41 resultados para Multipath Fading
Resumo:
Estudi sobre la millora de rendiment (en temps d’execució) al'algorisme de gràfics Fast Multipath Radiosity Using Hierarchical Subscenes gràcies a l’execució paral•lela especulada que ens permet obtenir el motor d'especulació per a clústers desenvolupat en el grup de recerca BCDS de la Universitat de Girona
Resumo:
The phenomenon of human migration is certainly not new and it has been studied from a variety of perspectives. Yet, the attention on human migration and its determinant has not been fading over time as confirmed by recent contributions (see for instance Cushing and Poot 2004 and Rebhun and Raveh 2006). In this paper we combine the recent theoretical contributions by Douglas (1997) and Wall (2001) with the methodological advancements of Guimarães et al. (2000, 2003) to model inter-municipal migration flows in the Barcelona area. In order to do that, we employ two different types of count models, i.e. the Poisson and negative binomial and compare the estimations obtained. Our results show that, even after controlling for the traditional migration factors, QoL (measured with a Composite Index which includes numerous aspects and also using a list of individual variables) is an important determinant of short distance migration movements in the Barcelona area.
Resumo:
Cognitive radio networks (CRN) sense spectrum occupancy and manage themselves to operate in unused bands without disturbing licensed users. The detection capability of a radio system can be enhanced if the sensing process is performed jointly by a group of nodes so that the effects of wireless fading and shadowing can be minimized. However, taking a collaborative approach poses new security threats to the system as nodes can report false sensing data to force a wrong decision. Providing security to the sensing process is also complex, as it usually involves introducing limitations to the CRN applications. The most common limitation is the need for a static trusted node that is able to authenticate and merge the reports of all CRN nodes. This paper overcomes this limitation by presenting a protocol that is suitable for fully distributed scenarios, where there is no static trusted node.
Resumo:
In this paper, we investigate the average andoutage performance of spatial multiplexing multiple-input multiple-output (MIMO) systems with channel state information at both sides of the link. Such systems result, for example, from exploiting the channel eigenmodes in multiantenna systems. Dueto the complexity of obtaining the exact expression for the average bit error rate (BER) and the outage probability, we deriveapproximations in the high signal-to-noise ratio (SNR) regime assuming an uncorrelated Rayleigh flat-fading channel. Moreexactly, capitalizing on previous work by Wang and Giannakis, the average BER and outage probability versus SNR curves ofspatial multiplexing MIMO systems are characterized in terms of two key parameters: the array gain and the diversity gain. Finally, these results are applied to analyze the performance of a variety of linear MIMO transceiver designs available in the literature.
Resumo:
This paper presents a Bayesian approach to the design of transmit prefiltering matrices in closed-loop schemes robust to channel estimation errors. The algorithms are derived for a multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) system. Two different optimizationcriteria are analyzed: the minimization of the mean square error and the minimization of the bit error rate. In both cases, the transmitter design is based on the singular value decomposition (SVD) of the conditional mean of the channel response, given the channel estimate. The performance of the proposed algorithms is analyzed,and their relationship with existing algorithms is indicated. As withother previously proposed solutions, the minimum bit error rate algorithmconverges to the open-loop transmission scheme for very poor CSI estimates.
Resumo:
A particular property of the matched desiredimpulse response receiver is introduced in this paper, namely,the fact that full exploitation of the diversity is obtained withmultiple beamformers when the channel is spatially and timelydispersive. This particularity makes the receiver specially suitablefor mobile and underwater communications. The new structureprovides better performance than conventional and weightedVRAKE receivers, and a diversity gain with no needs of additionalradio frequency equipment. The baseband hardware neededfor this new receiver may be obtained through reconfigurabilityof the RAKE architectures available at the base station. Theproposed receiver is tested through simulations assuming UTRAfrequency-division-duplexing mode.
