Academic literature on the topic 'Two-way channels'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Two-way channels.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Two-way channels"

1

CHILDS, ANDREW M., DEBBIE W. LEUNG, and HOI-KWONG LO. "TWO-WAY QUANTUM COMMUNICATION CHANNELS." International Journal of Quantum Information 04, no. 01 (February 2006): 63–83. http://dx.doi.org/10.1142/s0219749906001621.

Full text
Abstract:
We consider communication between two parties using a bipartite quantum operation, which constitutes the most general quantum mechanical model of two-party communication. We primarily focus on the simultaneous forward and backward communication of classical messages. For the case in which the two parties share unlimited prior entanglement, we give inner and outer bounds on the achievable rate region that generalize classical results due to Shannon. In particular, using a protocol of Bennett, Harrow, Leung, and Smolin, we give a one-shot expression in terms of the Holevo information for the entanglement-assisted one-way capacity of a two-way quantum channel. As applications, we rederive two known additivity results for one-way channel capacities: the entanglement-assisted capacity of a general one-way channel, and the unassisted capacity of an entanglement-breaking one-way channel.
APA, Harvard, Vancouver, ISO, and other styles
2

Xing, Fangyuan, Hongxi Yin, and Lianyou Jing. "Performance characterization of two-way multi-hop underwater networks in turbulent channels [Invited]." Chinese Optics Letters 17, no. 10 (2019): 100005. http://dx.doi.org/10.3788/col201917.100005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kadhim, Abdulkareem, and Karrar Ali. "Network Coded Modulation for Two Way Relay Networks." Iraqi Journal for Computers and Informatics 41, no. 1 (December 31, 2014): 9–14. http://dx.doi.org/10.25195/ijci.v41i1.91.

Full text
Abstract:
Modern wireless networks use cooperative relaying to expand its coverage area. Wireless relaying allows mobile terminals toparticipate in transmission even when these terminals are not being the initial source or final destination. This can be achieved in differentways ranging from simple conventional relaying to more sophisticated coding at terminal and relay nodes to improve transmissionperformance. The proposed work here studied such system by simulating different coding techniques to be used in two way relay networkcoding (TWRC). Some of these techniques were previously proposed to improve transmission performance in conventional datacommunication systems. BER performance of different arrangements of coding and relaying schemes are evaluated using computersimulation tests. Ideal AWGN channel model and standard wireless channel models for wireless networks are considered in the simulationtests. The results have been shown that coding schemes such as Trellis Coded Modulation (TCM) and Repeat Accumulate (RA) codes aremore suitable in two way relaying networks. Over AWGN, TCM-8PSK improves BER performance by at least 2 dB at high SNR fordifferent relaying arrangements. For fading channels, this advantage is slightly reduced. Regenerative repeating at relay node seems to be apromising arrangement. It seems that there is no sense in using RA codes over fading channels due to its poor performance and relativelylower speed caused by repetitions.
APA, Harvard, Vancouver, ISO, and other styles
4

Aggarwal, Vaneet, and Ashutosh Sabharwal. "Bits About the Channel: Multiround Protocols for Two-Way Fading Channels." IEEE Transactions on Information Theory 57, no. 6 (June 2011): 3352–70. http://dx.doi.org/10.1109/tit.2011.2137090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Palacio-Baus, Kenneth S., and Natasha Devroye. "Achievable Error Exponents of One-Way and Two-Way AWGN Channels." IEEE Transactions on Information Theory 67, no. 5 (May 2021): 2693–715. http://dx.doi.org/10.1109/tit.2021.3066855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Weng, Jian-Jia, Lin Song, Fady Alajaji, and Tamas Linder. "Capacity of Two-Way Channels With Symmetry Properties." IEEE Transactions on Information Theory 65, no. 10 (October 2019): 6290–313. http://dx.doi.org/10.1109/tit.2019.2919295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cui, Tao, Tracey Ho, and Jorg Kliewer. "Memoryless relay strategies for two-way relay channels." IEEE Transactions on Communications 57, no. 10 (October 2009): 3132–43. http://dx.doi.org/10.1109/tcomm.2009.10.080222.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abbasi-Saei, Pedram, and Shahram Shahbazpanahi. "Sum-Rate Maximization for Two-Way Active Channels." IEEE Transactions on Signal Processing 64, no. 6 (March 2016): 1369–82. http://dx.doi.org/10.1109/tsp.2015.2494881.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xie, Xinqian, Mugen Peng, Bin Zhao, Wenbo Wang, and Yingbo Hua. "Maximum a Posteriori Based Channel Estimation Strategy for Two-Way Relaying Channels." IEEE Transactions on Wireless Communications 13, no. 1 (January 2014): 450–63. http://dx.doi.org/10.1109/twc.2013.120313.130864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

SUN, MAOZHU, XIANG PENG, YUJIE SHEN, and HONG GUO. "SECURITY OF A NEW TWO-WAY CONTINUOUS-VARIABLE QUANTUM KEY DISTRIBUTION PROTOCOL." International Journal of Quantum Information 10, no. 05 (August 2012): 1250059. http://dx.doi.org/10.1142/s0219749912500591.

