期刊文献+
共找到1,768篇文章
< 1 2 89 >
每页显示 20 50 100
Design Framework of Unsourced Multiple Access for 6G Massive IoT
1
作者 Chunlin Yan Siying Lyu +2 位作者 Sen Wang Yuhong Huang Xiaodong Xu 《China Communications》 SCIE CSCD 2024年第1期1-12,共12页
In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical s... In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical solutions.A rather complete design of unsourced multiple access is proposed in which two key parts:a compressed sensing module for active user detection,and a sparse interleaver-division multiple access(SIDMA)module are simulated side by side on a same platform at balanced signal to noise ratio(SNR)operating points.With a proper combination of compressed sensing matrix,a convolutional encoder,receiver algorithms,the simulated performance results appear superior to the state-of-the-art benchmark,yet with relatively less complicated processing. 展开更多
关键词 channel coding compressed sensing massive Internet-of-Things(IoT) sparse interleaverdivision multiple access(SIDMA) the sixth generation(6G)mobile communications unsourced multiple access
下载PDF
Analysis and Simulation for Capacity of Time Division-Synchronous Code Division Multiple Access System 被引量:1
2
作者 Sun Chengjun, Zhang Zhongzhao, Ba Yong2 & Cao Pengzhi (Communication Research ("enter, Harbin Institute of Technology, Harbin 150001, P. R. China Department of Electronic Engineering, Tsinghua University, Beijing 100084, P. R. China Research and Development Division, Shanghai Bell Company Limited, Shanghai 200092, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2002年第4期91-97,共7页
Capcity both in uplink and downlink of TD-SCDMA (time division-synchronous code division multiple access) system is studied in a multi-cell environment. The theoretical expressions of the mean of intercell interferenc... Capcity both in uplink and downlink of TD-SCDMA (time division-synchronous code division multiple access) system is studied in a multi-cell environment. The theoretical expressions of the mean of intercell interference in uplink and the mean of sum of power allocation in downlink are given, by which uplink and downlink capacity is analyzed. Furthermore, we give the simulation models for both uplink and downlink capacity. The results from theoretical analysis and simulation fit very well. In the end, the maximum number of users that TD-SCDMA system can serve for 12.2 k speech service is given. 展开更多
关键词 code division multiple access PROBABILITY Resource allocation SIMULATION Time division multiple access
下载PDF
Orthogonal Codes-Based Dynamic Spectrum Access in Cognitive Radio Networks 被引量:1
3
作者 Ehab F.Badran Amr A.Bashir +1 位作者 Amira I.Zaki Waleed K.Badawi 《China Communications》 SCIE CSCD 2019年第12期34-46,共13页
Dynamic spectrum access(DSA) in cognitive radio(CR) networks became a challenging research area recently. In CR technology, the DSA between primary users(PUs) and secondary users(SUs) simultaneously can be achieved wi... Dynamic spectrum access(DSA) in cognitive radio(CR) networks became a challenging research area recently. In CR technology, the DSA between primary users(PUs) and secondary users(SUs) simultaneously can be achieved without degrading the performance of the PUs by SUs interference. This can be achieved by donating incentive power to the PUs in order to compensate the interference caused by the SUs. Consequently, PUs allow SUs to share the spectrum. In this paper, orthogonal codes-based dynamic spectrum access(OC-DSA) technique is proposed. OC-DSA technique employs orthogonality between PUs and SUs transmitted data symbols in addition to the incentive power donation. Compared to other techniques, the proposed technique uses a simple encoder at the SU network for the same PU network infrastructure. By applying orthogonal codes, the interference caused by SUs is canceled and hence the donated power to incentivize the PUs is reduced. Also, the SU packet rate is increased significantly. The simulation results show that the proposed technique provides effective improvements over other existing techniques in the signal strength and the bit error rate performance of both the PU network and the SU network at the receiver side. Moreover, the proposed technique requires less donated power to incentivize the PU and has higher packet rate. 展开更多
关键词 cognitive radio dynamic spectrum access orthogonal codes
下载PDF
Secure Transmission in Downlink Non-Orthogonal Multiple Access Based on Polar Codes 被引量:1
4
