Results 61 to 70 of about 4,308 (180)
DS/CDMA Multiuser Detectors Based on Subspace Methods
In this work blind and group-blind (Bld-MuD and SBld-MuD, respectively) multiuser detectors (MuD) are analyzed from the point of view of the trade-off between performance versus complexity; specifically, the blind and group-blind detectors are ...
Paul Jean Etienne Jeszensky +2 more
doaj
Pilot Decontamination in CMT-based Massive MIMO Networks
Pilot contamination problem in massive MIMO networks operating in time-division duplex (TDD) mode can limit their expected capacity to a great extent.
Aminjavaheri, Amir +4 more
core +1 more source
Integration of Flexible Touch Panels and Machine Learning: Applications and Techniques
In this article, the development of advanced flexible touch panel technologies is explored. It covers capacitive, resistive, piezoelectric, and triboelectric nanogenerators, enhanced by machine learning approaches including support vector machines, artificial neural networks, convolutional neural networks, and k‐nearest neighbors.
Jiayue Zheng +4 more
wiley +1 more source
On Interference Cancellation and Iterative Techniques [PDF]
Recent research activities in the area of mobile radio communications have moved to third generation (3G) cellular systems to achieve higher quality with variable transmission rate of multimedia information.
Kohno, Ryuji, Morelos-Zaragoza, Robert H
core +1 more source
Multi-Step Knowledge-Aided Iterative ESPRIT for Direction Finding
In this work, we propose a subspace-based algorithm for DOA estimation which iteratively reduces the disturbance factors of the estimated data covariance matrix and incorporates prior knowledge which is gradually obtained on line.
de Lamare, R. C., Pinto, S. F. B.
core +1 more source
Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud
The data transmission and data retrieval process from the cloud is a critical issue because of cyber‐attacks. The data in the cloud is highly vulnerable and may fall prey to hackers. The hackers tend to attack the data in the public network, deteriorating the range of confidentiality and the authentication of the data.
Vikas K. Soman, V. Natarajan, Bohui Wang
wiley +1 more source
In time division duplex (TDD)‐based multiuser massive multiple input multiple output (MIMO) systems, the uplink channel is estimated and the results are used in downlink for signal detection. Owing to noisy uplink channel estimation, the downlink channel
Parisa Pasangi +2 more
doaj +1 more source
A Multimodal Low Complexity Neural Network Approach for Emotion Recognition
This paper introduces a neural network‐based model designed for classifying emotional states by leveraging multimodal physiological signals. The model utilizes data from the AMIGOS and SEED‐V databases. The AMIGOS database integrates inputs from electroencephalogram (EEG), electrocardiogram (ECG), and galvanic skin response (GSR) to analyze emotional ...
Adrian Rodriguez Aguiñaga +4 more
wiley +1 more source
Blind adaptive receiver for uplink multiuser massive MIMO systems
Herein, we consider uplink multiuser massive multiple‐input multiple‐output systems when multiple users transmit information symbols to a base station (BS) by applying simple space‐time block coding (STBC).
Joonwoo Shin, Bangwon Seo
doaj +1 more source
Communication Theoretic Data Analytics
Widespread use of the Internet and social networks invokes the generation of big data, which is proving to be useful in a number of applications. To deal with explosively growing amounts of data, data analytics has emerged as a critical technology ...
Chen, Kwang-Cheng +3 more
core +1 more source