Full text
Abstract:
The original two-way continuous-variable quantum-key-distribution (CV-QKD) protocols [S. Pirandola, S. Mancini, S. Lloyd and S. L. Braunstein, Nat. Phys. 4 (2008) 726] give the security against the collective attack on the condition of the tomography of the quantum channels. We propose a family of new two-way CV-QKD protocols and prove their security against collective entangling cloner attacks without the tomography of the quantum channels. The simulation result indicates that the new protocols maintain the same advantage as the original two-way protocols whose tolerable excess noise surpasses that of the one-way CV-QKD protocol. We also show that all sub-protocols within the family have higher secret key rate and much longer transmission distance than the one-way CV-QKD protocol for the noisy channel.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Two-way channels"

1

Zhong, Peng. "Coding schemes for the two-way relay channels." Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=110709.

Full text
Abstract:
In modern transmission networks, relay plays an important role for cooperative strategies.Several relaying strategies, such as decode-forward, compress-forward and amplify-forward,have been proposed for relay channels and networks. However, the capacity for the generalrelay channel and network is still unknown. In this thesis, we propose several relay schemesfor dierent relay models.In the rst part of the thesis, we propose novel partial decode-forward (PDF) schemesfor the two-way relay channel with direct link. Dierent from pure decode-forward, eachuser divides its message into two parts and the relay decodes only one part of each. Therelay then generates its codeword as a function of the two decoded parts and forwards tothe two users. We propose PDF schemes for both the full- and half-duplex modes. Analysisand simulation show that if for one user, the direct link is stronger than the user-to-relaylink, while for the other, the direct link is weaker, then PDF can achieve a rate regionstrictly larger than the time-shared region of pure decode-forward and direct transmissionfor both full- and half-duplex modes.The second part of the thesis is based on noisy network coding, which is recently proposedfor the general multi-source network by Lim, Kim, El Gamal and Chung. Thisscheme builds on compress-forward (CF) relaying but involves three new ideas, namely noWyner-Ziv binning, relaxed simultaneous decoding and message repetition. In this part,using the one-way and two-way relay channel as the underlining example, we analyze theimpact of each of these ideas on the achievable rate region of relay networks.In the third part of the thesis, we propose two coding schemes combining decode-forward(DF) and noisy network coding (NNC) with dierent avors. The rst is a combined DFNNCscheme for the one-way relay channel which includes both DF and NNC as specialcases by performing rate splitting, partial block Markov encoding and NNC. The secondcombines two dierent DF strategies and layered NNC for the two-way relay channel.Analysis and simulation show that both proposed schemes supersede each individual schemeand take full advantage of both DF and NNC.
Dans les reseaux de transmission modernes, les relais jouent un r^ole important dans lesstrategies cooperatives. Plusieurs strategies de relai, telles que decode-forward, compressforwardet amplify-forward, ont ete proposees pour les canaux et reseaux a relais. Cependant,la capacite du canal a relai general et de tels reseaux reste toujours inconnue. Danscette these, nous proposons plusieurs strategies de relai pour dierents modeles.Dans un premier temps, nous proposons de nouvelles strategies de decode-forward partiel(PDF) pour le canal a relai bidirectionnel avec lien direct. A la dierence du decodeforwardclassique, chaque utilisateur divise son message en deux parties, mais le relai nedecode que l'une d'entre elles pour chacun. Le relai genere alors un mot de code en fonctionde ces deux parties decodees et les transmet aux deux utilisateurs. Nous proposonsune stratgie PDF a la fois pour les liaisons half- et full-duplex. Comme le montrent lesanalyses et simulations realisees, si, pour l'un des utilisateurs, le lien direct est meilleur quele lien utilisateur-relai alors que, pour l'autre utilisateur, le lien direct est plus faible, dansce cas, la strategie PDF permet d'accro^tre strictement la region des debits atteignablespar rapport a la region atteinte par le partage de temps avec la strategie decode-forwardclassique et la transmission directe, a la fois pour les liaisons half- et full-duplex.La deuxieme partie de cette these s'interesse au codage de reseau avec bruit, qui a eteaborde recemment pour les reseaux multi-sources generiques par Lim, Kim, El Gamal etChung. Cette strategie se base sur le relayage par compress-forward (CF), mais utilise troisnouvelles idees, a savoir le binning de Wyner-Ziv, le decodage simultane moins contraignantet la repetition de message. Dans cette partie, nous prenons pour exemple les canaux arelai mono- et bidirectionnels, et nous analysons l'impact de chacune de ces idees sur laregion des debits atteignables pour les reseaux a relais.Dans la troisieme partie de cette these, nous proposons deux strategies de codage quicombinent le decode-forward (DF) et le codage de reseau avec bruit (NNC), avec dierentesnuances. La premiere est une strategie combinee DF-NNC pour le canal a relai monodirectionnel,pour laquelle DF et NNC representent des cas particuliers par partage de debit,de m^eme que lencodage partiel en bloc de Markov et NNC. La deuxieme strategie combinedeux strategies DF dierentes au codage NNC en couches pour le canal a relai bidirectionnel.Les analyses et les simulations montrent que les deux strategies proposees remplacentchaque strategie individuelle et prennent pleinement avantage des strategies DF et NNC.
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Lun. "Blind detection with unique identification in two-way relay channels." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5183.