作者 Ce Sun Zesong Fei +3 位作者 Bin Li Xinyi Wang Nan Li Lijie Hu 《China Communications》 SCIE CSCD 2021年第9期221-235,共15页
Non-orthogonal multiple access(NOMA)is deemed to have a superior spectral efficiency and polar codes have became the channel coding scheme for control channel of enhanced mobile broadband(eMBB)in the fifth generation(... Non-orthogonal multiple access(NOMA)is deemed to have a superior spectral efficiency and polar codes have became the channel coding scheme for control channel of enhanced mobile broadband(eMBB)in the fifth generation(5G)communication systems.In this paper,NOMA combined with polar codes is used to achieve secure transmission.Both degraded wiretap channel and non-degraded wiretap channel are considered,where an eavesdropper intercepts the communication between base station(BS)and users.For the degraded wiretap channel scenario,a secure polar encoding scheme is proposed in NOMA systems with power allocation to achieve the maximum secrecy capacity.With regard to the nondegraded wiretap channel,a polar encoding scheme with multiple-input-single-output(MISO)system is proposed,where artificial noise is generated at BS to confuse the eavesdropper’s channel via transmit beamforming.The security and the secure rate are employed respectively in order to measure the secrecy performance.We prove that the proposed schemes for each scenario can achieve the secure rate and can transmit the signal securely and reliably.The simulation results show that the eavesdropper hardly decoding the secure signal when the legitimate receiver can decode the signal with very low block error rate(BLER). 展开更多
关键词 physical layer security polar codes non-orthogonal multiple access artificial noise
下载PDF
Medium Access Control: A Physical Layer Network- Coded Approach 被引量:2
5
作者 ZHANG Yu XIONG Ke DU Liping 《China Communications》 SCIE CSCD 2014年第A02期1-11,共11页
关键词 介质访问控制 编码方法 物理层 层网络 MAC系统 平均延时 通信系统 吞吐量
下载PDF
Polar Coded Iterative Multiuser Detection for Sparse Code Multiple Access System 被引量:1
6
作者 Hang MU Youhua Tang +3 位作者 Li Li Zheng Ma Pingzhi Fan Weiqiang Xu 《China Communications》 SCIE CSCD 2018年第11期51-61,共11页
Polar coded sparse code multiple access(SCMA) system is conceived in this paper. A simple but new iterative multiuser detection framework is proposed, which consists of a message passing algorithm(MPA) based multiuser... Polar coded sparse code multiple access(SCMA) system is conceived in this paper. A simple but new iterative multiuser detection framework is proposed, which consists of a message passing algorithm(MPA) based multiuser detector and a soft-input soft-output(SISO) successive cancellation(SC) polar decoder. In particular, the SISO polar decoding process is realized by a specifically designed soft re-encoder, which is concatenated to the original SC decoder. This soft re-encoder is capable of reconstructing the soft information of the entire polar codeword based on previously detected log-likelihood ratios(LLRs) of information bits. Benefiting from the soft re-encoding algorithm, the resultant iterative detection strategy is able to obtain a salient coding gain. Our simulation results demonstrate that significant improvement in error performance is achieved by the proposed polar-coded SCMA in additive white Gaussian noise(AWGN) channels, where the performance of the conventional SISO belief propagation(BP) polar decoder aided SCMA, the turbo coded SCMA and the low-density parity-check(LDPC) coded SCMA are employed as benchmarks. 展开更多
关键词 存取系统 编码器 多用户 代码 多重 GAUSSIAN SISO 译码过程
下载PDF
Robustness self-testing of states and measurements in the prepare-and-measure scenario with 3 → 1 random access code
7
作者 魏士慧 郭奋卓 +1 位作者 李新慧 温巧燕 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第7期144-151,共8页
Recently, Tavakoli et al.proposed a self-testing scheme in the prepare-and-measure scenario, showing that self-testing is not necessarily based on entanglement and violation of a Bell inequality [Phys.Rev.A 98 062307(... Recently, Tavakoli et al.proposed a self-testing scheme in the prepare-and-measure scenario, showing that self-testing is not necessarily based on entanglement and violation of a Bell inequality [Phys.Rev.A 98 062307(2018)].They realized the self-testing of preparations and measurements in an N → 1(N ≥ 2) random access code(RAC), and provided robustness bounds in a 2 → 1 RAC.Since all N → 1 RACs with shared randomness are combinations of 2 → 1 and 3 → 1 RACs, the3 → 1 RAC is just as important as the 2 → 1 RAC.In this paper, we find a set of preparations and measurements in the3 → 1 RAC, and use them to complete the robustness self-testing analysis in the prepare-and-measure scenario.The method is robust to small but inevitable experimental errors. 展开更多