Resumo:
In this paper, the theory of hidden Markov models (HMM) isapplied to the problem of blind (without training sequences) channel estimationand data detection. Within a HMM framework, the Baum–Welch(BW) identification algorithm is frequently used to find out maximum-likelihood (ML) estimates of the corresponding model. However, such a procedureassumes the model (i.e., the channel response) to be static throughoutthe observation sequence. By means of introducing a parametric model fortime-varying channel responses, a version of the algorithm, which is moreappropriate for mobile channels [time-dependent Baum-Welch (TDBW)] isderived. Aiming to compare algorithm behavior, a set of computer simulationsfor a GSM scenario is provided. Results indicate that, in comparisonto other Baum–Welch (BW) versions of the algorithm, the TDBW approachattains a remarkable enhancement in performance. For that purpose, onlya moderate increase in computational complexity is needed.
Resumo:
Chromosomal inversion clines paralleling the long-standing ones in native Palearctic populations of Drosophila subobscura evolved swiftly after this species invaded the Americas in the late 1970s and early 1980s. However, the new clines did not consistently continue to converge on the Old World baseline. Our recent survey of Chilean populations of D. subobscura shows that inversion clines have faded or even changed sign with latitude. Here, we investigate the hypothesis that this fading of inversion clines might be due to the Bogert effect, namely, that flies' thermoregulatory behavior has eventually compensated for environmental variation in temperature, thus buffering selection on thermal-related traits. We show that latitudinal divergence in thermal preference (T-p) has evolved in Chile for females, with higher-latitude flies having a lower mean T-p. Plastic responses in T-p also lessen latitudinal thermal variation because flies developed at colder temperatures prefer warmer microclimates. Our results are consistent with the idea that active behavioral thermoregulation might buffer environmental variation and reduce the potential effect of thermal selection on other traits as chromosomal arrangements.
Resumo:
Capsule application of Diamidino Yellow (DY) to the cut end of the sciatic nerve immediately followed by capsule application of Fast Blue (FB) resulted in approximate to 95% double-labelled dorsal root ganglion neurones (DRGn) and motoneurones (Mn). Nerve injection of DY followed either immediately or 2 months later by capsule application of FB resulted in approximate to 90% double-labelled DRGn and Mn, indicating that DY and FB label similar populations of DRGn and Mn, and that insignificant DY fading occurred during this period. Inversing the order of application, however, i.e. nerve injection of FB followed immediately by capsule application of DY, resulted in double labelling in only approximate to 10% of the DRGn and Mn. These percentages increased to 70% of the DRGn and 60% of the Mn when the FB injection was followed 1 or 2 months after by the DY application, indicating that DY uptake is blocked by recent administration of FB. The results indicate that DY and FB might be useful for sequential labelling before and after nerve injury as a tool to investigate the accuracy of sensory and motor regeneration.
Resumo:
Selective reinnervation of peripheral targets after nerve injury might be assessed by injecting a first tracer in a target before nerve injury to label the original neuronal population, and applying a second tracer after the regeneration period to label the regenerated population. However, altered uptake of tracer, fading, and cell death may interfere with the results. Furthermore, if the first tracer injected remains in the target tissue, available for 're-uptake' by misdirected regenerating axons, which originally innervated another region, then the identification of the original population would be confused. With the aim of studying this problem, the sciatic nerve of adult rats was sectioned and sutured. After 3 days, to allow the distal axon to degenerate avoiding immediate retrograde transport, one of the dyes: Fast Blue (FB), Fluoro-Gold (FG) or Diamidino Yellow (DY), was injected into the tibial branch of the sciatic nerve, or in the skin of one of the denervated digits. Rats survived 2-3 months. The results showed labelled dorsal root ganglion (DRG) cells and motoneurones, indicating that late re-uptake of a first tracer occurs. This phenomenon must be considered when the model of sequential labelling is used for studying the accuracy of peripheral reinnervation.
Resumo:
Cognitive radio networks sense spectrum occupancy and manage themselvesto operate in unused bands without disturbing licensed users. The detection capability of aradio system can be enhanced if the sensing process is performed jointly by a group of nodesso that the effects of wireless fading and shadowing can be minimized. However, taking acollaborative approach poses new security threats to the system as nodes can report falsesensing data to reach a wrong decision. This paper makes a review of secure cooperativespectrum sensing in cognitive radio networks. The main objective of these protocols is toprovide an accurate resolution about the availability of some spectrum channels, ensuring thecontribution from incapable users as well as malicious ones is discarded. Issues, advantagesand disadvantages of such protocols are investigated and summarized.