Full text
Abstract:
This thesis considers a two-way relay system whereby two nodes exchange information via a relay node. Amplify-and-forward (AF) is applied as a relaying strategy.The channel information is not available at both receivers. The generalized likelihood ratio test (GLRT) and least squares error (LSE) detectors are derived in order to achieve blind unique recovery of the transmitted symbol. It is also proven that full diversity can be achieved. A constellation selection algorithm is designed to optimize the symbol error rate (SER) performance. This thesis also analyzes both theoretical procedures and simulation results of an existing differential detection scheme for two-way relay channels. Monte Carlo simulations demonstrate the performance of the proposed algorithm.
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science.
APA, Harvard, Vancouver, ISO, and other styles
3

Heindlmaier, Michael [Verfasser]. "Network Coding for Two-Way Relay Channels and Broadcast Erasure Channels with Feedback / Michael Heindlmaier." München : Verlag Dr. Hut, 2015. http://d-nb.info/1080754334/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Olausson, Nathalie. "Kommunikationsverksamhet i ett föränderligt samhälle : En studie om hur Gällivare kommun bör kommunicera med sin befolkning under samhällsomvandlingen." Thesis, Umeå universitet, Institutionen för kultur- och medievetenskaper, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-67934.

Full text
Abstract:
The purpose of this study is to analyze which communication strategies andinformation- and communication channels that Gällivare municipality should useunder the urban transformation to communicate with the citizens. The studyconcentrates on the age-groups 16 – 24, 25 – 44, 45 – 64 and people that are 65 yearsand older. This selection has been made as a segmentation of the citizens and is oneof the essay questions which refers to study the channels that each age-groups prefer.The study is a quantitative one and is based on a questionnaire survey directed to thecitizens and it’s 85 people who participated. The result of the survey have beenanalyzed with theories like Grunigs two-way symmetrical model, theories forcommunication in public sector and theories for the most common media channels asface-to-face communication and internet.The analysis shows that Gällivare municipality should use a communication strategythat is intended to surprise the citizens, becase the survey showed that there’s a fairlylow commitment for questions of the urban transformation. The strategy is alsouseful when the survey showed that the citizens believe that the promises in theinformation of Gällivare municipality aren’t kept, which could have resulted that theybecame passive and now they have to wake up from that state of mind. It also showsthat the age-group 16-24 years concider internet as a channel for information andsocial media as the most popular communication channel. Rest of the age-gropusprefer printed information. But the opinion for the communication channels differsbetween the group 25 – 44 years and the two others. The first mentioned considers emailas the channel they want to communicate with the municipality unlike the agegroups45 – 64 and 65 and older that prefers face-to-face communication.
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, H. "Beamforming optimization for two-way relay channel." Thesis, University College London (University of London), 2014. http://discovery.ucl.ac.uk/1421150/.

Full text
Abstract:
In this thesis, we focus on the optimization of the two-way relay channel (TWRC), which can double the data rate of communications comparing to the traditional one-way relay channel (OWRC). Because of the broadcasting nature of wireless transmissions, secure transmission is an appealing research topic. We take secrecy rate consideration into the optimization of the TWRC. Overall we provide near-optimal solutions for the secrecy rate maximization problems of the TWRC with imperfect channel state information (ICSI). A much lower complexity optimal SOCP solution is provided for SNR balancing of the TWRC without secrecy consideration. We first look at a flat fading TWRC network model with a multiple-input multiple-output (MIMO) relay where perfect channel state information (CSI) is assumed available. We then formulate an optimization problem, with the objective to minimize the relay’s power usage under the constraints that the signal-to-noise ratio (SNR) of the two transceivers should exceed a preset threshold. A low-complexity optimal beamforming solution is provided to this optimization problem by reformulating it in the form of second-order cone programming (SOCP). Later in the thesis, we consider the presence of an eavesdropper and address the beamforming optimization for minimizing the relay’s power with the constraints of the secrecy rates of the two transceivers. A semi-definite programming (SDP) based searching algorithm is proposed to find a near-optimal solution. For each search of the proposed approach, the previous non-convex optimization problem is transferred into an SDP problem, which can guarantee the optimality of the beamforming matrix. Afterwards, more realistic imperfect CSI (ICSI) situations are considered for the TWRC network models. As ICSI completely changes the structure and the property of the optimization problems, we reformulate the optimization problems into two scenarios. For the first case, we consider that the relay is an untrusted eavesdropper and in this case an SDP solution is provided to maximize the joint-decoding sum-secrecy rate. For the second case, we investigate the robust beamforming problems where the relay is trusted but there is an external eavesdropper, another SDP solution is provided to maximize the sum-secrecy rate.
APA, Harvard, Vancouver, ISO, and other styles
6

Reyneke, Annerie. "Expectations on the use of Facebook for employee engagement / Annerie Reyneke." Thesis, North-West University, 2013. http://hdl.handle.net/10394/10007.

