1999
DOI: 10.1109/35.790969
|View full text |Cite
|
Sign up to set email alerts
|

Air interface access schemes for broadband mobile systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2001
2001
2003
2003

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(12 citation statements)
references
References 2 publications
0
12
0
Order By: Relevance
“…The arithmetic operations over the RNS can be carried out on a residue-by-residue basis, which can be expressed as [26] ( 3) where on the left of (3) the operation represents moduloaddition, subtraction, or multiplication of two integers and at the right of (3) is increased by one, whenever hops happened. According to (3), this can be implemented by increasing each element of by one with respect to their corresponding modulus. Note that although the maximum integer represented by the RNS-based registers is , this will not prevent us from using it as a synchronous transmission reference.…”
Section: B Rns-based Ffhmentioning
confidence: 99%
See 3 more Smart Citations
“…The arithmetic operations over the RNS can be carried out on a residue-by-residue basis, which can be expressed as [26] ( 3) where on the left of (3) the operation represents moduloaddition, subtraction, or multiplication of two integers and at the right of (3) is increased by one, whenever hops happened. According to (3), this can be implemented by increasing each element of by one with respect to their corresponding modulus. Note that although the maximum integer represented by the RNS-based registers is , this will not prevent us from using it as a synchronous transmission reference.…”
Section: B Rns-based Ffhmentioning
confidence: 99%
“…Specifically, the tones (2, 3, 5), (5,7,6), and (3, 4, 2) were activated, which convey the 8FSK symbols 1, 3, and 5, respectively, derived below. As an example, we assign the unique MUD signature addresses (1, 2, 4), (2,4,3), and (6, 7, 5) to users 1, 2, and 3. The three time-frequency matrices obtained by modulo-8 subtraction of the unique addresses from according to (6) for users , and are denoted by , as well as in Fig.…”
Section: B Conventional Single-user Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Code-division multiple access (CDMA) schemes have been considered as attractive multiple access schemes in both second-generation (2G) and third-generation (3G) wireless systems. Recently interest in wireless communications has been shifting in the direction of broadband systems [1,2]. This is mainly due to the expected spread of the wireless Internet and the continued dramatic increase in demand for all types of advanced wireless multimedia services, including conventional voice and data transmissions.…”
Section: Introductionmentioning
confidence: 99%