In this paper, a novel approach is presented to the multiuser channelidentification . The approach makes use of the modulation-induced Cyclostationarity, capable ofidentifying individual channels of different users. B...In this paper, a novel approach is presented to the multiuser channelidentification . The approach makes use of the modulation-induced Cyclostationarity, capable ofidentifying individual channels of different users. By means of the decomposition of the cyclicspectrum method, the blind estimation of the channel can be achieved . The approach is rathersimple, with considerable advantages over existing techniques, and suitable for the multiuser uplink. The identifiabilily condition and its proof are also concluded in the paper. And finally the.simulation of identification algorithm is given.展开更多
In this paper,the effect of system and amplifier parameters on the performance of soliton transmission systemusing Phase Sensitive Amplifier(PSA)as in-line amplifier has been researched theoretically by computer simul...In this paper,the effect of system and amplifier parameters on the performance of soliton transmission systemusing Phase Sensitive Amplifier(PSA)as in-line amplifier has been researched theoretically by computer simulation.Since in PSA soliton system the performance of average soliton regime is much better than that of dynamic soliton regime,in our simulation we only considered average soliton regime.Our simulation results show that although using PSA as in-line amplifiers in soliton system can not only overcome Gordon-Haus restriction but also suppress solitons interaction,lengthen soliton stable transmission distance significantly,the system and amplifier parameters have to be chosen carefullyin order to get a better system perorformance.展开更多
To secure wireless communication, this paper provides a solution based on theabilities of the current mobile terminals. This paper also proposes a mechanism that can secure thecommunication between the current mobile ...To secure wireless communication, this paper provides a solution based on theabilities of the current mobile terminals. This paper also proposes a mechanism that can secure thecommunication between the current mobile terminals and the Internet Web Server. Yield to thecapabilities of the current mobile terminals, the public key techniques cannot be used now. But inthe future, the memory space and the computation ability of the mobile terminals will no longer beany puzzles, so certificate and Public Key Infrastructure (PKI) can be used to make wirelesscommunication security. This paper also proposes PKI architecture in the future mobile network.Finally this paper makes an assumption of the network's development and its secure issues.展开更多
文摘In this paper, a novel approach is presented to the multiuser channelidentification . The approach makes use of the modulation-induced Cyclostationarity, capable ofidentifying individual channels of different users. By means of the decomposition of the cyclicspectrum method, the blind estimation of the channel can be achieved . The approach is rathersimple, with considerable advantages over existing techniques, and suitable for the multiuser uplink. The identifiabilily condition and its proof are also concluded in the paper. And finally the.simulation of identification algorithm is given.
文摘In this paper,the effect of system and amplifier parameters on the performance of soliton transmission systemusing Phase Sensitive Amplifier(PSA)as in-line amplifier has been researched theoretically by computer simulation.Since in PSA soliton system the performance of average soliton regime is much better than that of dynamic soliton regime,in our simulation we only considered average soliton regime.Our simulation results show that although using PSA as in-line amplifiers in soliton system can not only overcome Gordon-Haus restriction but also suppress solitons interaction,lengthen soliton stable transmission distance significantly,the system and amplifier parameters have to be chosen carefullyin order to get a better system perorformance.
基金This work is supported by National Science Foundation of China (No.60372094).
文摘To secure wireless communication, this paper provides a solution based on theabilities of the current mobile terminals. This paper also proposes a mechanism that can secure thecommunication between the current mobile terminals and the Internet Web Server. Yield to thecapabilities of the current mobile terminals, the public key techniques cannot be used now. But inthe future, the memory space and the computation ability of the mobile terminals will no longer beany puzzles, so certificate and Public Key Infrastructure (PKI) can be used to make wirelesscommunication security. This paper also proposes PKI architecture in the future mobile network.Finally this paper makes an assumption of the network's development and its secure issues.