Full text
Abstract:
In order to engage employees effectively, organisations need to practice two-way communication within a symmetrical worldview. This will encourage employees to feel valued, to participate in decision-making and contribute to obtaining organisational goals. Practising two-way communication will help to build stronger relationships between employees and managers, leading to increased employee engagement. Thus, the better the communication between managers and employees, the more engaged employees will be. Furthermore, the selection of communication channels can impact on the success of the message that is sent. Research has shown that if the inappropriate communication channel is selected when communicating with employees, the message might not be effectively received and understood. New technology, specifically Facebook can be introduced to provide an open and transparent channel for communication. Facebook can also facilitate two-way communication, which can lead to increased employee engagement. The literature study conducted informed the interview schedules that were developed and used to conduct semi-structured interviews with managers and focus group interviews with employees within two organisations in the South African financial sector. This was done in order to understand their expectations regarding the use of Facebook as an internal communication channel to enhance employee engagement. In terms of the conclusions derived from the empirical research, it seems evident that Facebook could be used as an additional internal communication channel to enhance employee engagement. Trust remains a very important factor in that managers should trust employees to use the channel in an ethical manner and employees should trust the organisation and its managers that they may voice their opinion freely, without the fear of victimisation. Facebook can be used to promote engagement on a social level to build relationships inside the organisation. However, managers and employees can together create a contract of understanding that will form the outline for a policy that will govern the use of Facebook. The parties involved can then negotiate the terms of this contract of understanding to ensure that all expectations regarding the use Facebook are met.
MA (Communication Studies), North-West University, Potchefstroom Campus, 2013
APA, Harvard, Vancouver, ISO, and other styles
7

Leijonklo, Lovisa. "Lägg märke till varumärket : En kvantitativ undersökning kring hur varumärket Hollister jobbar med kommunikation för att stärka sitt varumärke." Thesis, Umeå universitet, Institutionen för kultur- och medievetenskaper, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-85118.

Full text
Abstract:
The purpose of the case study is to research whether the brand Hollister can establish themselves to their target audience working with communication. To achieve the goal with the study, the following theories has been applied: brand building, visual communication, two-way symmetrical communication and communication channels. The study was conducted by a quantitative online questionnaire survey. The online survey was aimed at teenagers aged 15-18 years old living in Täby or Umeå where one question was "What difference can be discerned between Täby, where there is a shop, and Umeå where there is no shop". The material was collected during a period of eight days between december 11th to december 19th 2013. The online survey was answered by 90 units which means a response rate of 90 percent. The results of the study showed that it differed somewhat between the cities and above all it showed that the units from Täby had more knowledge about the brand's visual identity, and visited the store to a larger extent. The analysis also showed that branding is an important part to reach out and influence Hollister’s target audience where the work of visual communication is vital.
Syftet med studien är att undersöka om varumärket Hollister kan etablera sig hos sin målgrupp med hjälp av kommunikation. För att uppnå syftet har följande teorier tillämpats: varumärkesbyggande, visuell kommunikation, tvåvägs-symmetrisk kommunikation samt kommunikationskanaler. Studien har genomförts genom en kvantitativ enkätundersökning på webben. Webbenkäten riktade sig till tonåringar i åldern 15-18 år som bor i Täby eller Umeå då bland annat en frågeställning har varit ”Vilken skillnad går att utläsa mellan Täby, där det finns en butik, respektive Umeå där det inte finns någon butik”. Materialet samlades in under en period på åtta dagar mellan 11-19 december 2013. Webbenkäten svarades av 90 enheter vilket innebär en svarsfrekvens på 90 procent. Resultatet av studien visade att det skiljde en del mellan städerna framförallt går det att utläsa att enheterna från Täby hade mer kännedom kring varumärkets visuella identitet samt besökt butiken i större utsträckning. Analysen visade även att varumärkesbyggande är en viktig del för att nå ut och påverka sin målgrupp och bland annat att arbetet med den visuella kommunikationen är betydelsefull.
APA, Harvard, Vancouver, ISO, and other styles
8

Schedler, Stephan [Verfasser]. "Generalized Frequency Division Multiplexing in the Two-Way-Relay Channel / Stephan Schedler." Aachen : Shaker, 2016. http://d-nb.info/1120863880/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xu, Ning. "Physical-Layer Network Coding for MIMO Systems." Thesis, University of North Texas, 2011. https://digital.library.unt.edu/ark:/67531/metadc68065/.

Full text
Abstract:
The future wireless communication systems are required to meet the growing demands of reliability, bandwidth capacity, and mobility. However, as corruptions such as fading effects, thermal noise, are present in the channel, the occurrence of errors is unavoidable. Motivated by this, the work in this dissertation attempts to improve the system performance by way of exploiting schemes which statistically reduce the error rate, and in turn boost the system throughput. The network can be studied using a simplified model, the two-way relay channel, where two parties exchange messages via the assistance of a relay in between. In such scenarios, this dissertation performs theoretical analysis of the system, and derives closed-form and upper bound expressions of the error probability. These theoretical measurements are potentially helpful references for the practical system design. Additionally, several novel transmission methods including block relaying, permutation modulations for the physical-layer network coding, are proposed and discussed. Numerical simulation results are presented to support the validity of the conclusions.
APA, Harvard, Vancouver, ISO, and other styles
10

Abdallah, Saeed. "Spectrally-efficient approaches to channel estimation for amplify-and-forward two-way relay networks." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=119426.

Full text
Abstract:
Relay networks constitute one of the key technologies that are being developed for use in next generation wireless systems. In relay networks, the communication between the source and the destination is aided by dedicated nodes (relays) that convey the source's message to the destination. The use of relays improves the coverage, capacity and reliability in the network. Two-way relay networks (TWRNs) have recently been proposed to support bidirectional communication and have attracted the attention of many researchers because of their high spectral efficiency. In particular, TWRNs employing the amplify-and-forward (AF) protocol are appealing because of the minimal processing requirements at the relay. Effective operation of AF TWRNs requires accurate channel state information for self-interference cancellation and coherent decoding. The majority of works on channel estimation for AF TWRNs follow the training-based approach, which requires the transmission of pilots known to both terminals. The training-based approach consumes much needed bandwidth resources, which undermines the spectral efficiency of TWRNs. Blind channel estimation avoids the costly training burden by relying only on the received data samples. Another alternative approach is semi-blind estimation, a hybrid of blind and training-based approaches. The main objective of this thesis is to investigate blind and semi-blind channel estimation for AF TWRNs as a means for achieving substantially better tradeoffs between accuracy and spectral efficiency than possible using the training-based approach. In the first part of the thesis, we consider blind channel estimation for flat-fading channel conditions. Using the deterministic maximum likelihood (DML) approach, we propose new algorithms for blind channel estimation in AF TWRNs that employ constant-modulus signalling. Assuming M-PSK modulation, we prove that the proposed estimators are consistent and approach the true channel with high probability at high SNR. Using simulations, we show that the DML estimator offers a superior tradeoff between accuracy and spectral efficiency than the pilot-based LS estimator. Still within the context of flat-fading channels, the second part of the thesis focuses on semi-blind channel estimation. We derive the exact CRB for semi-blind channel estimation in AF TWRNs that employ square QAM. The derived bound is based on the true likelihood function that incorporates the exact statistics of the transmitted data symbols. Using the new bound, we show that the training overhead can be significantly reduced by employing semi-blind estimation. To demonstrate the achievability of these gains, we derive an expectation maximization (EM)-based semi-blind algorithm that performs very closely to the derived CRB. In the last part of the thesis, we consider semi-blind channel estimation for OFDM-based TWRNs operating in frequency selective channel conditions. To assist in the estimation of the individual channels, superimposed training is adopted at the relay. Our proposed semi-blind estimation algorithm is based on the Gaussian ML approach. We design the pilot vectors of the terminals and relay to optimize estimation performance. Our simulations show that the proposed method provides significant improvements in estimation accuracy.
Les réseaux à relais constituent l'une des technologies clé de la prochaine génération des systèmes de communication sans fil. Dans les réseaux à relais, la communication entre une source et une destination est assistée par des noeuds dédiés (ou relais) qui relayent lemessage de la source jusqu'à la destination. L'utilisation de relais améliore la couverture, la capacité et la fiabilité des réseaux. Les réseaux à relais bidirectionnels (two-way relay networks ou TWRNs) ont été récemment proposés et ont suscité l'intérêt de nombreux chercheurs à cause de leur grande efficacité spectrale. En particulier, les TWRNs utilisant le protocole de relayage amplifier-et-transférer (amplify-and-forward ou AF) sont attrayants à cause de leurs faibles exigences de traitement aux relais. Le bon fonctionnent des AF TWRNs nécessite une étape d'estimation précise du canal pour la suppression d'auto-interférence et pour le décodage cohérent. La plupart des travaux sur l'estimation du canal pour les AF TWRNs suivent l'approche basée sur l'entrainement, ce qui nécessite la transmission de pilotes connus des deux terminaux .Cette approche consomme de précieuses ressources de communication afin de transmettre les pilotes, ce qui compromet l'efficacité spectrale des TWRNs. L'estimation aveugle évite ce fardeau en se fiant seulement sur les données reçues. Une autre option est l'estimation semi-aveugle, une approche hybride de l'approche aveugle et de celle basée sur l'entrainement. L'objectif de cette thèse est d'examiner l'estimation aveugle et semi-aveugle du canal pour les AF TWRNs afin d'obtenir un meilleur compromi entre l'efficacité spectrale et la précision que que celui offert par l'approche basée sur l'entrainement. Dans la première partie de cette thèse, nous considérons l'estimation aveugle du canal pour des conditions d'évanouissement plat. Employant le principe du maximum de vraisemblance déterminée (deterministic maximum likelihood ou DML), nous proposons de nouveaux algorithmes pour l'estimation et la détection aveugle et conjointe du canal pour les AF TWRNs qui utilisent une signalisation à module constant. Supposant une modulation M-PSK, nous prouvons que les estimateurs proposés sont consistants et se rapprochent du vrai canal avec une grande probabilité lorsque le rapport signal sur bruit est élevé. En utilisant des simulations, nous montrons que le DML offre un meilleur compromis entre l'efficacité spectrale et la précision que l'estimateur LS employant des pilotes. Toujours en rapport avec l'évanouissement plat, la deuxième partie de cette thèse porte sur l'estimation semi-aveugle du canal. Nous établissons la CRB exacte pour l'estimation semi-aveugle du canal pour les AF TWRNs qui utilisent une constellation QAM carrée. Cette borne est basée sur la vraie fonction de vraisemblance qui tient compte des statistiques exactes des symboles de données transmis. En utilisant cette nouvelle borne, nous montrons que la complexité attribuable à l'entrainement peut être considérablement réduite en employant un estimation semi-aveugle. Afin de montrer que ces gains sont réalisables, nous concevons un algorithme semi-aveugle basé sur la méthode d'espérance maximisation (EM), et nous montrons que cet algorithme se rapproche tout près de la CRB. Dans la dernière partie de cette thèse, nous considérons l'estimation semi-aveugle pour les TWRNs qui sont basés sur l'OFDM et qui opèrent dans un environnement sélectif en fréquence. Pour faciliter l'estimation des canaux individuels, un entrainement superposé est adopté aux relais. L'algorithme semi-aveugle que nous proposons est basé sur le principe ML gaussien .Nous concevons des séquences pilotes pour les terminaux et pour les relais de façon à optimiser la performance de l'estimation. Nos simulations révèlent que la méthode proposée fournit une nette amélioration de la précision de l'estimation.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Two-way channels"

