{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:26:18Z","timestamp":1725470778231},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540459071"},{"type":"electronic","value":"9783540459095"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11881223_49","type":"book-chapter","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T11:45:14Z","timestamp":1158925514000},"page":"402-411","source":"Crossref","is-referenced-by-count":0,"title":["Clonal Selection Detection Algorithm for the V-BLAST System"],"prefix":"10.1007","author":[{"given":"Caihong","family":"Mu","sequence":"first","affiliation":[]},{"given":"Mingming","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"49_CR1","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1023\/A:1008889222784","volume":"6","author":"G.J. Foschini","year":"1998","unstructured":"Foschini, G.J., Gans, M.J.: On limits of wireless communications in a fading environment when using multiple antenna. Wireless personal communications\u00a06(3), 311\u2013335 (1998)","journal-title":"Wireless personal communications"},{"key":"49_CR2","unstructured":"Chuah, C.-N., Foschini, G.J., et al.: Capacity growth of multi-element arrays in door and outdoor wireless channels. In: Proc of IEEE WCN 2000, Chicago, USA (2003)"},{"issue":"4","key":"49_CR3","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1109\/18.761255","volume":"45","author":"V. Tarokh","year":"1999","unstructured":"Tarokh, V., Naguib, A., Seshadri, N.: Combined array processing and space-time coding. IEEE Trans. Inform. Theory\u00a045(4), 1121\u20131128 (1999)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"2","key":"49_CR4","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1002\/bltj.2015","volume":"1","author":"G.J. Foschini","year":"1996","unstructured":"Foschini, G.J.: Layered Space-time Architecture for Wireless Communication in a Fading Environment when Using Multi-element Antennas. Bell Labs Technical Journal\u00a01(2), 41\u201359 (1996)","journal-title":"Bell Labs Technical Journal"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Wolniansky, P.W., Foschini, G.J., Golden, G. D., Valenzuela, R.A.: V-BLAST: An architecture for realizing very high data rates over the rich-scattering wireless channel. In: Proc. URSI Int. Symp. Signal, Systems, and Electronics, Pisa, Italy (1998)","DOI":"10.1109\/ISSSE.1998.738086"},{"key":"49_CR6","doi-asserted-by":"crossref","unstructured":"Adjoudani, A., Beck, E.C., Burg, A.P., et al.: Prototype experience for MIMO BLAST over third-generation wireless system. IEEE Journal on Selected Areas in Communications, 440\u2013451 (2003)","DOI":"10.1109\/JSAC.2003.809724"},{"issue":"1","key":"49_CR7","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1049\/el:19990058","volume":"45","author":"G.D. Golden","year":"1999","unstructured":"Golden, G.D., Foschini, C.J., Valenzuela, R.A., Wolniansky, P.W.: Detection algorithm and initial laboratory results using V-BLAST space-time communication architecture. Electronics Letters\u00a045(1), 14\u201316 (1999)","journal-title":"Electronics Letters"},{"key":"49_CR8","doi-asserted-by":"crossref","unstructured":"Bhargave, A., de Figueiredo, R.J.P., Eltoft, T.: A detection algorithm for the V-BLAST system. In: IEEE Global Telecommunications Conference, pp. 494\u2013498 (2001)","DOI":"10.1109\/GLOCOM.2001.965166"},{"key":"49_CR9","unstructured":"De Castro, L.N., et al.: The Clonal Selection Algorithm with Engineering Applications. In: Proc. of GECCO 2000, Workshop on Artificial Immune Systems and Their Applications, pp. 36\u201337 (2000)"},{"key":"49_CR10","unstructured":"Kim, J., et al.: Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator. In: Proceedings of the 2001 Congress on Evolutionary Computation, pp. 1244\u20131252 (2001)"},{"key":"49_CR11","unstructured":"Kim, J., Bentley, P.J.: Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator. In: Proceedings of the 2001 Congress on Evolutionary Computation, pp. 1244\u20131252 (2001)"},{"key":"49_CR12","unstructured":"Du, H., Jiao, L., Wang, S.: Clonal Operator and Antibody Clone Algorithms. In: Proceedings of the First International Conference on Machine Learning and Cybernetics, Beijing, November 4-5, 2002, pp. 506\u2013510 (2002)"},{"key":"49_CR13","unstructured":"Du, H., Jiao, L., Gong, M.: Immune Memorizing Clonal Programming Algorithm. In: Proceedings of the Thirteenth Chinese Conference on Neural Network (2003)"},{"key":"49_CR14","unstructured":"Du, H., Jiao, L., Gong, M.: Immune Clonal Selection Algorithm and Evolutionary Algorithm. In: Proceedings of the Tenth Annual Science Seminar of Chinese Conference on Artificial Intelligence (2003)"},{"key":"49_CR15","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.1007\/978-3-540-30549-1_126","volume-title":"AI 2004: Advances in Artificial Intelligence","author":"M. Gong","year":"2004","unstructured":"Gong, M., Du, H., Jiao, L., Wang, L.: Immune clonal selection algorithm for multiuser detection in DS-CDMA systems. In: Webb, G.I., Yu, X. (eds.) AI 2004. LNCS (LNAI), vol.\u00a03339, pp. 1219\u20131225. Springer, Heidelberg (2004)"},{"key":"49_CR16","first-page":"310","volume-title":"Wireless Communications and Networking Conference, WCNC","author":"W.K. Wai","year":"2000","unstructured":"Wai, W.K., Tsui, C.-Y., Cheng, R.S.: A low complexity architecture of the V-BLAST system. In: Wireless Communications and Networking Conference, WCNC, vol.\u00a01, pp. 310\u2013314. IEEE, Los Alamitos (2000)"},{"key":"49_CR17","unstructured":"Wang, X., Cao, L.: Genetic Algorithm - Theoretical Application and Software Implement. Xi\u2019an Jiao Tong University Press (2002) (in chinese)"}],"container-title":["Lecture Notes in Computer Science","Advances in Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11881223_49.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:28:51Z","timestamp":1619494131000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11881223_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540459071","9783540459095"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11881223_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}