关键词 ROBUSTNESS SELF-TESTING prepare-and-measure SCENARIO 3 1 random access code
下载PDF
Performance analysis of quantum access network using code division multiple access model
8
作者 胡林曦 杨灿 何广强 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第6期37-41,共5页
A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of ... A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of the code. Recently,the chaotic phase shifters were proposed to guarantee the orthogonality by different chaotic signals and spread the spectral content of the quantum states. In this letter, we propose to implement the code division multiple access quantum network by using chaotic phase shifters and synchronization. Due to the orthogonality of the different chaotic phase shifter, every pair of users can faithfully transmit quantum information through a common channel and have little crosstalk between different users. Meanwhile, the broadband spectra of chaotic signals efficiently help the quantum states to defend against channel loss and noise. 展开更多
关键词 quantum access network chaotic phase shifter code division multiple access
下载PDF
A NEW DECODER OF SYNCHRONOUS OPTICAL CODE DIVISION MULTIPLE ACCESS SYSTEMS USING SEGMENTED CORRELATION
9
作者 Li Ou Wu Jiangxing Lan Julong(National Digital Switching System Engineering & Technology Research Center, Zhengzhou 450002) 《Journal of Electronics(China)》 2001年第2期135-139,共5页
A new segmented correlating decoder of synchronous optical CDMA using modified prime sequence codes is proposed. The performance of the proposed system is analyzed under the assumption of Poisson shot noise model for ... A new segmented correlating decoder of synchronous optical CDMA using modified prime sequence codes is proposed. The performance of the proposed system is analyzed under the assumption of Poisson shot noise model for the receiver photodetector. The decoder technique is shown to be more effective to improve the bit error probability performance than the method using an optical hard-limiter. 展开更多
关键词 SYNCHRONOUS optical CDMA PRIME codeS Multiple access system SEGMENTED CORRELATION
下载PDF
Joint power control based on service factor for code division multiple access system
10
作者 陈波 戎蒙恬 胡威 《Journal of Shanghai University(English Edition)》 CAS 2008年第5期414-418,共5页
An important feature of the traffic in mobile networks is burstiness. Drawbacks of conventional power control algorithms for time division duplex (TDD)-code division multiple access (CDMA) systems are analyzed. A ... An important feature of the traffic in mobile networks is burstiness. Drawbacks of conventional power control algorithms for time division duplex (TDD)-code division multiple access (CDMA) systems are analyzed. A joint power control algorithm based on service factor is presented to address the TDD-CDMA mobile services in the burst mode according to the Markov modulated Bernoulli process. The joint power control equation is derived. A function model is developed to verify the new algorithm and evaluate its performance. Simulation results show that the new power control algorithm can estimate interference strength more precisely, speed up convergence of power control, and enhance power efficiency and system capacity. It is shown that the proposed algorithm is more robust against link gain changes, and outperforms the reference algorithms. 展开更多
关键词 code division multiple access (CDMA) time division duplex (TDD) power control Markov process service factor
下载PDF
Self-Encoded Multiple Access Multiuser Convolutional Codes in Uplink and Downlink Cellular Systems
11
作者 Jong Hak JUNG Won Mee JANG Lim NGUYEN 《International Journal of Communications, Network and System Sciences》 2009年第4期249-257,共9页
