Results 81 to 90 of about 12,060 (177)

Analisa Kinerja Kode Konvolusi pada Sistem Successive Interference Cancellation Multiuser Detection CDMA dengan Modulasi QAM Berbasis Perangkat Lunak [PDF]

open access: yes, 2011
Pada Proyek Akhir ini dilakukan Analisa Kinerja Kode Konvolusi pada Sistem Successive Interference Cancellation Multiuser Detection CDMA dengan Modulasi Quadrature Amplitude Modulation Berbasis Perangkat Lunak.
Dewi, Karina Meyrita, Moegiharto, Yoedy
core  

Geometric Optimization of Passive High‐Frequency Electromagnetic Shielding Structures Based on Finite Element Analysis and Deep Learning

open access: yesEnergy Science &Engineering, Volume 14, Issue 1, Page 129-143, January 2026.
1. Finite element analysis applied to structural optimization of concentric ring electromagnetic shielding structure. 2. DBN‐BP machine learning algorithm applied to the establishment of structural optimization programs. ABSTRACT The proliferation of high‐frequency wireless power transfer (WPT) technology in smart grid applications—particularly dynamic
Yuanhuang Liu   +3 more
wiley   +1 more source

A Massive Grant‐Free Random Access Scheme Based on Spectrum Sensing and Preamble Delay

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This paper introduces cognitive radio (CR) and preamble delay (PD) to reduce access collisions, together with non‐orthogonal multiple access (NOMA) to improve spectrum efficiency, and thus proposes an efficient CR‐NOMA‐PD‐based massive grant‐free random multiple access scheme.
Jing Zhang   +5 more
wiley   +1 more source

Joint Optimization Algorithm for UAV Trajectory and Beamforming for NOMA‐Based Integrated Sensing and Communication (ISAC) Systems

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This paper investgates a unmanned aerial vehicle‐assisted non‐orthogonal multiple access‐integrated sensing and communication system, which fuses the UAV's echo signal and target position by employing the extended Kalman filter algorithum to achieve high‐precision prediction of the target trajectory.
Dongsheng Han, Zian Wang, Yan Wang
wiley   +1 more source

Методы последовательной компенсации искажений в древовидных алгоритмах случайного множественного доступа [PDF]

open access: yes, 2011
Данная статья посвящена анализу метода последовательной компенсации искажений, который относиться к случайным методам множественного доступа. В данной статье представлено общее функционирование древовидных алгоритмов.
Поповский, В. В.   +2 more
core  

Communication‐Security Co‐Design for Federated Learning in Grant‐Free NOMA IoT Networks

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This article presents SA‐PPO, a Security‐Aware Proximal Policy Optimisation framework for federated learning over grant‐free NOMA (non‐orthogonal multiple access) in IoT networks. By jointly optimising access control, resource allocation, and trust‐weighted aggregation using cross‐layer indicators, SA‐PPO enhances both communication reliability and ...
Emmanuel Atebawone   +5 more
wiley   +1 more source

Digital Self‐Interference Cancelation Method Based on Multi‐Domain Jamming Frequency‐Shift Fingerprint Design

open access: yesIET Radar, Sonar &Navigation, Volume 20, Issue 1, January/December 2026.
To address the issue of self‐interference cancelation in simultaneous transmission and reception jammer where self‐interference and signal‐of‐interest are correlated, this paper proposes a novel digital self‐interference cancelation method based on frequency—shift fingerprint design from a perspective of signal characteristics.
Jia Sun, Xizhang Wei, Jie Xiao
wiley   +1 more source

ANALISA KINERJA SPACE TIME BLOCK CODING PADA SISTEM SUCCESSIVE INTEREFERENCE CANCELLATION MULTI USER DETECTION CDMA DENGAN MENGGUNAKAN MODULASI QPSK BERBASIS PERANGKAT LUNAK [PDF]

open access: yes, 2011
ABSTRAK Pada proyek akhir ini, dilakukan analisa kinerja Space Time Block Coding (STBC) pada sistem Successive Interference Cancellation (SIC) Multi User Detection (MUD) CDMA.
dwitasari, andhini
core  

Successive Interference Cancellation in Clipped and Product Combining aided FFH Multi-User Systems

open access: yes, 2006
—In this contribution, we propose two successive interference cancellation (SIC) schemes for a fast frequency hopping (FFH) multiple access (MA) system using M-ary frequency shift keying (MFSK) and invoking multi-user detection (MUD). One of the proposed
Ahmed, S., Hanzo, L., Yang, L-L.
core  

The Mobile Base Station Strategy for Wireless Networks With Successive Interference Cancellation

open access: yesIEEE Access, 2019
Successive interference cancellation (SIC) and mobile base stations (MBSs) have been separately exploited to effectively collect data in wireless networks.
Lei Shi   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy