Search results

Filter

Filetype

Your search for "*" yielded 532028 hits

Symbol time offset estimation in coherent OFDM systems

This paper presents a symbol time offset estimator for coherent OFDM systems. This estimator exploits both the redundancy in the cyclic prefix and the pilot symbols used for channel estimation. The estimator is robust against frequency offsets and is suitable for use in dispersive channels. We base the estimator on the ML estimator for the AWGN channel. Simulations of an example system indicate a

T-matrix computations of light scattering by red blood cells

The electromagnetic far field, as well as near field, originating from light interaction with a red blood cell (RBC) volume equivalent spheroid, were analyzed utilizing T-matrix theory. This method is a powerful tool which enables the influence of cell shape on the angular distribution of scattered light to be studied. General observations were that the three-dimensional shape, as well as optical

Making Blockbusters in Sweden: The Scandinavian vs. the Hollywood Approach

Abstract in UndeterminedMaking Blockbusters in Sweden: The Scandinavian vs. the Hollywood ApproachThe first film installment of Stieg Larsson’s Millennium trilogy, Män som hatar kvinnor (The Girl with the Dragon Tattoo, 2009) is most probably the single most successful Scandinavian feature ever in attracting audiences to the global box office. Paradoxically, however, it can be argued that the film

Thermal response testing of a multiple borehole ground heat exchanger

This paper presents the methodology, results and a discussion of thermal response tests (TRTs) performed on a multiple borehole ground heat exchanger. The ground heat exchanger consisted of nine 80-m deep boreholes. TRTs with durations between 48 and 260 h were performed on individual boreholes. Tests were analysed using common evaluation methods, and ground conductivity and borehole resistance va

Theoretical analysis of a correlation attack based on convolutional codes

The authors consider a binary synchronous stream cipher where a correlation has been identified between the keystream sequence and the output from one of the linear feedback shift registers (LFSR). They present a theoretical analysis of their recent algorithm for fast correlation attacks, based on the use of convolutional codes (see Advances in Cryptology - EUROCRYPT'99, Lecture Notes in Computer