Self-encoded spread spectrum eliminates the need for traditional pseudo noise (PN) code generators. In a self-encoded multiple access (SEMA) system, the number of users is not limited by the number of available sequen... Self-encoded spread spectrum eliminates the need for traditional pseudo noise (PN) code generators. In a self-encoded multiple access (SEMA) system, the number of users is not limited by the number of available sequences, unlike code division multiple access (CDMA) systems that employ PN codes such as m-, Gold or Kassami sequences. SEMA provides a convenient way of supporting multi-rate, multi-level grades of service in multimedia communications and prioritized heterogeneous networking systems. In this paper, we propose multiuser convolutional channel coding in SEMA that provides fewer cross-correlations among users and thereby reducing multiple access interference (MAI). We analyze SEMA multiuser convolutional coding in additive white Gaussian noise (AWGN) channels as well as fading channels. Our analysis includes downlink synchronous system as well as asynchronous system such as uplink mobile-to-base station communication. 展开更多
关键词 SPREAD SPECTRUM Self-Encoded Multiple access MULTIUSER Convolutional CODING MULTIUSER Detection
下载PDF
Performance Analysis of Multiple User Optical Code Division Multiple Access
12
作者 Himanshu Monga R. S. Kaler 《Optics and Photonics Journal》 2014年第2期21-25,共5页
In this paper, we discuss and analyze an optical code division multiple access for multiple user system. Media access control implementation has been considered. For fulfilling the huge need of bandwidth services, tec... In this paper, we discuss and analyze an optical code division multiple access for multiple user system. Media access control implementation has been considered. For fulfilling the huge need of bandwidth services, technology tends to move to optical networks and three major optical systems come into existence. Code division of the optical network is most used and real concept interacted with users up to this time. Optical code division multiple access provides complete spectrum to each and every user for the time of accessing the channel. In the paper, we have proposed network architecture with optical encoder and decoder along with optical code translator which is supporting multiple user systems. We integrate the code translator with encoding and decoding of optical code to use the optical network at full extent and present the simulation validation results of 6 Gb/s 3-hop transmission by use of proposed architecture. Further, we have implemented experimentation with 6 users 3 Gb/s optical code division multiple access network. Through simulation structure, it is shown that the combination of encoding with EDFA in multiple user environment system provides improvement in bit error rate and also improves the multiple access interference. With increase of users in the network, MAI value increases and our proposed scheme controls interference in the network. 展开更多
关键词 OPTICAL code DIVISION MULTIPLE access Strong INTERFERENCE Weak INTERFERENCE Bit Error Rate OPTICAL Encoding Laser DIODE Source MULTIPLE access INTERFERENCE
下载PDF
Sparse Code Multiple Access-Towards Massive Connectivity and Low Latency 5G Communications 被引量:3
13
作者 Lei Wang Xiuqiang Xu +2 位作者 Yiqun Wu Shuangshuang Xing Yan Chen 《电信网技术》 2015年第5期6-15,共10页
Sparse code multiple access(SCMA) is a novel non-orthogonal multiple access technology considered as a key component in 5G air interface design. In SCMA, the incoming bits are directly mapped to multi-dimensional cons... Sparse code multiple access(SCMA) is a novel non-orthogonal multiple access technology considered as a key component in 5G air interface design. In SCMA, the incoming bits are directly mapped to multi-dimensional constellation vectors known as SCMA codewords, which are then mapped onto blocks of physical resource elements in a sparse manner. The number of codewords that can be non-orthogonally multiplexed in each SCMA block is much larger than the number of resource elements therein, so the system is overloaded and can support larger number of users. The joint optimization of multi-dimensional modulation and low density spreading in SCMA codebook design ensures the SCMA receiver to recover the coded bits with high reliability and low complexity. The flexibility in design and the robustness in performance further prove SCMA to be a promising technology to meet the 5G communication demands such as massive connectivity and low latency transmissions. 展开更多
关键词 SCMA 电信技术 多址接入 编码
下载PDF
A multiple copyright identification watermarking algorithm based on code division multiple access
14
作者 张帆 li Jie +1 位作者 Su Yuting Zhang Chuntian 《High Technology Letters》 EI CAS 2008年第4期377-383,共7页
A multiple watermarking algorithm is presented according to the multiple accessing technique of thecode division multiple access (CDMA) system.Multiple watermarks are embedded into digital images inthe wavelet transfo... A multiple watermarking algorithm is presented according to the multiple accessing technique of thecode division multiple access (CDMA) system.Multiple watermarks are embedded into digital images inthe wavelet transform domain.Each of the watermarks is embedded and extracted independently withoutimpacts to each other.Multiple watermarks are convolution encoded and block interleaved,and the or-thogonal Gold sequences are used to spread spectrum of the copyright messages.CDMA encoded water-mark messages are embedded into the wavelet sub-bands excluding the wavelet HH1 sub-bands.The em-bedment amplitude is decided by Watson's perceptual model of wavelet transform domain,and the em-bedment position in the selected wavelet sub-bands is decided randomly by a pseudo-random noise (PN)sequence.As a blind watermarking algorithm,watermarks are extracted without original image.The wa-termarking capacity of proposed algorithm is also discussed.When two watermarks are embedded in animage at the same time,the capacity is larger than the capacity when a single watermark is embedded,and is smaller than the sum of the capacity of two separately embedded watermarks.Experimental resultsshow that the proposed algorithm improves the detection bits error rate (BER) observably,and the multi-pie watermarks have a preferable robustness and invisibility. 展开更多
关键词 CDMA 水印 编码技术 通讯技术
下载PDF
Reservation-based dynamic admission control scheme for wideband code division multiple access systems
15
作者 A.Y.Al-nahari S.A.El-Dolil +1 位作者 M.I.Dessouky F.E.Abd El-Samie 《Journal of Central South University》 SCIE EI CAS 2012年第2期393-401,共9页
Call admission control (CAC) and resource reservation (RR) for mobile communication are two important factors that guarantee system efficiency and quality of service (QoS) required for different services in a very sca... Call admission control (CAC) and resource reservation (RR) for mobile communication are two important factors that guarantee system efficiency and quality of service (QoS) required for different services in a very scarce resource as the radio spectrum. A new scheme was proposed which extends the concepts of resource sharing and reservations for wideband code division multiple access (WCDMA) systems with a unique feature of soft capacity. Voice and data traffic were considered. The traffic is further classified into handoff and new requests. The reservation thresholds were dynamically adjusted according to the traffic pattern and mobility prediction in order to achieve the maximum channel utilization, while guaranteeing different QoS constraints. The performance of proposed scheme was evaluated using Markov models. New call blocking probability, handoff call dropping probability, and channel utilization were used as benchmarks for the proposed scheme. 展开更多
关键词 宽带码分多址系统 控制方案 QOS约束 呼叫准入控制 码分多址接入 马尔可夫模型 呼叫阻塞概率 服务质量
下载PDF
Secret Sharing Schemes Based on the Dual Code of the Code of a Symmetric (v, k, λ)-Design and Minimal Access Sets
16
作者 Selda Calkavur 《Computer Technology and Application》 2015年第2期95-100,共6页
关键词 秘密共享方案 对称密码 设计 对偶码 秘密分享 编码理论 线性码 不对称
下载PDF
A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access
17
作者 Si-Si Liu Yue Xiao Qing-Song Wen Shao-Qian Li 《Journal of Electronic Science and Technology of China》 2007年第2期102-106,共5页
This paper investigates a peak to average power ratio (PAPR) reduction method in multicarrier code division multiple access (MC-CDMA) system. Variable code sets (VCS), a spreading codes selection scheme, can imp... This paper investigates a peak to average power ratio (PAPR) reduction method in multicarrier code division multiple access (MC-CDMA) system. Variable code sets (VCS), a spreading codes selection scheme, can improve the PAPR property of the MC-CDMA signals, but this technique requires an exhaustive search over the combinations of spreading code sets. It is observed that when the number of active users increases, the search complexity will increase exponentially. Based on this fact, we propose a low complexity VCS (LC-VCS) method to reduce the computational complexity. The basic idea of LC-VCS is to derive new signals using the relationship between candidature signals. Simulation results show that the proposed approach can reduce PAPR with lower comtational pucomplexity. In addition, it can be blindly received without any side information. 展开更多
关键词 Low complexity variable code sets multicarrier code division multiple access (MC-CDMA) peak to average power ratio variable code sets.
