Tight Bounds on SINR with ZFBF and Feedback
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 5, Issue 4
Abstract
The concept of Multiple Input Multiple Output (MIMO) is an advanced one in the field of wireless communications. The main objective behind the MIMO is providing high data rates to multiple users at a time. MIMO also aims to provide maximum channel gain, high degree of multiplexing, robust data rate and multi user diversity etc. however all these are effectively achieved by using the Channel State Information at Transmitter (CSIT). CSIT is the feedback information of the channel from the end users to the transmitter. Therefore multiple users are sending back the information at a same time, which causes the interference among the entire feedback channels and effectively degrades the SINR (Signal to Interference plus Noise Ratio). Therefore to address this problem we provide a systematic approach to derive bounds on the SINR to avoid the problem of interference, by assuming transmitter using zero forcing beam forming, and all the users are assumed to be orthogonal to each other
Authors and Affiliations
Burra Rekha , Sanjay Madupu
Locate Misplaced Objects! GPS-GSM-Bluetooth Enabled Tracking
Every house has had a history of searching for keys, pen-drives, wallets and hand-purses and it is such a tedious job, especially, when they are of utmost need. To reduce the hectic searching effort and time spent, a sys...
A Support Vector Machine and Information Gain based Classification Framework for Diabetic Retinopathy Images
Image mining is the process of applying data analysis and discovery algorithms over large volume of image data. It has especially become popular in the fields of forensic sciences, fraud analysis and health care, for it...
Information Extraction using Incremental Approach
Data mining is playing vital role in text extraction as now a day’s large amount of data available in scientific research, biomedical literature and web data. Data retrieval using existing approaches use sequential appro...
Aligning Cloud Computing Security with Business Strategy
These days, the technological growth in the IT sector is rapid. Cloud computing is also one of the new technologies that have both benefits and limitations. This paper gives an overview of how cloud computing can be help...
Categorical Heuristic for Attribute Based Encryption in the Cloud Server
Attribute-based encryption (ABE) is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted...