The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2023
DOI: 10.1002/dac.5436
|View full text |Cite
|
Sign up to set email alerts
|

A new optimized least‐square sparse channel estimation scheme for underwater acoustic communication

Abstract: Summary In underwater acoustic (UWA) communication, orthogonal frequency division multiplexing (OFDM) is a promising technology that is highly essential to get channel state information meant for channel estimation (CE). Nevertheless, higher complexity, slower convergence, and poor performance, which degrade the performance estimation, are the limitations of the traditional CE methodologies. Thus, by amalgamating the least square (LS)‐CE algorithm along with polynomial interpolated black widow optimization (PI… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 42 publications
0
1
0
Order By: Relevance
“…However, this method often faces high complexity when training with larger signals. Kumar et al 33 established the extended CE technology for UWAC‐OFDM systems. This paper introduced the least squares (LS) based CE technique to estimate the channel effectively.…”
Section: Related Workmentioning
confidence: 99%
“…However, this method often faces high complexity when training with larger signals. Kumar et al 33 established the extended CE technology for UWAC‐OFDM systems. This paper introduced the least squares (LS) based CE technique to estimate the channel effectively.…”
Section: Related Workmentioning
confidence: 99%
“…In UASNs, the predetermined MAC protocols like TDMA, FDMA, or CDMA cannot be adopted because of limited bandwidth, high delay in propagation, complexity in lock synchronization, etc. Vector Base Forwarding (VBF) and its enhanced routing protocols (5,6) are devised only for the network layer. In such environments, security in conventional UASNs is not considered.…”
Section: Introductionmentioning
confidence: 99%