Integrated Co-channel Interference Cancellation and Decoding Scheme over Fading Multipath Channel for CDMA
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, we propose and analyze a direct sequence spread spectrum multiaccess (DS/CDMA) receiver that employs an integrated filtering and decoding technique for cancellation of cochannel interference (CCI) in cascded form. We consider channels that experience both multipath returns and random fading which are the factors responsible for signel degradation in mobile communication systems. The idea behind the integrated filtering is that CCI can be more reliably estimated by exploiting coding. We investigate the BER performance of the proposed scheme by theoretical analysis. For random amplitude fading in hostile channel, we have shown that with some sort of external diversity measure, the proposed scheme efficiently combats fading. Both numerical and simulation results exhibit the significant improvement that can be attained by the proposed scheme compared to the conventional scheme.
- 社団法人電子情報通信学会の論文
- 1994-11-25
著者
-
Kohno Ryuji
Faculty Of Engineering Yokohama National University
-
IMAI Hideki
Institute of Industrial Science, The University of Tokyo
-
Imai Hideki
Institute Of Industrial Science The University Of Tokyo
-
Saifuddin Ahmed
Faculty Of Engineering Yokohama National University
-
Kohno Ryuji
Faculty Of Eng. Yokohama National University
-
Imai Hideki
Institute Of Industrial Science Interfaculty Initiative For Information Studies University Of Tokyo
関連論文
- Efficient Algorithms for Tate Pairing(Elliptic Curve Cryptography, Cryptography and Information Security)
- Coded Modulation for Satellite Broadcasting Based on Unconventional Partitionings (Special Section on Information Theory and Its Applications)
- Shared Pseudo-Random Secret Generation Protocols (Special Section on Discrete Mathematics and Its Applications)
- A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications(Information Security)
- The MAC-based Construction of Strong Multiple Encryption
- Efficient Strong Multiple Encryption from Relaxed Conditions
- ID-based Encryption for Directed Acyclic Graph Hierarchies : Unification of Key-evolving Encryption Primitives (Extended Abstract)
- Shielding Asymmetric Cryptosystems from Decryption Failures
- A Bandwidth-Saving Public Key Encryption Conversion Scheme
- Towards Removing Random Oracles from OAEP
- Transmitting Array Antenna Beamforming Based on Goal Programming for Forward Link of DS-CDMA System (Special Issue on Adaptive Array Antenna Techniques for Advanced Wireless Communications)
- Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions(Special Section on Cryptography and Information Security)
- Adaptive Array Antenna Using Array Antennas as Element Antennas(Special Issue on Mobile Multimedia Communications)
- Security Issues for Software Defined Radio : Design of a Secure Download System(Special Issue on Software Defined Radio Technology and Its Applications)
- A Novel Approach to Algebraic and Fast Correlation Attacks for Cryptanalysis of Certain Keystream Generators
- Relations among Notions of Security for Identity Based Encryption Schemes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Towards Security Enhancement with Efficient Reduction for Identity Based Encryption
- A Remark on GEM
- A New Anonymous Routing Scheme and its Aptitude for Ad-hoc Networks
- A Software Radio Receiver with Direct Conversion and Its Digital Processing(Special Issue on Software Defined Radio Technology and Its Applications)
- Design of Simplified Coherent QPSK Modem for Frequency Hopping Spread Spectrum(Special Section on Spread Spectrum Techniques and Applications)
- Subset Incremental Chain Based Broadcast Encryption with Shorter Ciphertext
- Personal Entropy from Graphical Passwords : Methods for Quantification and Practical Key Generation(Cryptography and Information Security)(Information Theory and Its Applications)
- On Evaluating the Entropy of Graphical Passwords
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Implementation of an Industrial R/C System Using a Hybrid DS/FH Spread Spectrum Technique (Special Issue on Spread Spectrum Techniques and Applications)
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- On the oblivious transfer capacity of the erasure channel
- MFSK/FH-CDMA System with Two-Stage Address Coding and Error Correcting Coding and Decoding
- An Error-Controlling Scheme according to the Importance of Individual Segments of Model-Based Coded Facial Images (Special Section on Information Theory and Its Applications)
- Variable Error Controlling Schemes for Intelligent Error Controlling Systems (Special Section on Information Theory and Its Applications)
