16th Int'l Conf. Computer and Information Technology 2014
DOI: 10.1109/iccitechn.2014.6997298
|View full text |Cite
|
Sign up to set email alerts
|

Performance of Turbo Coded Vertical Bell Laboratories Layered Space Time Multiple Input Multiple Output system

Abstract: In this paper, performance of a Turbo Code (TC) and Vertical Bell Laboratories Layered Space Time (VBLAST) encoded wireless link is evaluated in the presence of Rayleigh fading for Multiple-Input Multiple-Output (MIMO) system. Turbo encoded bits are modulated using QPSK or 16 QAM or 64 QAM modulator and modulated data are further encoded using VBLAST and then split into n streams which are simultaneously transmitted through n transmit antennas. Simulation results obtained show that coded MIMO system provides 1… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…We investigate the setting for the adversary network for the poison attack, the assumption, the first case, taken as perfect knowledge gained by the adversary on the target classifier ( P TC ) and known feature space t ( x ).The second case, is that adversaries gained the less or limited knowledge ( L TC ), target classifier. We assumed that attacker may have knowledge of features representation, but not the training dataset (Rathore et al, 2022; Poongodi, Bourouis et al, 2022; Ramesh, Lihore et al, 2022; Poongodi, Malviya, Hamdi et al, 2022; Poongodi, Malviya, Kumar et al, 2022; Poongodi, Hamdi, & Wang 2022; Poongodi et al, 2021; Ramesh, Vijayaragavan et al, 2022; Hamdi et al, 2022; Poongodi, Hamdi, Malviya et al, 2022; Kamruzzaman 2021; Hossain et al, 2022; Chen et al, 2019; Kamruzzaman 2013, 2014; Zhang et al, 2021; Hossain, Kamruzzaman et al, 2022; Sarker et al, 2021; Shi et al, 2020; Chen et al, 2020).…”
Section: Attack Modelsmentioning
confidence: 99%
“…We investigate the setting for the adversary network for the poison attack, the assumption, the first case, taken as perfect knowledge gained by the adversary on the target classifier ( P TC ) and known feature space t ( x ).The second case, is that adversaries gained the less or limited knowledge ( L TC ), target classifier. We assumed that attacker may have knowledge of features representation, but not the training dataset (Rathore et al, 2022; Poongodi, Bourouis et al, 2022; Ramesh, Lihore et al, 2022; Poongodi, Malviya, Hamdi et al, 2022; Poongodi, Malviya, Kumar et al, 2022; Poongodi, Hamdi, & Wang 2022; Poongodi et al, 2021; Ramesh, Vijayaragavan et al, 2022; Hamdi et al, 2022; Poongodi, Hamdi, Malviya et al, 2022; Kamruzzaman 2021; Hossain et al, 2022; Chen et al, 2019; Kamruzzaman 2013, 2014; Zhang et al, 2021; Hossain, Kamruzzaman et al, 2022; Sarker et al, 2021; Shi et al, 2020; Chen et al, 2020).…”
Section: Attack Modelsmentioning
confidence: 99%
“…One is transmit diversity in which different duplicates of the same transmission sequence are transmitted through different transmission antennas. One of the typical transmit diversity technique is Space Time Block Coding (STBC) [5][6][7][8] 31 transmitting multiplexing technique is Bell Labs Layered Space-Time (BLAST) [9][10][11][12]. In this paper we have used STBC to show the performance of our system.…”
Section: Introductionmentioning
confidence: 99%