1

Lawrence, Amy. Ghost Channels. University Press of Mississippi, 2022. http://dx.doi.org/10.14325/mississippi/9781496838100.001.0001.

Full text
Abstract:
Between 2004 and 2019, over seventy programs dealing with the paranormal have appeared on US television. “Paranormal reality” series (as distinct from scripted programs with paranormal subjects) combine the traits of the horror genre with the documentary style of reality television. Despite being widely derided, these programs have important things to tell us about America: economic and social pressures affecting the American middle class; the perceived failure of institutions; the persistence of racial and ethnic exclusion; and the way assumptions about what it means to be a man or a woman resist change and, occasionally, give way to new possibilities. These issues are explored not only through the lens of the paranormal (encounters with ghosts, demons, and other unexplainable phenomena) but through interactions with technology. Devices ranging from consumer-grade digital cameras to specialized temperature gauges, “night-vision” infra-red cameras and EMF detectors are used to identify the presence of -- and enable communication with -- hostile or friendly spirits, thus validating the otherwise inexplicable experiences of ordinary people. Questions about technology’s reliability, its association with science and reason and its usefulness to “average” Americans, expand to include television itself as the medium is interrogated in a variety of ways.In-depth analyses of over thirty paranormal television series provide insight into the paranormal reality television genre, its development and place in cable television, and reveals the things Americans fear in the first two decades of the twenty-first century.
APA, Harvard, Vancouver, ISO, and other styles
2

Beharan, Avraham, and Rabbi Avraham Baharan. The Two-Way Channel. Distributed by Feldheim, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kockelman, Paul. Secrecy, Poetry, and Being-Free. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190636531.003.0003.

Full text
Abstract:
This chapter asks two questions: What are some of the secrets of networks? And what might constitute their poetics, an aesthetic means of revealing their secrets? It leverages the relation between codes and channels, delving into two topics that link them: degrees of freedom and secrets. By degrees of freedom is meant the number of independent dimensions needed to specify the state of a system. This chapter argues that even relatively commensurate systems, which have identical degrees of freedom, can have different secrets—understood as inherent symmetries that organize their sense-making capacities. This chapter also shows how channels as well as codes can have inherent secrets (in addition to their ability to keep and reveal secrets in more stereotypic ways). By extending the notion of poetics, it shows how such systems can be made to reveal their secrets. As will be seen, all this is a way of reinterpreting the Sapir-Whorf hypothesis (i.e., the idea that the language one speaks affects the way one thinks), such that this hypothesis can be usefully applied to media more generally (such as interfaces, algorithms, infrastructure, and networks).
APA, Harvard, Vancouver, ISO, and other styles
4

Eichengreen, Barry, Asmaa El-Ganainy, Rui Esteves, and Kris James Mitchener. In Defense of Public Debt. Oxford University PressNew York, 2021. http://dx.doi.org/10.1093/oso/9780197577899.001.0001.

