Polynomial based Channel Estimation Technique with Sliding Window for M-QAM Systems
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 11
Abstract
Pilot Symbol Assisted Modulation (PSAM) channel estimation techniques over Rayleigh fading channels have been analysed in recent years. Fluctuations in the Rayleigh fading channel gain degrades the performance of any modulation scheme. This paper develops and analyses a PSAM Polynomial interpolation technique based on Least Square (LS ) approxi-mations to estimate the Channel State Information (CSI) for M-ary Quadrature Amplitude Modulation (M-QAM) over flat Rayleigh fading channels. A Sliding window approach with pilot symbol adjustment is employed in order to minimize the computational time complexity of the estimation technique. The channel estimation performance, and its computational delay and time complexity is verified for di?erent Doppler frequen-cies ( fd), frame lengths (L), and Polynomial orders (P-orders). Simulation results show that the Cubic Polynomial interpolation gives superior Symbol Error Rate (SER) performance than the Quadratic Polynomial interpolation and higher P-orders, and the performance of the Polynomial estimation techniques degrade with increase in the P-orders.
Authors and Affiliations
O. O. Ogundile, M. O. Oloyede, F. A. Aina, S. S. Oyewobi
Intelligent Hybrid Approach for Android Malware Detection based on Permissions and API Calls
Android malware is rapidly becoming a potential threat to users. The number of Android malware is growing exponentially; they become significantly sophisticated and cause potential financial and information losses for us...
Particle Swarm Optimization for Calibrating and Optimizing Xinanjiang Model Parameters
The Xinanjiang model, a conceptual hydrological model is well known and widely used in China since 1970s. Therefore, most of the parameters in Xinanjiang model have been calibrated and pre-set according to different clim...
: An Approach to Improve the Representation of the User Model in the Web-Based
A major shortcoming of content-based approaches exists in the representation of the user model. Content-based approaches often employ term vectors to represent each user’s interest. In doing so, they ignore t...
A Secured Interoperable Data Exchange Model
Interoperability enables peer systems to communicate with each other and use the functionality of peer systems effectively. It improves ability for different systems to exchange information between cooperative systems. I...
Attacking Misaligned Power Tracks Using Fourth-Order Cumulant
Side channel attacks (SCA) use the leaked confidential data to reveal the cipher key. Power consumptions, electromagnetic emissions, and operation timing of cryptographic hardware are examples of measurable parameters (a...