- A Provably Secure Refreshable Partially Anonymous Token and Its Applications(Discrete Mathematics and Its Applications)
- An Efficient Anonymous Authentication Scheme with No Unlinkability
- Traceability Schemes against Illegal Distribution of Signed Documents(Discrete Mathematics and Its Applications)
- Bearing Estimation for Wideband Signals in a Multipath Channel (Special Section on Spread Spectrum Techniques and Applications)
- Spatially and Temporally Joint Transmitter-Receiver Using an Adaptive Array Antenna (Special Issue on Advanced Adaptive Radio Communication Technologies)
- Efficient Reliability-Based Turbo Decoding
- Relation between the XL Algorithm and Grobner Basis Algorithms(Symmetric Key Cryptography, Cryptography and Information Security)
- An Efficient Group Signature Scheme from Bilinear Maps(Discrete Mathematics and Its Applications)
- Effect of Noisy Estimation on Turbo-Coded Modulation over Rayleigh Fading Channel
- Block Coding Scheme Based on Complementary Sequences for Multicarrier Signals
- Integrated Co-channel Interference Cancellation and Decoding Scheme over Fading Multipath Channel for CDMA
- Quantum Bit Commitment Robust against Noise and Multiple-photons
- A Simple Method to Control Indirect Information Flows (Special Section of Letters Selected from the 1994 IEICE Spring Conference)
- Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model(Special Section on Information Theory and Its Applications)
- Non-proper Variable-to-Fixed Length Arithmetic Coding
- Constructing c-Secure CRT Codes Using Polynomials over Finite Fields(Information Security)
- Adaptively Sampled Near-Field Smart Array Antenna for Indoor Wireless Communications (Special Issue on Adaptive Array Antenna Techniques for Advanced Wireless Communications)
- Adaptive Equalization with Dual Diversity-Combining (Special Issue on Land Mobile/Portable Propagation)
- Viterbi Equalizing FH-SS Receiver with Sector Beamed Space Hopping(Special Issue on Signals, Systems and Electronics Technology)
- A Spatially and Temporally Optimal Multi-User Receiver Using an Array Antenna for DS/CDMA
- Effect of Noisy Estimation on Turbo-Coded Modulation over Flat Rayleigh Fading Channels(Special Section on Information Theory and Its Applications)
- Vehicular Spread Spectrum Radar for Multiple Targets Detection Using Multi-Beam Antenna (Special Section on Spread Spectrum Techniques and Applications)
- Improvements On Security Proofs of Some Identity Based Encryption Schemes
- Performance of Orthogonal Multi-Carrier FH-CDMA System in the Presence of Selective Fading and Nonlinear Amplification (Special Section on Spread Spectrum Techniques and Applications)
- Bifurcation from Classical to Quantum distinguishability(3) Chaos and nonlinear dynamics in dissipative systems(including BEC and pattern formations), Chaos and Nonlinear Dynamics in Quantum-Mechanical and Macroscopic Systems)
- Multilevel RLL (D, K, I) Constrained Sequences (Special Section on Information Theory and Its Applications)
- Security Protocols Protection Based on Anomaly Detection(Intrusion Detection, New Technologies and their Applications of the Internet III)
- Multihopping and Decoding of Error-Correcting Code for MFSK/FH-SSMA Systems (Special Issue on Spread Spectrum Techniques and Applications)
- Single-User Receiver Based on Orthogonalizing Matched Filter Using Multi-Dimensional Lattice Filters for DS /CDMA (Special Section on Digital Signal Processing)
- Pretty Simple Password-Authenticated Key-Exchange Protocol
- Irregular Low-Density Parity-Check Code Design Based on Euclidean Geometries(Coding Theory)
- Security Analysis on the Proactivized System against Latent Virus Attacks (特集 情報セキュリティの理論と応用)
- Secure Architecture For Distributed Intrusion Detection Systems
- Optimal multibit commitment Information theoretical reductions to weak bit commitments
- Revocable Anonymous Schemes for User's Privacy in Intrusion Detection Systems
- An Image Correction Scheme for Video Watermarking Extraction
- An Embedded Interleaver for Turbo Codes Based on Prime-Field
- A Novel Method of Reducing the Decoding Complexity for High-Rate Turbo Codes
- A Flexible-Revocation Scheme for Efficient Public-Key Black-Box Traitor Tracing(Information Security)
- Cooperative agents for Intrusion Detection systems
- Privacy Enhanced RFID tags with One-Time-Recordable-Memory
- LDPC coded Hybrid Type II ARQ System
- Cascaded Co-Channel Interference Cancelling and Diversity Combining for Spread-Spectrum Multi-Access over Multipath Fading Channels (Special Issue on Land Mobile/Portable Propagation)
- A-7-6 A Public-Key Revocation Scheme Preserving Receiver Privacy
- Relations among Notions of Security for Identity Based Encryption Schemes
- Relations among Notions of Security for Identity Based Encryption Schemes