Full text
Abstract:
Abstract Public debts have exploded to levels unprecedented in recent history as governments responded to the COVID-19 pandemic. These rising levels of debt prompted apocalyptic warnings about the dangers of heavy debts—about the drag they will place on economic growth and the burden they impose on future generations. This book adds the other side of the equation: drawing on history, the authors provide a defense of public debt. Their account shows that the ability of governments to borrow has played a critical role in meeting emergencies, from wars and pandemics to economic and financial crises, as well as in funding essential public goods and services such as transportation, education, and healthcare. In these ways, the capacity to issue debt has been integral to state building. Transactions in public debt securities have also contributed to developing private financial markets and, through this channel, to economic growth. None of this is to deny that debt problems, debt crises, and debt defaults occur. But these dramatic events, which attract much attention, are not the entire story. In Defense of Public Debt redresses the balance. The book develops its arguments historically, recounting two millennia of public debt experience. It deploys a comprehensive database to identify the factors behind rising public debts and the circumstances under which high debts are successfully reduced. Finally, it brings the story up to date, describing the role of public debt in managing, from 2020 onward, the COVID-19 pandemic and suggesting a way forward once governments, now more heavily indebted than before, finally emerge from the crisis.
APA, Harvard, Vancouver, ISO, and other styles
5

Miles, Simon. Engaging the Evil Empire. Cornell University Press, 2020. http://dx.doi.org/10.7591/cornell/9781501751691.001.0001.

Full text
Abstract:
In a narrative-redefining approach, this book dramatically alters how we look at the beginning of the end of the Cold War. Tracking key events in US–Soviet relations across the years between 1980 and 1985, the book shows that covert engagement gave way to overt conversation as both superpowers determined that open diplomacy was the best means of furthering their own, primarily competitive, goals. The book details the history of these dramatic years, as President Ronald Reagan consistently applied a disciplined carrot-and-stick approach, reaching out to Moscow while at the same time excoriating the Soviet system and building up US military capabilities. The received wisdom in diplomatic circles is that the beginning of the end of the Cold War came from changing policy preferences and that President Reagan, in particular, opted for a more conciliatory and less bellicose diplomatic approach. In reality, the book demonstrates, Reagan and ranking officials in the National Security Council had determined that the United States enjoyed a strategic margin of error that permitted it to engage Moscow overtly. As US grand strategy developed, so did that of the Soviet Union. This book covers five critical years of Cold War history when Soviet leaders tried to reduce tensions between the two nations in order to gain economic breathing room and, to ensure domestic political stability, prioritize expenditures on butter over those on guns. The book shifts the focus of Cold War historians away from exclusive attention on Washington by focusing on the years of back-channel communiqués and internal strategy debates in Moscow as well as Prague and East Berlin.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Two-way channels"

1

Kramer, Gerhard, and Serap Savari. "On networks of two-way channels." In Algebraic Coding Theory and Information Theory, 133–43. Providence, Rhode Island: American Mathematical Society, 2005. http://dx.doi.org/10.1090/dimacs/068/09.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmadi, Hadi, and Reihaneh Safavi-Naini. "Common Randomness and Secret Key Capacities of Two-Way Channels." In Lecture Notes in Computer Science, 76–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20728-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Zihuai. "Design of Soft Network Coding for Two-Way Relay Channels." In Design of Network Coding Schemes in Wireless Networks, 103–12. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003203803-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Bo, Zejia Shi, Hongjuan Yang, Gongliang Liu, and Xiyuan Peng. "Performance Analysis of Asymmetric Two-Way Relay Channels with Physical-Layer Network Coding." In Lecture Notes in Electrical Engineering, 287–95. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-6571-2_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tanash, Islam M., Amer M. Magableh, and Mamoun F. Al-Mistarihi. "Physical-Layer Security for DF Two-Way Full-Duplex Cooperative Wireless Networks over Rayleigh Fading Channels." In Lecture Notes in Computer Science, 270–79. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67380-6_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tanash, Islam M., Mamoun F. Al-Mistarihi, and Amer M. Magableh. "Physical-Layer Security for DF Two-Way Dual-Hop Cooperative Wireless Networks over Nakagami-m Fading Channels." In Lecture Notes in Computer Science, 258–69. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67380-6_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Bo, Wenjing Cui, Hongjuan Yang, Gongliang Liu, and Xiyuan Peng. "Combined Denoise-and-Forward and Superposition Coded Physical-Layer Network Coding in Data Length Asymmetric Two-Way Relay Channels." In Lecture Notes in Electrical Engineering, 306–14. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-6571-2_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pratt, V. "Two-way channel with disconnect." In The Analysis of Concurrent Systems, 110–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 1985. http://dx.doi.org/10.1007/3-540-16047-7_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cotronis, J. Y., and P. E. Lauer. "Two way channel with disconnect." In The Analysis of Concurrent Systems, 184–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 1985. http://dx.doi.org/10.1007/3-540-16047-7_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Shengli, Soung Chang Liew, Hui Wang, and Xiaohui Lin. "Capacity of Two-Way Relay Channel." In Access Networks, 219–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11664-3_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Two-way channels"

