allocation and transmit-receive beamforming is conducted in the second hop from the relay to the destination nodes based on the SINR constraints for each link pair. The beamforming filter is a group maximum SINR filter which exploits intra-group cooperation. The group-based uplink-downlink duality property in downlink channel is adopted and modified for amplify-and-forward (AF) relaying. An iterative algorithm is then proposed to solve the problem. Simulation results show the superiority of the proposed algorithm over other methods.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122829852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weakly secure visual secret sharing schemes 弱安全的可视化秘密共享方案
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895380
Mitsugu Iwamoto
We introduce a visual secret sharing (VSS) scheme with a new security condition, called a weakly secure VSS scheme, which is not unconditionally secure in general, but is designed to be secure for human eyesight. It is shown in this paper that the weakly secure VSS scheme is equivalent to the unconditional one for black-white binary secret images although they are different for color secret images. This fact implies that, at the sacrifice of security, the clearer color images can be reproduced by the weakly secure VSS schemes compared with the unconditional ones. Furthermore, some constructions of weakly secure VSS schemes are presented.
本文提出了一种具有新安全条件的视觉秘密共享(VSS)方案,称为弱安全VSS方案,它不是一般意义上的无条件安全,而是设计为人眼的安全。本文证明了弱安全VSS方案对于黑白二值秘密图像等价于无条件VSS方案,而对于彩色秘密图像则不同。这一事实表明,在牺牲安全性的情况下,弱安全VSS方案比无条件安全VSS方案可以再现更清晰的彩色图像。此外,给出了弱安全VSS方案的一些构造。
{"title":"Weakly secure visual secret sharing schemes","authors":"Mitsugu Iwamoto","doi":"10.1109/ISITA.2008.4895380","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895380","url":null,"abstract":"We introduce a visual secret sharing (VSS) scheme with a new security condition, called a weakly secure VSS scheme, which is not unconditionally secure in general, but is designed to be secure for human eyesight. It is shown in this paper that the weakly secure VSS scheme is equivalent to the unconditional one for black-white binary secret images although they are different for color secret images. This fact implies that, at the sacrifice of security, the clearer color images can be reproduced by the weakly secure VSS schemes compared with the unconditional ones. Furthermore, some constructions of weakly secure VSS schemes are presented.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131481664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Outage probability for MMSE linear diversity in a non-Gaussian fading environment 非高斯衰落环境下MMSE线性分集的中断概率
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895460
N. Mekloi
Minimum mean square error (MMSE), also know as optimum combining, is already mentioned to be good matched technique for suppressing the multipath fading and reducing the effect of co-channel interference (CCI) in wireless communications. It has been used for either Gaussian fading channels and non-Gaussian fading channels for different conditions and purposes. In this paper, the performance evaluation of wireless digital communication systems for linear minimum mean square error diversity is investigated. The approach of this paper and its main contribution is to model the non-Gaussian fading channel of wireless systems. A new expression of outage probability in a non-Gaussian fading environment is studied by modeling fading channel as a spherically invariant random process (SIRP). It assumed that the interferers have equal powers and their number is no less than the diversity order. Finally, some numerical results show the impact of the number of antenna elements, the number of interferers and noise.
最小均方误差(MMSE)也称为最优组合,是无线通信中抑制多径衰落和减少同信道干扰(CCI)影响的一种很好的匹配技术。它已用于高斯衰落信道和非高斯衰落信道,用于不同的条件和目的。本文研究了线性最小均方误差分集下无线数字通信系统的性能评价问题。本文的方法及其主要贡献是对无线系统的非高斯衰落信道进行建模。通过将衰落信道建模为球不变随机过程(SIRP),研究了非高斯衰落环境下中断概率的新表达式。假设干扰的功率相等,且干扰数不小于分集阶数。最后,给出了天线单元数、干扰数和噪声对系统性能的影响。
{"title":"Outage probability for MMSE linear diversity in a non-Gaussian fading environment","authors":"N. Mekloi","doi":"10.1109/ISITA.2008.4895460","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895460","url":null,"abstract":"Minimum mean square error (MMSE), also know as optimum combining, is already mentioned to be good matched technique for suppressing the multipath fading and reducing the effect of co-channel interference (CCI) in wireless communications. It has been used for either Gaussian fading channels and non-Gaussian fading channels for different conditions and purposes. In this paper, the performance evaluation of wireless digital communication systems for linear minimum mean square error diversity is investigated. The approach of this paper and its main contribution is to model the non-Gaussian fading channel of wireless systems. A new expression of outage probability in a non-Gaussian fading environment is studied by modeling fading channel as a spherically invariant random process (SIRP). It assumed that the interferers have equal powers and their number is no less than the diversity order. Finally, some numerical results show the impact of the number of antenna elements, the number of interferers and noise.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127759847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2008 International Symposium on Information Theory and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1