期刊文献+
共找到830篇文章
< 1 2 42 >
每页显示 20 50 100
Resource Allocation based on Shared Criterion in OFDMA Distributed Radio Access Network 被引量:1
1
作者 Yang Bo Tang Youxi 《China Communications》 SCIE CSCD 2010年第1期16-22,共7页
Distributed radio access network (DRAN) is a novel wireless access architecture and can solve the problem of the available spectrum scarcity in wireless communications. In this paper, we investigate resource allocatio... Distributed radio access network (DRAN) is a novel wireless access architecture and can solve the problem of the available spectrum scarcity in wireless communications. In this paper, we investigate resource allocation for the downlink of OFDMA DRAN. Unlike previous exclusive criterion based algorithms that allocate each subcarrier to only one user in the system, the proposed algorithms are based on shared criterion that allow each subcarrier to be allocated to multiple users through different antennas and to only one user through same antenna. First, an adaptive resource allocation algorithm based on shared criterion is proposed to maximize total system rate under each user's minimal rate and each antenna's maximal power constraints. Then we improve the above algorithm by considering the influence of the resource allocation scheme on single user. The simulation results show that the shared criterion based algorithm provide much higher total system rate than that of the exclusive criterion based algorithm at the expense of the outage performance and the fairness, while the improved algorithm based on shared criterion can achieve a good tradeoff performance. 展开更多
关键词 resource ALLOCATION distributed radio access network (DRAN) ORTHOGONAL frequency DIVISION multiple access (OFDMA) shared criterion
在线阅读 下载PDF
Adaptive resource allocation in downlink multi-user MC-CDMA systems
2
作者 王俊波 陈明 王江舟 《Journal of Southeast University(English Edition)》 EI CAS 2008年第4期402-406,共5页
The joint channel and power allocation in the downlink transmission of multi-user multi-carrier code division multiple access(MC-CDMA) systems are investigated and the throughput maximization problem is considered a... The joint channel and power allocation in the downlink transmission of multi-user multi-carrier code division multiple access(MC-CDMA) systems are investigated and the throughput maximization problem is considered as a mixed integer optimization problem. For simplicity of analysis, the problem is divided into two less complex sub-problems: power allocation and channel allocation, which can be solved by a suboptimal adaptive power allocation (APA)algorithm and an optimal adaptive channel allocation (ACA) algorithm, respectively. By combining APA and ACA algorithms, an adaptive channel and power allocation scheme is proposed. The numerical results show that the proposed APA algorithm is more suitable for MC-CDMA systems than the conventional equal power allocation algorithm, and that the proposed channel and power allocation scheme can significantly improve the system throughout performance. 展开更多
