CDMA Multi-Cell Performance of Combined Serial Interference Canceller and Normalized Griffiths' Algorithm(Special Issue on Multiple Access and Signal Transmission Techniques for Future Mobile Communications)
スポンサーリンク
概要
- 論文の詳細を見る
Interference Cancellation (IC) receivers can be used in CDMA cellular systems to improve the capacity. The IC receivers can be divided into two main categories, Single-User Detectors (SUD) and Multi-User Detectors (MUD). They have different characteristics in terms of intra-cell and inter-cell interference cancellation ability. In this paper we propose two new IC receivers that combines the properties of SUD and MUD receivers. The first one is a Serial IC receiver followed by the Normalized Griffiths' algorithm (SING). The second one is an Integrated Serial IC and Normalized Griffiths' algorithm (iSING). We first compare their basic single-cell performance with the conventional RAKE receiver, the Serial IC and the Normalized Griffiths' Algorithm. Next, we examine their multi-cell performance by doing multi-cell link-level simulations. The results show that even though the Serial IC receiver has good single-cell performance, the proposed receivers have as much as 35-40% higher capacity than the Serial IC receiver in the multi-cell case under the ideal conditions assumed in this paper.
- 社団法人電子情報通信学会の論文
- 2003-01-01
著者
-
Karlsson J
The University Of Tokyo
-
KARLSSON Jonas
The University of Tokyo
-
IMAI Hideki
The University of Tokyo
-
Imai Hideki
The Univ. Of Tokyo And Concurrently The Research Center For Information Security Of Aist.
関連論文
- CDMA Multi-Cell Performance of Combined Serial Interference Canceller and Normalized Griffiths' Algorithm(Special Issue on Multiple Access and Signal Transmission Techniques for Future Mobile Communications)
- On Decoding Techniques for Cryptanalysis of Certain Encryption Algorithms(Special Section on Fundamentals of Information and Communications)
- On the Hierarchical Structure of Trusted Authority for Unconditionally Secure Cryptography
- A New Hash Function Based on SQH and NH^a
- How to List-up Weak IVs and Weak Keys in WEP : Swap Operations and Weak Patterns