2008 IEEE International Zurich Seminar on Communications 2008
DOI: 10.1109/izs.2008.4497280
|View full text |Cite
|
Sign up to set email alerts
|

Generalized Modulation and Iterative Demodulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…This amount is proportional to the data-rate and the bandwidth. A realistic model is derived by [46] and [47] as follows where ω, ν, γ, δ ≥ 0 are hardware characterization constants that are specified in Table 2.…”
Section: ) Energy Consumption Of Rcmmentioning
confidence: 99%
“…This amount is proportional to the data-rate and the bandwidth. A realistic model is derived by [46] and [47] as follows where ω, ν, γ, δ ≥ 0 are hardware characterization constants that are specified in Table 2.…”
Section: ) Energy Consumption Of Rcmmentioning
confidence: 99%
“…Both of these techniques utilize iterative processing and joint detection; however, they rely on the assumption of perfect channel estimation which is a known issue in any realistic environment. It should be noted that techniques based on generalized modulation and superposition are capable of achieving system loads in excess of 2 bits/s/Hz [7] and can be applied in the satellite environment. Furthermore techniques based on spatial coupling have been proposed to approach the capacity of the multiple access channel [8].…”
Section: B Satellite Random Accessmentioning
confidence: 99%
“…However, [7] shows that if each symbol is duplicated a number of times and modulated onto separate signal waveforms and transmitted at random time intervals within a transmission frame, that ideally, the capacity of the Gaussian multiple access channel can be achieved. The main conceptual difference between the variants of coded slotted Aloha and this approach is that the former duplicates complete packets, where the latter duplicates binary symbols modulated onto different waveforms in conjunction with bit interleaving, and these waveforms are then superposed.…”
Section: B Generalized Modulation / Partitioned Signallingmentioning
confidence: 99%
See 1 more Smart Citation
“…We consider modulation of information in the form of multiple redundant data streams and apply this technique to interference channels. Several variations of this method have been proposed [17], [18], [10]. Information at each transmitter is encoded as a number of independent binary data streams which are distinguished by random signature sequences and interleavers and are transmitted at different power levels.…”
Section: Introductionmentioning
confidence: 99%