Results 51 to 60 of about 44,063 (255)

Compute-and-Forward: Harnessing Interference through Structured Codes [PDF]

open access: yes, 2011
Interference is usually viewed as an obstacle to communication in wireless networks. This paper proposes a new strategy, compute-and-forward, that exploits interference to obtain significantly higher rates between users in a network. The key idea is that
Gastpar, Michael, Nazer, Bobak
core   +2 more sources

Location‐Assisted Graph‐Based User Scheduling in Multi‐User MIMO LEO NTN Systems

open access: yesInternational Journal of Satellite Communications and Networking, Volume 44, Issue 3, Page 275-287, May/June 2026.
ABSTRACT This paper addresses user clustering and scheduling for multi‐user MIMO low Earth orbit nonterrestrial network systems in full frequency reuse. Since the number of on‐ground user terminals is usually much higher than the number of on‐board LEO satellite antennas, user scheduling becomes a fundamental task.
Bilal Ahmad   +4 more
wiley   +1 more source

Hyperspectral Unmixing with Bandwise Generalized Bilinear Model

open access: yesRemote Sensing, 2018
Generalized bilinear model (GBM) has received extensive attention in the field of hyperspectral nonlinear unmixing. Traditional GBM unmixing methods are usually assumed to be degraded only by additive white Gaussian noise (AWGN), and the intensity of ...
Chang Li   +6 more
doaj   +1 more source

Non-blind Image Restoration Based on Convolutional Neural Network

open access: yes, 2018
Blind image restoration processors based on convolutional neural network (CNN) are intensively researched because of their high performance. However, they are too sensitive to the perturbation of the degradation model.
Okutomi, Masatoshi   +2 more
core   +1 more source

Probabilistic Shaping for the AWGN Channel

open access: yes, 2023
In this report, we study communication over an additive white Gaussian noise channel with a fixed signal constellation. We measure how much information we can send through this channel and how to improve the rate of communication by changing the input probability distribution.
openaire   +2 more sources

Modeling and Optimization of Frequency‐Doubled Radio‐Over‐Fiber Link Based on Deep Learning Technique

open access: yesAdvanced Photonics Research, Volume 7, Issue 3, March 2026.
This article proposes a deep learning (DL) approach for modeling and optimizing frequency‐doubled radio‐over‐fiber links. By collectively replacing traditional components with DL model, accurate system evaluation is achieved. Moreover, through an end‐to‐end architecture, performance optimization is accomplished.
Difei Shi   +3 more
wiley   +1 more source

Comparative analysis of the effectiveness of BPG, AGU, AVIF and HEIF compression methods for medical images corrupted by noise of two types

open access: yesРадіоелектронні і комп'ютерні системи
The subject matter is lossy compression using the BPG, AGU, AVIF, and HEIF encoders for medical images with different levels of visual complexity corrupted by additive Gaussian and Poisson noise.
Viktoriia Naumenko   +4 more
doaj   +1 more source

Performance Analysis of CA‐Polar Code for 5G‐IoT Low Power Wide Area Networks

open access: yesInternet Technology Letters, Volume 9, Issue 2, March/April 2026.
ABSTRACT CRC‐Aided Polar (CA‐Polar) codes are the standardized channel coding scheme for control channels of 5G eMBB service class due to their capacity achieving performance. This work aims to assess the compatibility and scalability of CA‐Polar codes toward low power IoT applications coming under the domain of LPWAN.
Abhilasha Gautam   +2 more
wiley   +1 more source

On The Construction of Capacity-Achieving Lattice Gaussian Codes

open access: yes, 2016
In this paper, we propose a new approach to proving results regarding channel coding schemes based on construction-A lattices for the Additive White Gaussian Noise (AWGN) channel that yields new characterizations of the code construction parameters, i.e.,
Abediseid, Walid   +2 more
core   +1 more source

Covert Wireless Communication with a Poisson Field of Interferers [PDF]

open access: yes, 2018
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alice, an intended receiver, Bob, a warden, Willie, and a Poisson field of interferers.
He, Biao   +3 more
core   +5 more sources

Home - About - Disclaimer - Privacy