Multihopping and Decoding of Error-Correcting Code for MFSK/FH-SSMA Systems (Special Issue on Spread Spectrum Techniques and Applications)
スポンサーリンク
概要
- 論文の詳細を見る
This paper investigates a multihopping scheme for MFSK (Multilevel Frequency Shift Keying) / FH-SSMA (Frequency Hopping-Spread Spectrum Multiple Access) system. Moreover, we propose and investigate a modified decoding scheme for the coded MFSK / FH-SSMA system. In this multihopped MFSK / FH-SSMA system, several hopping frequencies per chip are assigned and transmitted in parallel in order to improve its frequency diversity capability for a fading channel. We theoretically analyze the performance of the multihopped MFSK / FH-SSMA system in a Rayleigh fading channel. Moreover, in the coded MFSK / FH-SSMA system, we propose a modified scheme of the error and erasure decoding of an error-correcting code. The modified decoding scheme utilizes the information of rows having the largest number of entries in the decoded time-frequency matrix. Their BER (Bit Error Rate) performance is evaluated by theoretical analysis in order to show the improvement in user capacity.
- 社団法人電子情報通信学会の論文
- 1993-08-25
著者
-
Imai Hideki
Institute Of Industrial Science The University Of Tokyo
-
Kohno Ryuji
Faculty Of Eng. Yokohama National University
-
Imai Hideki
Institute Of Industrial Science Interfaculty Initiative For Information Studies University Of Tokyo
-
MABUCHI Tetsuo
Faculty of Engineering, Yokohama National University
-
Mabuchi Tetsuo
Faculty Of Engineering Yokohama National University
関連論文
- Efficient Algorithms for Tate Pairing(Elliptic Curve Cryptography, Cryptography and Information Security)
- Coded Modulation for Satellite Broadcasting Based on Unconventional Partitionings (Special Section on Information Theory and Its Applications)
- Shared Pseudo-Random Secret Generation Protocols (Special Section on Discrete Mathematics and Its Applications)
- A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications(Information Security)
- The MAC-based Construction of Strong Multiple Encryption
- Efficient Strong Multiple Encryption from Relaxed Conditions
- ID-based Encryption for Directed Acyclic Graph Hierarchies : Unification of Key-evolving Encryption Primitives (Extended Abstract)
- Shielding Asymmetric Cryptosystems from Decryption Failures
- A Bandwidth-Saving Public Key Encryption Conversion Scheme
- Towards Removing Random Oracles from OAEP
- Transmitting Array Antenna Beamforming Based on Goal Programming for Forward Link of DS-CDMA System (Special Issue on Adaptive Array Antenna Techniques for Advanced Wireless Communications)
- Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions(Special Section on Cryptography and Information Security)
- Adaptive Array Antenna Using Array Antennas as Element Antennas(Special Issue on Mobile Multimedia Communications)
- A Novel Approach to Algebraic and Fast Correlation Attacks for Cryptanalysis of Certain Keystream Generators
- Relations among Notions of Security for Identity Based Encryption Schemes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Towards Security Enhancement with Efficient Reduction for Identity Based Encryption
- A Remark on GEM
- A New Anonymous Routing Scheme and its Aptitude for Ad-hoc Networks
- Subset Incremental Chain Based Broadcast Encryption with Shorter Ciphertext
- Personal Entropy from Graphical Passwords : Methods for Quantification and Practical Key Generation(Cryptography and Information Security)(Information Theory and Its Applications)
- On Evaluating the Entropy of Graphical Passwords
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Implementation of an Industrial R/C System Using a Hybrid DS/FH Spread Spectrum Technique (Special Issue on Spread Spectrum Techniques and Applications)
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- On the oblivious transfer capacity of the erasure channel
- MFSK/FH-CDMA System with Two-Stage Address Coding and Error Correcting Coding and Decoding
- An Error-Controlling Scheme according to the Importance of Individual Segments of Model-Based Coded Facial Images (Special Section on Information Theory and Its Applications)
- Variable Error Controlling Schemes for Intelligent Error Controlling Systems (Special Section on Information Theory and Its Applications)
- A Provably Secure Refreshable Partially Anonymous Token and Its Applications(Discrete Mathematics and Its Applications)
- An Efficient Anonymous Authentication Scheme with No Unlinkability
- Traceability Schemes against Illegal Distribution of Signed Documents(Discrete Mathematics and Its Applications)