1

Suh, Changho, I.-Hsiang Wang, and David Tse. "Two-way interference channels." In 2012 IEEE International Symposium on Information Theory - ISIT. IEEE, 2012. http://dx.doi.org/10.1109/isit.2012.6284034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Huang, Jiun-Ting, and Young-Han Kim. "Two-Way Token Passing Channels." In 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021. http://dx.doi.org/10.1109/isit45174.2021.9518224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jaggi, S., and M. Langberg. "Two-way interference channels with jammers." In 2017 IEEE International Symposium on Information Theory (ISIT). IEEE, 2017. http://dx.doi.org/10.1109/isit.2017.8006576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yihan, Shashank Vatedka, and Sidharth Jaggi. "Quadratically Constrained Two-way Adversarial Channels." In 2020 IEEE International Symposium on Information Theory (ISIT). IEEE, 2020. http://dx.doi.org/10.1109/isit44484.2020.9174421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nam, Wooseok, Sae-Young Chung, and Yong H. Lee. "Capacity Bounds for Two-Way Relay Channels." In 2008 IEEE International Zurich Seminar on Communications (IZS). IEEE, 2008. http://dx.doi.org/10.1109/izs.2008.4497296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yilmaz, Mumtaz, and Reyat Yilmaz. "Modulation diversity in two way relay channels." In 2012 20th Signal Processing and Communications Applications Conference (SIU). IEEE, 2012. http://dx.doi.org/10.1109/siu.2012.6204622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rezazadeh, Saeed, Fady Alajaji, and Wai-Yip Chan. "Scalar Quantizer Design for Two-Way Channels." In 2019 16th Canadian Workshop on Information Theory (CWIT). IEEE, 2019. http://dx.doi.org/10.1109/cwit.2019.8929923.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xindang Lin, Runde Xu, and Guoguang Hu. "Detection for two-way relay MIMO channels." In 2012 7th International ICST Conference on Communications and Networking in China (CHINACOM 2012). IEEE, 2012. http://dx.doi.org/10.1109/chinacom.2012.6417450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Junghoon, Seyyedali Hosseinalipour, Taejoon Kim, David J. Love, and Christopher G. Brinton. "Linear Coding for Gaussian Two-Way Channels." In 2022 58th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2022. http://dx.doi.org/10.1109/allerton49937.2022.9929416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhi Chen, Pingyi Fan, and Khaled Ben Letaief. "Revisiting two-way channel: Opportunistic network coding scheduling in fading channels." In 2013 Computing, Communications and IT Applications Conference (ComComAp). IEEE, 2013. http://dx.doi.org/10.1109/comcomap.2013.6533630.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Two-way channels"

1

Kuznetsov, Victor, Vladislav Litvinenko, Egor Bykov, and Vadim Lukin. A program for determining the area of the object entering the IR sensor grid, as well as determining the dynamic characteristics. Science and Innovation Center Publishing House, April 2021. http://dx.doi.org/10.12731/bykov.0415.15042021.

Full text
Abstract:
Currently, to evaluate the dynamic characteristics of objects, quite a large number of devices are used in the form of chronographs, which consist of various optical, thermal and laser sensors. Among the problems of these devices, the following can be distinguished: the lack of recording of the received data; the inaccessibility of taking into account the trajectory of the object flying in the sensor area, as well as taking into consideration the trajectory of the object during the approach to the device frame. The signal received from the infrared sensors is recorded in a separate document in txt format, in the form of a table. When you turn to the document, data is read from the current position of the input data stream in the specified list by an argument in accordance with the given condition. As a result of reading the data, it forms an array that includes N number of columns. The array is constructed in a such way that the first column includes time values, and columns 2...N- the value of voltage . The algorithm uses cycles that perform the function of deleting array rows where there is a fact of exceeding the threshold value in more than two columns, as well as rows where the threshold level was not exceeded. The modified array is converted into two new arrays, each of which includes data from different sensor frames. An array with the coordinates of the centers of the sensor operation zones was created to apply the Pythagorean theorem in three-dimensional space, which is necessary for calculating the exact distance between the zones. The time is determined by the difference in the response of the first and second sensor frames. Knowing the path and time, we are able to calculate the exact speed of the object. For visualization, the oscillograms of each sensor channel were displayed, and a chronograph model was created. The chronograph model highlights in purple the area where the threshold has been exceeded.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography