Synchronization and channel estimation for MIMO OFDM wireless LAN systems

来源 :哈尔滨工业大学学报(英文版) | 被引量 : 0次 | 上传用户:whw123
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
A new preamble structure is designed for wireless LAN based on MIMO OFDM systems, which can be used for both synchronization and channel estimation. Modulatable orthogonal polyphase sequence is utilized in training symbol design regarding its correlation properties. The time synchronization and channel estimation are achieved by measuring the correlation between the Received training sequence and the locally generated training sequence. Repeated training symbols are used to get carrier frequency offset(CFO)estimation. It is shown from the analysis that the accuracy of frequency synchronization is close to the Cram6r-Rao lower bound.The training sequences are optimal for channel estimation based on the minimum mean square error(MMSE).
其他文献
目的:研究重组人生长激素(rhGH)联合氟尿嘧啶(5-FU)在体外对生长激素受体(GHR)不同表达状态人胃癌细胞株的影响。方法:选用GHR高表达的SGC-7901和GHR低表达的MKN-45胃癌细胞
目的 探讨应用小腿前外侧皮瓣的双重血供对可扩大皮瓣切取面积及提高旋转应用范围的可行性. 方法 在应用解剖学研究的基础上,设计以腓浅动脉和外踝上动脉为血管蒂的双重供血
目的 检测生长激素(GH)对脐血来源树突细胞(DC)的免疫表型和功能状态的影响.方法 从新鲜脐带血中分离出单核细胞,应用白细胞介素4(IL-4)和重组人粒-巨细胞集落刺激因子(rhGM-
目的 分析人类白细胞抗原(HLA)-A0201限制性的特异性CTL,研究急性肝炎急性期和慢性乙型肝炎活动期患者T淋巴细胞对特异性抗原表位免疫应答的差异.方法 收集HLA-A0201阳性的5例急性肝炎急性期和6例慢性乙型肝炎活动期患者的外周血单个核细胞(PBMC),酶联免疫斑点技术(ELISPOT)测定针对HBV聚合酶区(Pol575-583)、包膜区(Env348-357)和核心区(Core18-
目的 探讨解脲脲原体(Uu)临床株对红霉素体外耐药性与ermB耐药基因之间的关系.方法 采用微量肉汤稀释法体外测定143株临床分离的Uu对红霉素的最低抑菌浓度(MIC),以MIC≥8μg/
目的:建立复方银杏叶片的质量标准。方法:采用薄层色谱鉴别法鉴别处方中的主要成分葛根素和槲皮素;采用高效液相色谱法测定葛根素和槲皮素的含量。结果:葛根素和槲皮素的薄层
An important aim in pattern recognition is to cluster the given shapes.This paper presents a shape recognition and retrieval algorithm.The algorithm first extra
应用中巴资源卫星热红外遥感数据(CBERS-02 IRMSS)和普适性单通道算法反演福州市的地表温度.反演过程中使用同时相的MODIS数据在像元尺度上获取的大气水汽含量替换标准大气模
Wireless communication and broadcasting convergence networks provide a potential solution to greater traffic throughput in the future.In this paper,the throughp
An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, t