- Bearing Estimation for Wideband Signals in a Multipath Channel (Special Section on Spread Spectrum Techniques and Applications)
- Spatially and Temporally Joint Transmitter-Receiver Using an Adaptive Array Antenna (Special Issue on Advanced Adaptive Radio Communication Technologies)
- Efficient Reliability-Based Turbo Decoding
- Relation between the XL Algorithm and Grobner Basis Algorithms(Symmetric Key Cryptography, Cryptography and Information Security)
- An Efficient Group Signature Scheme from Bilinear Maps(Discrete Mathematics and Its Applications)
- Effect of Noisy Estimation on Turbo-Coded Modulation over Rayleigh Fading Channel
- Block Coding Scheme Based on Complementary Sequences for Multicarrier Signals
- Integrated Co-channel Interference Cancellation and Decoding Scheme over Fading Multipath Channel for CDMA
- Quantum Bit Commitment Robust against Noise and Multiple-photons
- A Simple Method to Control Indirect Information Flows (Special Section of Letters Selected from the 1994 IEICE Spring Conference)
- Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model(Special Section on Information Theory and Its Applications)
- Non-proper Variable-to-Fixed Length Arithmetic Coding
- Constructing c-Secure CRT Codes Using Polynomials over Finite Fields(Information Security)
- Adaptively Sampled Near-Field Smart Array Antenna for Indoor Wireless Communications (Special Issue on Adaptive Array Antenna Techniques for Advanced Wireless Communications)
- Adaptive Equalization with Dual Diversity-Combining (Special Issue on Land Mobile/Portable Propagation)
- Viterbi Equalizing FH-SS Receiver with Sector Beamed Space Hopping(Special Issue on Signals, Systems and Electronics Technology)
- A Spatially and Temporally Optimal Multi-User Receiver Using an Array Antenna for DS/CDMA
- Effect of Noisy Estimation on Turbo-Coded Modulation over Flat Rayleigh Fading Channels(Special Section on Information Theory and Its Applications)
- Vehicular Spread Spectrum Radar for Multiple Targets Detection Using Multi-Beam Antenna (Special Section on Spread Spectrum Techniques and Applications)
- Improvements On Security Proofs of Some Identity Based Encryption Schemes
- Performance of Orthogonal Multi-Carrier FH-CDMA System in the Presence of Selective Fading and Nonlinear Amplification (Special Section on Spread Spectrum Techniques and Applications)
- Bifurcation from Classical to Quantum distinguishability(3) Chaos and nonlinear dynamics in dissipative systems(including BEC and pattern formations), Chaos and Nonlinear Dynamics in Quantum-Mechanical and Macroscopic Systems)
- Multilevel RLL (D, K, I) Constrained Sequences (Special Section on Information Theory and Its Applications)
- Security Protocols Protection Based on Anomaly Detection(Intrusion Detection, New Technologies and their Applications of the Internet III)
- Multihopping and Decoding of Error-Correcting Code for MFSK/FH-SSMA Systems (Special Issue on Spread Spectrum Techniques and Applications)
- Single-User Receiver Based on Orthogonalizing Matched Filter Using Multi-Dimensional Lattice Filters for DS /CDMA (Special Section on Digital Signal Processing)
- Pretty Simple Password-Authenticated Key-Exchange Protocol
- Irregular Low-Density Parity-Check Code Design Based on Euclidean Geometries(Coding Theory)
- Security Analysis on the Proactivized System against Latent Virus Attacks (特集 情報セキュリティの理論と応用)
- Secure Architecture For Distributed Intrusion Detection Systems
- Optimal multibit commitment Information theoretical reductions to weak bit commitments
- Revocable Anonymous Schemes for User's Privacy in Intrusion Detection Systems
- An Image Correction Scheme for Video Watermarking Extraction
- An Embedded Interleaver for Turbo Codes Based on Prime-Field
- A Novel Method of Reducing the Decoding Complexity for High-Rate Turbo Codes
- A Flexible-Revocation Scheme for Efficient Public-Key Black-Box Traitor Tracing(Information Security)
- Cooperative agents for Intrusion Detection systems
- Privacy Enhanced RFID tags with One-Time-Recordable-Memory
- LDPC coded Hybrid Type II ARQ System
- Cascaded Co-Channel Interference Cancelling and Diversity Combining for Spread-Spectrum Multi-Access over Multipath Fading Channels (Special Issue on Land Mobile/Portable Propagation)
- A-7-6 A Public-Key Revocation Scheme Preserving Receiver Privacy
- Relations among Notions of Security for Identity Based Encryption Schemes
- Relations among Notions of Security for Identity Based Encryption Schemes