Communication Systems Group

نویسنده

  • Arne Svensson
چکیده

The requirement for increased exibility in order to support the many di erent services in wireless communication has motivated the search for new, improved convolutional codes with a large number of di erent code rates. A new design criterion is introduced which results in codes with better performance on both AWGN channels and Rayleigh fading channels. These codes, called Optimum Distance Spectrum (ODS) convolutional codes, are tabulated for code rate 1/2, 1/3 and 1/4, for di erent constraint lengths. The ODS codes are used as a basis for deriving a large number of codes with di erent rates. Optimum puncturing patterns and spectra are shown for puncturing periods between 2 and 8, parent code rates 1/2, 1/3, and 1/4 and constraint lengths between 3 and 15. A large set of rate-compatible punctured codes are also presented, as well as a detailed evaluation on RCPC puncturing pattern search. Finally the ODS codes are used as starting codes for searching additional generator polynomials (nested code search) to produce very low-rate codes. Maximum free distance codes with rates ranging from 1/4 to 1/512 and constraint lengths between 3 and

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Learning Pragmatics through Computer-Mediated Communication in Taiwan

This study investigated the effectiveness of explicit pragmatic instruction on the acquisition of requests by college-level English as Foreign Language (EFL) learners in Taiwan. The goal was to determine first whether the use of explicit pragmatic instruction had a positive effect on EFL learners’ pragmatic competence. Second, the relative effectiveness of presenting pragmatics through two deli...

متن کامل

Secure Communication in Shotgun Cellular Systems

In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...

متن کامل

Distance-Aware Beamforming for Multiuser Secure Communication Systems

Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems)  are possible alternatives to provide security for such applications. In this paper, we consid...

متن کامل

بررسی نقش اعتماد و وابستگی بر عملکرد سیستم‌های اطلاعاتی در فرایند تسهیم دانش در فاوا شهرداری شیراز

one of the main challenges of knowledge management in today's knowledge-based economy, encouraging people to share their knowledge. Knowledge-based structures due to the pressing need for participation, trust-based approach should be pursued Because creating and sharing knowledge requires a high level of confidence and optimism in the relations between members of the organization together. It i...

متن کامل

Group communication — still complex after all these years

Group communication is used in many file systems and storage controller systems. Ideally, there could be a single group communication system that serves the needs of all these various projects—software that was built once, tested once, and deployed everywhere. In reality, each project builds its own custom group services component. There are three reasons for this: most systems require only a f...

متن کامل

Framework for Authentication and Access Control of Client-Server Group Communication Systems

Group communication systems are building tools for distributed and collaborative applications that often run in an insecure environment. Although necessary, basic security services such as data secrecy and data integrity are not sufficient for a secure group communication system. Entity authentication and access control services are needed to provide the application with a policy enforcement me...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998