Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Mingjie Zhuang"'
Autor:
Mingjie Zhuang
Publikováno v:
International Journal of Antennas and Propagation, Vol 2015 (2015)
The paper assumes that the channel state information (CSI) is available at the receiver and is known partially at the transmitter through a feedback channel. The bit error rate (BER) performance of multiple transmit antenna selection (MTAS) for the m
Externí odkaz:
https://doaj.org/article/6c98235a006044858bb5be20d16f33dc
Autor:
Weiqiang Chen, Mingjie Zhuang
Publikováno v:
2022 IEEE 16th International Conference on Anti-counterfeiting, Security, and Identification (ASID).
Publikováno v:
Applied Mathematics and Nonlinear Sciences. 5:565-580
How to reduce the hardware cost and high power consumption of RF link of communication device is the key problem to be solved for multi-transmitting antenna and multi-receiving antenna system (MIMO). Always choose the best antennas connection a limit
Autor:
Mingjie Zhuang, Haitao Li
Publikováno v:
Journal of Software. :74-85
Publikováno v:
IOP Conference Series: Materials Science and Engineering. 768:022002
In this study, the landfill leachate was treated by Catalytic wet air oxidation, and the heterogeneous catalyst Fe-Co-Ru-Ce/γ-Al2O3 was prepared. The calcination temperatures were respectively set at 300, 450, 600, 750 and 900 °C, and the Fe-Co-Ru-
Autor:
Mingjie ZHUANG
Publikováno v:
Sensors & Transducers, Vol 166, Iss 3, Pp 156-162 (2014)
For a double transmit and Nr receive antennas (denoted by {2; Nr}) system utilizing Almouti scheme, we assume the transmitter side knows partial channel state information (CSI), system channel characteristic obeies order statistics distribution. We e
Autor:
Mingjie Zhuang, Guangyu Yang
Publikováno v:
2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID).
Coset coding is often used in the study of the physical layer security based on wiretap channel model. As almost every secure coding schemes using coset codes need a precise prediction of the channel state information (CSI), they are much more diffic
Publikováno v:
2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID).
Cat swarm optimization (CSO) is a kind of intelligent algorithm to mimic the behavior of cat, the binary CSO (BCSO) is a binary version. Based on the characteristic of BCSO's tracking mode and search mode to the global optimal solution, this paper pr
Performance optimization and simulation verification of LTE network planning based on micro coverage
Publikováno v:
2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID).
Today's mobile network traffic is growing in an exponential way, the current cellular system structure has been changed due to the lack of spectrum and the other factors, such as the difficulty of property coordination and the higher rent expense. In
Autor:
Miaoxin Li, Mingjie Zhuang
Publikováno v:
Anti-counterfeiting, Security, and Identification.
As a branch of WSN and an important part of the internet of things (IOT), the wireless body area network (WBAN) was originally created to improve the level of personal health care. And with the development of wireless technologies, the application of