2009
DOI: 10.1049/iet-com.2009.0038
|View full text |Cite
|
Sign up to set email alerts
|

Simple and robust analytically derived variable step-size least mean squares algorithm for channel estimation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…The evaluation of the inner products X(n)W(n) requires N complex multiplication and N complex additions for each iteration [3]. The multiplying the scalar by a vector requires N complex multiplications.…”
Section: Performance Analysis a Computational Complexitymentioning
confidence: 99%
See 1 more Smart Citation
“…The evaluation of the inner products X(n)W(n) requires N complex multiplication and N complex additions for each iteration [3]. The multiplying the scalar by a vector requires N complex multiplications.…”
Section: Performance Analysis a Computational Complexitymentioning
confidence: 99%
“…Least square (LS) [12,17], Least mean square (LMS) [10], normalized NLMS [15], variable step size LMS(VSS-LMS) [3,4] Recursive least square (RLS), Kalman filter, leaky least mean square [16]variable leaky LMS [1] orthogonal Frequency response filtering are some of the well known techniques. At the same time soft computing approaches such as fuzzy logic, neural network, genetic algorithm and simulated annealing [6] have also been used for channel estimation.…”
Section: Introductionmentioning
confidence: 99%
“…After identifying an available vulnerability, the imposed attack strategy described here provides an unwittingly 1-dB augmentation for all elements into the SNR adaptive modulation interval-for instance, the evaluated SNR interval for SNR av = 20 dB is L Average spectral efficiency (bps/Hz) 10 15 20 25 Average SNR (dB)…”
Section: Radio Control Attackmentioning
confidence: 99%
“…An example of hardware implementation vulnerability is the introduction of hardware trojans [8] during chip fabrication. Vulnerabilities related to the supply chain [9], like device cloning [10], are also included in this subclass.…”
Section: Introductionmentioning
confidence: 99%
“…are reported in the literature for power quality improvement in grid-tied PV systems. Apart from the conventional control schemes, adaptive filtering techniques [17][18][19][20][21][22][23] such as recursive least square (RLS) [17], least mean fourth (LMF) [18], variable step size LMS [19], filtered-x LMS algorithm [20] etc., have also been employed in the design of grid-tied PV systems because these algorithms are capable of tracking changes and characteristics of the unknown system. The LMS and LMF algorithms suffer from the problem of drifting [24].…”
Section: Introductionmentioning
confidence: 99%