1995
DOI: 10.1109/18.412697
|View full text |Cite
|
Sign up to set email alerts
|

A new approach to the design of codes for synchronous-CDMA systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

1997
1997
2019
2019

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 2 publications
0
16
0
Order By: Relevance
“…Let us define where G i is the number of comparisons that are required in the first call of the Q(·) function. If the input vector contains j number of −1's, in Q(·) function it needs (j + 1) comparisons, as shown in (8). Note that due to symmetry, we do not consider all the input vectors x ∈ {±1} K×1 , instead, only half of them, i.e., 2 i +2 (i−3) −1.…”
Section: The Proposed Fast Decodermentioning
confidence: 99%
“…Let us define where G i is the number of comparisons that are required in the first call of the Q(·) function. If the input vector contains j number of −1's, in Q(·) function it needs (j + 1) comparisons, as shown in (8). Note that due to symmetry, we do not consider all the input vectors x ∈ {±1} K×1 , instead, only half of them, i.e., 2 i +2 (i−3) −1.…”
Section: The Proposed Fast Decodermentioning
confidence: 99%
“…For example, Martirossian and Khachatrian in [32] presented a linear decoder for their explicit construction of binary code sets in the noiseless transmission channel. The linear decoders corresponding to their explicit construction with K max of antipodal and ternary code sets can be found in [33] - [35] and [25] - [27], respectively. Although such overloaded UD code sets theoretically facilitate a large capacity, their decoding for noisy transmission has always been a greater challenge to deal with.…”
Section: Introductionmentioning
confidence: 99%
“…The concept of overloading in CDMA as a solution to the strict capacity limit of its conventional counterpart has drawn frequent interest of the researchers in the past and continuously evolved though several phases. The existing research in the field can be broadly classified into problems like the following: (i) designing of the signature matrices (uniquely decodable (UD) and non‐UD ); (ii) development of reusing techniques for the existing non‐overloaded matrices; (iii) designing of multi user detectors (MUD) ; (iv) adding system level improvisations for improved error performance ; and (v) study of capacity and performance under different channel and input conditions , for synchronous or asynchronous transmission. For matrix C being considered as UD over x , the inequality C x 1 ≠ C x 2 is true for x 1 and x 2 denoting two different input vectors, whereas its major applications in literature are recorded in the field of multiuser encoding for physical layer network coding , overloaded CDMA , and T‐user channels .…”
Section: Introductionmentioning
confidence: 99%
“…The concept of UD‐based construction in the context of multi‐user communication is no more new to literature, and exist in the form of several recursive and non‐group based architecture. However, most of them are hardly accompanied by an efficient decoder (both in complexity and error performance) for noisy transmission.…”
Section: Introductionmentioning
confidence: 99%