关键词 code division multiple access (CDMA) multi-carriertransmission multi-user channel allocation power allocation
在线阅读 下载PDF
Development Of Multi-users Multi-function Watt-hour Meter Based On ATT7022B
3
作者 Mao-fa GONG~1,Chang-lun HU~1,Jing-yin HE~2,Xiao-ming ZHANG~1,Long-qing CHAI~1 (1.Collage of information and electrical engineering,Shandong University Of Science and Technology,Qingdao266510,China 2.Qingdao Technical Collage,Qingdao 266555,China) 《Journal of Measurement Science and Instrumentation》 CAS 2010年第S1期123-125,共3页
According to the feature of city’s apartment building in China,a kind of Multi-users Watt-hour Meter based on ATT7022B has been developed in this paper.The master-slave MCU control model and the principles of Time Sh... According to the feature of city’s apartment building in China,a kind of Multi-users Watt-hour Meter based on ATT7022B has been developed in this paper.The master-slave MCU control model and the principles of Time Sharing Multiplex are adopted in this Watt-hour Meter,its function includes the measurement of current, voltage,power,power factor and the overload protection.It supports remote reading,pre-payment,multi-rate and etc. The practice shows that this meter has high accuracy,runs stable.It has wide prospect in the future market. 展开更多
关键词 multi-users ATT7022B Time Sharing Multiplex Master-Slave Control Mode
在线阅读 下载PDF
Dynamic multi-user detection scheme based on CVA-SSAOMP algorithm in uplink grant-free NOMA
4
作者 Xu Lei Tao Shangjin +3 位作者 Bai Shichao Zhang Jian Fang Hongyu Li Xiaohui 《High Technology Letters》 EI CAS 2021年第1期10-16,共7页
In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially a... In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially applied to the joint detection of the active user and the transmitted data.However,the existing compressed sensing recovery algorithms with unknown sparsity often require noise power or signal-to-noise ratio(SNR)as the priori conditions,which greatly reduces the algorithm adaptability in multi-user detection.Therefore,an algorithm based on cross validation aided structured sparsity adaptive orthogonal matching pursuit(CVA-SSAOMP)is proposed to realize multi-user detection in dynamic change communication scenario of channel state information(CSI).The proposed algorithm transforms the structured sparsity model into a block sparse model,and without the priori conditions above,the cross validation method in the field of statistics and machine learning is used to adaptively estimate the sparsity of active user through the residual update of cross validation.The simulation results show that,compared with the traditional orthogonal matching pursuit(OMP)algorithm,subspace pursuit(SP)algorithm and cross validation aided block sparsity adaptive subspace pursuit(CVA-BSASP)algorithm,the proposed algorithm can effectively improve the accurate estimation of the sparsity of active user and the performance of system bit error ratio(BER),and has the advantage of low-complexity. 展开更多
