Performance Comparison of Adaptive and Blind Equalization Algorithms for Wireless Communication
Journal Title: Bonfring International Journal of Research in Communication Engineering - Year 2013, Vol 3, Issue 1
Abstract
Adaptive equalization is a well known method to minimize the Inter-Symbol Interference (ISI) in wireless communication. Often, adaptive algorithm requires transmission of known training sequence to track the time varying characteristics of the channel and hence utilizes additional bandwidth. It is also impractical to have training sequences in all types of transmissions (e.g. non-cooperative environment). Blind algorithm is a concept to track the time varying characteristics of the channel in the absence of training sequence. However, it leads to slow convergence. In this paper, we compare the performance of adaptive LMS algorithm and SATO based blind algorithm for PAM signal.
Authors and Affiliations
K. Suthendran , T. Arivoli
Opportunistic Channel Access Algorithm Based on Hidden Semi Markov Model for Cognitive Radio Networks
Future generation cellular networks highly depend on Cognitive radio due to its capability to handle the primary user channel utilization. However, channel sensing and allocation for secondary user are the major factors...
Resonance and Parametric Analysis of Planar Broad-Wall Longitudinal Slot Array Antennas
This paper presents, method of moments based analysis of broad-wall longitudinal slots array antenna using Multiple Cavity Modeling Technique (MCMT). Theoretical data for reflection coefficient, transmission coefficient,...
Butterfly Graphs with Shell Orders m and 2m+1 are Graceful
A graceful labelling of an un directed graph G with n edges is a one-one function from the set of vertices V(G) to the set {0, 1, ,2, . . ., n} such that the induced edge labels are all distinct. An induced edge label is...
A Systematic Study on Cyber Physical System
Cyber-physical systems (CPSs) are physical and engineered systems whose operations are monitored, coordinated, controlled and integrated by a computing and communication core. The economic and societal potential of such...
Towards Realization of Large-Scale Botnet Probing Events
Today?s attack scenery is governed by Botnets. Botnet refer to a group of bots?a sort of malware which allows an attacker to achieve complete control over the affected computer. Botnets are often run by malicious program...