下载PDF
Hybrid Deep Learning-Based Adaptive Multiple Access Schemes Underwater Wireless Networks
18
作者 D.Anitha R.A.Karthika 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2463-2477,共15页
Achieving sound communication systems in Under Water Acoustic(UWA)environment remains challenging for researchers.The communication scheme is complex since these acoustic channels exhibit uneven characteristics such a... Achieving sound communication systems in Under Water Acoustic(UWA)environment remains challenging for researchers.The communication scheme is complex since these acoustic channels exhibit uneven characteristics such as long propagation delay and irregular Doppler shifts.The development of machine and deep learning algorithms has reduced the burden of achieving reli-able and good communication schemes in the underwater acoustic environment.This paper proposes a novel intelligent selection method between the different modulation schemes such as Code Division Multiple Access(CDMA),Time Divi-sion Multiple Access(TDMA),and Orthogonal Frequency Division Multiplexing(OFDM)techniques using the hybrid combination of the convolutional neural net-works(CNN)and ensemble single feedforward layers(SFL).The convolutional neural networks are used for channel feature extraction,and boosted ensembled feedforward layers are used for modulation selection based on the CNN outputs.The extensive experimentation is carried out and compared with other hybrid learning models and conventional methods.Simulation results demonstrate that the performance of the proposed hybrid learning model has achieved nearly 98%accuracy and a 30%increase in BER performance which outperformed the other learning models in achieving the communication schemes under dynamic underwater environments. 展开更多
关键词 code division multiple access time division multiple access convolutional neural networks feedforward layers
下载PDF
Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment
19
作者 P.Prathap Nayudu Krovi Raja Sekhar 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1079-1092,共14页
The cloud allows clients to store and share data.Depending on the user’s needs,it is imperative to design an effective access control plan to share the information only with approved users.The user loses control of t... The cloud allows clients to store and share data.Depending on the user’s needs,it is imperative to design an effective access control plan to share the information only with approved users.The user loses control of their data when the data is outsourced to the cloud.Therefore,access control mechanisms will become a significant challenging problem.The Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is an essential solution in which the user can control data access.CP-ABE encrypts the data under a limited access policy after the user sets some access policies.The user can decrypt the data if they satisfy the limited access policy.Although CP-ABE is an effective access control program,the privacy of the policy might be compromised by the attackers.Namely,the attackers can gather important information from plain text policy.To address this issue,the SHA-512 algorithm is presented to create a hash code for the user’s attributes in this paper.Depending on the created hash codes,an access policy will be formed.It leads to protecting the access policy against attacks.The effectiveness of the proposed scheme is assessed based on decryption time,private key generation time,ciphertext generation time,and data verification time. 展开更多
关键词 Cloud computing access policy CP-ABE hash code SHA-512 ATTRIBUTE CIPHERTEXT encryption DECRYPTION
下载PDF
BER Performance of Space-Time Coded MMSE DFE for Wideband Code Division Multiple Access (WCDMA)
20
作者 Sanjay Kumar SHARMA S. Naseem AHMAD 《International Journal of Communications, Network and System Sciences》 2009年第4期276-282,共7页
In recent times, there has been growing interests in integration of voice, data and video traffic in wireless communication networks. With these growing interests, WCDMA has immerged as an attractive access technique.... In recent times, there has been growing interests in integration of voice, data and video traffic in wireless communication networks. With these growing interests, WCDMA has immerged as an attractive access technique. The performance of WCDMA system is deteriorated in presence of multipath fading environment. The paper presents space-time coded minimum mean square error (MMSE) Decision Feedback Equalizer (DFE) for wideband code division multiple access (WCDMA) in a frequency selective channel. The filter coefficients in MMSE DFE are optimized to suppress noise, intersymbol interference (ISI), and multiple access interference (MAI) with reasonable system complexity. For the above structure, we have presented the estimation of BER for a MMSE DFE using computer simulation experiments. The simulation includes the effects of additive white Gaussian noise, multipath fading and multiple access interference (MAI). Furthermore, the performance is compared with standard linear equalizer (LE) and RAKE receiver. Numerical and simulation results show that the MMSE DFE exhibits significant performance improvement over the standard linear equalizer (LE) and RAKE receiver. 展开更多
关键词 Decision Feedback EQUALIZER Multiple access Interference (MAI) RAKE Receiver Transmit Diversity Wideband code-DIVISION MULTIPLE-access (WCDMA) Bit Error Rate (BER)
下载PDF
上一页 1 2 89 下一页 到第
使用帮助 返回顶部