Proposition of an Unexploited Multiple Access Technique

نویسندگان

  • Sidi Ahmed DJENNAS
  • Fethi Tarik BENDIMERAD
چکیده

Continual growth in number of telecommunication network users encourages engineers to bring solutions to avoid overload and conflict. The situation is remedied by multiple access techniques and protocols. In fact, several ideas were applied with success to overcome difficulties. Basically, these ideas are based on discrimination in time, frequency, space and modulating code or time management. Within the context, we propose in this paper a new technique which helps us to avoid the conflict between users and manage optimally the information convoy. The basic idea for the new technique, baptized on the occasion by FAT (Fundamentals Agreement Technique), is to develop every signal and to convert it into a form with fundamentals as components. Of course emission and reception parts are in agreement about fundamentals to allow signals recovery later.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bit Error Performance for Asynchronous Ds Cdma Systems Over Multipath Rayleigh Fading Channels (RESEARCH NOTE)

In recent years, there has been considerable interest in the use of CDMA in mobile communications. Bit error rate is one of the most important parameters in the evaluation of CDMA systems. In this paper, we develop a technique to find an accurate approximation to the probability of bit error for asynchronous direct–sequence code division multiple–access (DS/CDMA) systems by modeling the multipl...

متن کامل

Bounds for Multiple-Access Relay Channels with Feedback via Two-way Relay Channel

In this study, we introduce a new two-way relay channel and obtain an inner bound and an outer bound for the discrete and memoryless multiple access relay channels with receiver-source feedback via two-way relay channel in which end nodes exchange signals by a relay node. And we extend these results to the Gaussian case. By numerical computing, we show that our inner bound is the same with o...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

Improving Data Grids Performance by Using Modified Dynamic Hierarchical Replication Strategy

Abstract: A Data Grid connects a collection of geographically distributed computational and storage resources that enables users to share data and other resources. Data replication, a technique much discussed by Data Grid researchers in recent years creates multiple copies of file and places them in various locations to shorten file access times. In this paper, a dynamic data replication strate...

متن کامل

The Business Model of Sports Academies with an Emphasis on Value Proposition and Customer Segments

Background. Nowadays, sport is considered as a good base for marketing and entrepreneurship. Business model design is also increasingly welcomed. But in the field of sports businesses and sports academies in Iran, no research has been conducted, and no specific business model has been introduced. Objectives. The purpose of this study is to identify and prioritize the value proposition componen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012