Adaptive Equalization with Dual Diversity-Combining (Special Issue on Land Mobile/Portable Propagation)
スポンサーリンク
概要
- 論文の詳細を見る
This paper proposes and investigates an adaptive equalizer with diversity-combining over a multipath fading channel. It consists of two space-diversity antennas and a Ts/2-spaced decision-feedback-equalizer (DFE). Received signals from the two antennas are alternatively switched and fed into the feedforward-filter of DFE. We call this structure a Switched Input Combining Equalizer with diversity-combining (SICE). By using an SICE, the receiver structure for combining diversity equalization can be simplified, because it needs only two receiver sections up to IF BPF. The bit error rate (BER) performance of SICE was evaluated by both computer simulation and experiment over a multipath fading channel. We experimentally confirmed the excellent BER performance, around 1% of BER over a multipath fading channel at 160 Hz of maximum doppler fading frequency. Therefore, the proposed SICE is applicable to highly reliable transmission in the 1.5-GHz-band mobile radio.
- 社団法人電子情報通信学会の論文
- 1993-02-25
著者
-
Imai Hideki
Faculty Of Science And Engineering Chuo University:research Center For Information Security (rcis) N
-
Kohno Ryuji
Faculty Of Engineering Yokohama National University
-
Misaizu Kouei
Tokyo Information And Communications Research Laboratory Matsushita Electric Industrial Co. Ltd.
-
Ohnishi Hiroshi
Tokyo Information And Communications Research Laboratory Matsushita Electric Industrial Co. Ltd.
-
Matsuoka Takashi
Tokyo Information And Communications Research Laboratory Matsushita Electric Industrial Co. Ltd.
-
Kohno Ryuji
Faculty Of Eng. Yokohama National University
-
Imai Hideki
Faculty Of Engineering Yokohama National University
関連論文
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service(Discrete Mathematics and Its Applications)
- A New Quaternion Design for Space-Time-Polarization Block Code with Full Diversity
- A Novel Probabilistic Passive Attack on the Protocols HB and HB^+
- Smallest Size of Circulant Matrix for Regular (3, L) and (4, L) Quasi-Cyclic LDPC Codes with Girth 6
- Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
- Asymmetric RFID System Secure against Active Attack
- The MAC-based Construction of Strong Multiple Encryption
- Efficient Strong Multiple Encryption from Relaxed Conditions
- ID-based Encryption for Directed Acyclic Graph Hierarchies : Unification of Key-evolving Encryption Primitives (Extended Abstract)
- Shielding Asymmetric Cryptosystems from Decryption Failures
- A Bandwidth-Saving Public Key Encryption Conversion Scheme
- Invisibly Sanitizable Digital Signature Scheme
- Transmitting Array Antenna Beamforming Based on Goal Programming for Forward Link of DS-CDMA System (Special Issue on Adaptive Array Antenna Techniques for Advanced Wireless Communications)
- An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation
- Adaptive Array Antenna Using Array Antennas as Element Antennas(Special Issue on Mobile Multimedia Communications)
- Security Issues for Software Defined Radio : Design of a Secure Download System(Special Issue on Software Defined Radio Technology and Its Applications)
- Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes(Information Security)
- A Novel Approach to Algebraic and Fast Correlation Attacks for Cryptanalysis of Certain Keystream Generators
- CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
- Formal Security Treatments for IBE-to-Signature Transformation : Relations among Security Notions
- A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
- Key-Insulated Public Key Encryption with Auxiliary Helper Key : Model, Constructions and Formal Security Proofs(Information Theory and Its Applications)
- Efficient Identity-Based Encryption with Tight Security Reduction(Information Theory and Its Applications)
- A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key
- Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption
- Searchable Public-key Broadcast Encryption
- Relations among Notions of Security for Identity Based Encryption Schemes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Towards Security Enhancement with Efficient Reduction for Identity Based Encryption
- CCA-secure IBE Scheme with Tight Security Reduction based on the Gap BDH Assumption
- A Remark on GEM
- An Implementation of KPS with Distributed Trust
- A Software Radio Receiver with Direct Conversion and Its Digital Processing(Special Issue on Software Defined Radio Technology and Its Applications)
- Design of Simplified Coherent QPSK Modem for Frequency Hopping Spread Spectrum(Special Section on Spread Spectrum Techniques and Applications)
- Managing Encryption and Key Publication Independently in Digital Rights Management Systems (Applications) (Cryptography and Information Security)
- Implementation of an Industrial R/C System Using a Hybrid DS/FH Spread Spectrum Technique (Special Issue on Spread Spectrum Techniques and Applications)
- MFSK/FH-CDMA System with Two-Stage Address Coding and Error Correcting Coding and Decoding
- An Error-Controlling Scheme according to the Importance of Individual Segments of Model-Based Coded Facial Images (Special Section on Information Theory and Its Applications)
- Variable Error Controlling Schemes for Intelligent Error Controlling Systems (Special Section on Information Theory and Its Applications)
- Bearing Estimation for Wideband Signals in a Multipath Channel (Special Section on Spread Spectrum Techniques and Applications)
- Spatially and Temporally Joint Transmitter-Receiver Using an Adaptive Array Antenna (Special Issue on Advanced Adaptive Radio Communication Technologies)
- New Short Signature Scheme without Random Oracles
- A Trade-off Traitor Tracing Scheme
- Integrated Co-channel Interference Cancellation and Decoding Scheme over Fading Multipath Channel for CDMA
- Non-proper Variable-to-Fixed Length Arithmetic Coding
- Adaptively Sampled Near-Field Smart Array Antenna for Indoor Wireless Communications (Special Issue on Adaptive Array Antenna Techniques for Advanced Wireless Communications)
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- Adaptive Equalization with Dual Diversity-Combining (Special Issue on Land Mobile/Portable Propagation)
- Viterbi Equalizing FH-SS Receiver with Sector Beamed Space Hopping(Special Issue on Signals, Systems and Electronics Technology)
- A Spatially and Temporally Optimal Multi-User Receiver Using an Array Antenna for DS/CDMA
- Vehicular Spread Spectrum Radar for Multiple Targets Detection Using Multi-Beam Antenna (Special Section on Spread Spectrum Techniques and Applications)
- Performance of Orthogonal Multi-Carrier FH-CDMA System in the Presence of Selective Fading and Nonlinear Amplification (Special Section on Spread Spectrum Techniques and Applications)
- Multilevel RLL (D, K, I) Constrained Sequences (Special Section on Information Theory and Its Applications)
- Multihopping and Decoding of Error-Correcting Code for MFSK/FH-SSMA Systems (Special Issue on Spread Spectrum Techniques and Applications)
- Single-User Receiver Based on Orthogonalizing Matched Filter Using Multi-Dimensional Lattice Filters for DS /CDMA (Special Section on Digital Signal Processing)
- Secure Broadcast System with Simultaneous Individual Messaging
- Cascaded Co-Channel Interference Cancelling and Diversity Combining for Spread-Spectrum Multi-Access over Multipath Fading Channels (Special Issue on Land Mobile/Portable Propagation)
- A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack