6,067 research outputs found

    A probabilistic method for blind multiuser detection using array observations

    Get PDF
    In this paper, a blind algorithm for detecting active users in a DS-CDMA system is presented. This probabilistic algorithm relies on the theory of hidden Markov models (HMM) and is completely blind in the sense that no knowledge of the signature sequences, channel state information or training sequences is required for any user. Additionally, observation through an array of sensors is also considered. Performance is verified via computer simulations, showing the near-far resistance of the analyzed procedure.Peer ReviewedPostprint (published version

    A Comparison of Clustering Techniques for Malware Analysis

    Get PDF
    In this research, we apply clustering techniques to the malware detection problem. Our goal is to classify malware as part of a fully automated detection strategy. We compute clusters using the well-known �-means and EM clustering algorithms, with scores obtained from Hidden Markov Models (HMM). The previous work in this area consists of using HMM and �-means clustering technique to achieve the same. The current effort aims to extend it to use EM clustering technique for detection and also compare this technique with the �-means clustering

    Application of hidden markov models to blind channel estimation and data detection in a gsm environment

    Get PDF
    In this paper, we present an algorithm based on the Hidden Markov Models (HMM) theory to solve the problem of blind channel estimation and sequence detection in mobile digital communications. The environment in which the algorithm is tested is the Paneuropean Mobile Radio System, also known as GSM. In this system, a large part in each burst is devoted to allocate a training sequence used to obtain a channel estimate. The algorithm presented would not require this sequence, and that would imply an increase of the system capacity. Performance, evaluated for standard test channels, is close to that of non-blind algorithms.Peer ReviewedPostprint (published version
    • …
    corecore