Essays about: "Successive Cancellation"
Showing result 1 - 5 of 15 essays containing the words Successive Cancellation.
-
1. On GPU Assisted Polar Decoding : Evaluating the Parallelization of the Successive Cancellation Algorithmusing Graphics Processing Units
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : In telecommunication, messages sent through a wireless medium often experience noise interfering with the signal in a way that corrupts the messages. As the demand for high throughput in the mobile network is increasing, algorithms that can detectand correct these corrupted messages quickly and accurately are of interest to the industry. READ MORE
-
2. Design of a 13-Bit SAR ADC with kT/C noise cancellation technique
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : One of the main limitations of a Successive Approximation Register (SAR) Analog-to-Digital Converter (ADC) is the large input capacitance needed to achieve the desired performance. This large input capacitance increases the total area of the ADC and it imposes the use of a powerful buffer to drive it. READ MORE
-
3. Polar Codes for Biometric Identification Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Biometrics are widely used in identification systems, such as face, fingerprint, iris, etc. Polar code is the only code that can be strictly proved to achieve channel capacity, and it has been proved to be optimal for channel and source coding. READ MORE
-
4. Decode and Forward Relay Assisting Active Jamming in NOMA System
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a promising technology for upcoming wireless communications. Physical layer security has also been investigated to improve the security performance of the system. READ MORE
-
5. Physical Layer Security With Active Jamming Using NOMA.
University essay from Blekinge Tekniska HögskolaAbstract : This paper is persuaded to understand the physical layer security in wireless commu-nications utilizing NOMA (Non Orthogonal Multiple Access) concepts in the presence of an eavesdropper. Physical layer security maintains the confidentiality and secrecyof the system against eavesdroppers. READ MORE