关键词 non-orthogonal multiple access(NOMA) multi-user detection cross validation structured sparsity(SP) orthogonal matching pursuit(OMP)
在线阅读 下载PDF
Triple-Polarized Multi-User Mimo-Idma System under Correlated Fading Channel
5
作者 B. Partibane V. Nagarajan 《Circuits and Systems》 2016年第8期1623-1634,共12页
A multiple-input multiple-output interleave division multiple access (MIMO-IDMA) system with Triple Polarized Division Multiplexing (TPDM) is presented in this paper. The present methodology replaces three indepe... A multiple-input multiple-output interleave division multiple access (MIMO-IDMA) system with Triple Polarized Division Multiplexing (TPDM) is presented in this paper. The present methodology replaces three independent linearly polarized antennas with a single triple polarized antenna at both the transmitter and receiver. The users in the communication link are accommodated and separated using a user-specific interleaver combined with low rate spreading sequence. To eliminate the effects of multi-stream interference (MSI), minimum mean square error (MMSE) algorithm based on successive interference cancellation (SIC) Multi-user detection (MUD) technique is employed at the receiver. Furthermore, log-maximum a posteriori probability (MAPP) decoding algorithm is implemented at the mobile stations (MSs) to overcome the effects of multi-user interference (MUI) effects. The paper also evaluates the effects of coded MIMO-IDMA in the downlink communication by adopting the Stanford University Interim (SUI) and Long-term Evolution (LTE)channel model specifications. In comparison with the traditional uncoded system, the present solution considering turbo coded triple-polarized MIMO-IDMA system with iterative decoding algorithm provides better bit error rate (BER) with reduced signal to noise ratio (SNR). The simulation results also show that though the SNR requirement is higher for the proposed technique compared to the conventional uni-polarized antenna based MIMO-IDMA system, it gives the advantages of achieving higher data rate with reduced cost and space requirements in the context of a downlink (DL). 展开更多
关键词 Interleave Division Multiple access (IDMA) Multiple Input Multiple Output (MIMO) multi-user Interference (MUI) Stanford University Interim (SUI) Channel Model Long Term Evolution (LTE) Channel Model
在线阅读 下载PDF
中继链环境下一种2阶段跨链访问控制机制
6
作者 张佩云 陶帅 +1 位作者 陈健 陈子寒 《计算机研究与发展》 北大核心 2026年第1期255-272,共18页
随着区块链技术的迅速发展,数据等资产已不满足于只在单个区块链上流通,因此跨链技术应运而生。跨链技术改善了区块链数据孤岛问题,但也为数据在不同区块链上的传输与共享带来了新的挑战。一方面,不同区块链用户存储数据方式通常不同,... 随着区块链技术的迅速发展,数据等资产已不满足于只在单个区块链上流通,因此跨链技术应运而生。跨链技术改善了区块链数据孤岛问题,但也为数据在不同区块链上的传输与共享带来了新的挑战。一方面,不同区块链用户存储数据方式通常不同,各区块链数据验证方式往往也不统一。因此,其他区块链上的用户可能传输虚假或者不一致的数据,导致数据难以被有效验证其真实性和一致性,从而影响跨链访问控制的可靠性。另一方面,虽然当前代理重加密技术能有效实现1对1的访问控制,但单一代理存在中心化问题,以及在跨链场景下面临多用户并发导致的访问控制时间开销大的问题。针对上述问题,提出中继链环境下一种2阶段跨链访问控制机制,分别从数据验证和代理重加密阶段2个阶段进行设计。在数据验证阶段,为确保加密数据的来源真实性和一致性,结合Fiat-Shamir启发式与星际文件系统(interplanetary file system,IPFS),设计一种数据验证方法对数据进行快速验证,使得加密数据可被用户正确接收,加密数据在IPFS中安全存储以缓解链上存储压力;在代理重加密阶段,设计一种改进的阈值代理重加密方法,以有效应对多用户场景下的访问控制,基于重加密更新算法对重加密过程进行优化,在实现去中心化重加密的同时,降低重加密的时间开销,并有效提高多用户访问控制的重加密事务处理效率。实验结果表明,所提出的机制在数据验证方面的开销较小,并在多用户场景下加密、重加密及解密过程的开销均优于对比方法。 展开更多
关键词 中继链 代理重加密 数据验证 访问控制 数据共享
在线阅读 下载PDF
Access XP数据库的安全性研究 被引量:2
7
作者 李海燕 《中国安全科学学报》 CAS CSCD 2005年第5期67-70,共4页
在信息化时代来临、Internet高速发展的今天,信息资源的经济和社会价值越来越明显,而数据库系统所管理、存储的数据已成为各个部门宝贵的信息资源,所以其安全保密性是目前所迫切需要解决的问题。笔者从数据库的安全性、保密性的角度,详... 在信息化时代来临、Internet高速发展的今天,信息资源的经济和社会价值越来越明显,而数据库系统所管理、存储的数据已成为各个部门宝贵的信息资源,所以其安全保密性是目前所迫切需要解决的问题。笔者从数据库的安全性、保密性的角度,详细地阐述了MicrosoftAccessXP数据库的安全机制;探讨了实现MicrosoftAccessXP数据库不同保护级别的各种方法;还讨论了共享级安全性和用户级安全性问题。 展开更多
关键词 access 安全性研究 XP MICROSOFT Internet 信息资源 信息化时代 数据库系统 安全保密性 安全性问题 社会价值 安全机制 保护级别 用户级 共享
在线阅读 下载PDF
应用Microsoft Access建立编辑信息的数据库 被引量:1
8
作者 庄晓琼 《佛山科学技术学院学报(自然科学版)》 CAS 2000年第3期30-33,共4页
把科技期刊编辑部的信息分门别类 ,采用 Microsoft Access数据库 ,建立若干有关编辑信息的数据库 ,以利于信息管理、信息共享。
关键词 MICROSOFTaccess 数据库管理系统 编辑信息
在线阅读 下载PDF
一种基于分类共享的资料审核方案设计与实现
9
作者 杜秉一 《计算机应用文摘》 2026年第2期142-144,147,共4页
针对银行业务办理过程中存在的资料重复提交与审核问题,文章提出一种基于分类共享的资料审核方案。基于双层存储架构,结合区块链及数据库,实现资料的智能分类与共享管理。同时,利用策略节点进行资料共享授权及核验,从而优化审核流程,提... 针对银行业务办理过程中存在的资料重复提交与审核问题,文章提出一种基于分类共享的资料审核方案。基于双层存储架构,结合区块链及数据库,实现资料的智能分类与共享管理。同时,利用策略节点进行资料共享授权及核验,从而优化审核流程,提升效率并降低成本。 展开更多
关键词 文件跨组织共享 双层存储 资料分级分类 入网审核 真实意愿核验
在线阅读 下载PDF
个人金融数据共享的法律障碍与分层规制路径
10
作者 姚舜禹 闫夏秋 《大数据》 2026年第1期96-110,共15页
个人金融数据共享对提升金融服务效率、实现协同监管和推动金融创新生态建设具有重要价值,但面临多重法律障碍。针对个人金融数据共享存在的产权界定争议、多元主体利益冲突和监管过度问题,提出基于数据来源者视角的分层治理框架。对个... 个人金融数据共享对提升金融服务效率、实现协同监管和推动金融创新生态建设具有重要价值,但面临多重法律障碍。针对个人金融数据共享存在的产权界定争议、多元主体利益冲突和监管过度问题,提出基于数据来源者视角的分层治理框架。对个人私密信息主张基于动态隐私期待进行场景化治理,以平衡隐私保护与利用;对个人非私密信息提出优化告知同意规则,以缓解保护绝对化并促进流通;对非个人信息建议确立数据访问权并实施强制共享,以破除垄断壁垒。规制对策包括明确私密信息识别标准、调适非私密信息告知同意规则、构建非个人信息数据访问权制度,在分层基础上细化规则设计并适应技术与场景发展。 展开更多
关键词 个人金融数据 数据共享 分层规制 数据访问权
在线阅读 下载PDF
Privacy Protection Based Access Control Scheme in Cloud-Based Services 被引量:3
11
作者 Kai Fan Qiong Tian +2 位作者 Junxiong Wang Hui Li Yintang Yang 《China Communications》 SCIE CSCD 2017年第1期61-71,共11页
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu... With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services. 展开更多
关键词 access control data sharing privacy protection cloud-based services
在线阅读 下载PDF
An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures 被引量:2
12
作者 PANG Liaojun LI Huixian WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1649-1652,共4页
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n... A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures. 展开更多
关键词 CRYPTOGRAPHY information security secret sharing access structure
在线阅读 下载PDF
Achieving Fine-Grained and Flexible Access Control on Blockchain-Based Data Sharing for the Internet of Things 被引量:3
13
作者 Ruimiao Wang Xiaodong Wang +2 位作者 Wenti Yang Shuai Yuan Zhitao Guan 《China Communications》 SCIE CSCD 2022年第6期22-34,共13页
The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upo... The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upon blockchain have been explored recently for Internet of Things(IoTs).However,the access from a legitimate user may be denied without the pre-defined policy and data update on the blockchain could be costly to the owners.In this paper,we first address these issues by incorporating the Accountable Subgroup Multi-Signature(ASM)algorithm into the Attribute-based Access Control(ABAC)method with Policy Smart Contract,to provide a finegrained and flexible solution.Next,we propose a policy-based Chameleon Hash algorithm that allows the data to be updated in a reliable and convenient way by the authorized users.Finally,we evaluate our work by comparing its performance with the benchmarks.The results demonstrate significant improvement on the effectiveness and efficiency. 展开更多
关键词 blockchain access control smart contract MULTI-SIGNATURE chameleon-hash data sharing Internet of Things
在线阅读 下载PDF
共享Access数据库设计和开发策略研究 被引量:1
14
作者 王彦良 《延安职业技术学院学报》 2014年第5期153-154,共2页
Access是微软公司下的一种关系型数据库系统,简单易用,现在被大多数用户使用。ACCESS数据库有两种模式:共享模式和独占模式,在独占模式下,只有一个用户使用数据库是可行的。但是在共享模式下,多人使用ACCESS数据库时数据库经常会被锁死... Access是微软公司下的一种关系型数据库系统,简单易用,现在被大多数用户使用。ACCESS数据库有两种模式:共享模式和独占模式,在独占模式下,只有一个用户使用数据库是可行的。但是在共享模式下,多人使用ACCESS数据库时数据库经常会被锁死。本文就针对这样的问题,提出了几种在共享ACCESS数据库开发时的策略。解决在共享模式下的诸多问题,大大加快了开发的效率。 展开更多
关键词 access 数据库 管理系统 共享模式
在线阅读 下载PDF
基于Access Grid的共享应用程序开发
15
作者 朱旭庆 宋广华 黄争舸 《计算机应用研究》 CSCD 北大核心 2007年第4期223-225,共3页
为降低基于AG的共享应用程序的开发难度,在AG体系结构以及相关的API基础上实现了一个开发框架。利用此框架,能够在很大程度上提高开发共享应用程序的效率并缩短开发周期。此外,该框架还提供了一个通用访问界面,方便用户集成和调用相应... 为降低基于AG的共享应用程序的开发难度,在AG体系结构以及相关的API基础上实现了一个开发框架。利用此框架,能够在很大程度上提高开发共享应用程序的效率并缩短开发周期。此外,该框架还提供了一个通用访问界面,方便用户集成和调用相应的共享应用程序。 展开更多
关键词 网格 访问网格 虚拟会议 视频会议 共享应用程序
在线阅读 下载PDF
基于ACCESS的产品实时库存及质量检验管理系统 被引量:2
16
作者 郁雷 张骋 樊黎 《计算机时代》 2015年第7期42-45,共4页
为使产品库存和产品质量检验数据管理规范化、便捷化,并且在企业内部局域网实现数据共享,对企业的库存管理方式和产品质检过程进行充分调研,针对中小型机械制造类企业的实际需求,利用Microsoft Access 2003开发了产品实时库存及质量检... 为使产品库存和产品质量检验数据管理规范化、便捷化,并且在企业内部局域网实现数据共享,对企业的库存管理方式和产品质检过程进行充分调研,针对中小型机械制造类企业的实际需求,利用Microsoft Access 2003开发了产品实时库存及质量检验管理系统。实践证明,该数据库系统解决了企业旧的台账管理方式中数据处理机械化、低效率问题。 展开更多
关键词 access数据库 实时库存 质量检验 数据共享 中小企业
在线阅读 下载PDF
Downlink network-coded multiple access with diverse power
17
作者 Bohao Cao Zheng Xiang +2 位作者 Peng Ren Qiao Li Baoyi Xu 《Digital Communications and Networks》 SCIE CSCD 2024年第4期956-964,共9页
Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have differen... Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have different Quality of Service(QoS)requirements.Hence,we study the power allocation in the downlink NCMA system in this paper,and propose a downlink Network-Coded Multiple Access with Diverse Power(NCMA-DP),wherein different amounts of power are allocated to different users.In terms of the Bit Error Rate(BER)of the multi-user decoder,and the number of packets required to correctly decode the message,the performance of the user with more allocated power is greatly improved compared to the Conventional NCMA(NCMA-C).Meanwhile,the performance of the user with less allocated power is still much better than NCMA-C.Furthermore,the overall throughput of NCMA-DP is greatly improved compared to that of NCMA-C.The simulation results demonstrate the remarkable performance of the proposed NCMA-DP. 展开更多
关键词 Network-coded multiple access Physical-layer network coding multi-user decoder Power allocation Throughput Downlink network
在线阅读 下载PDF
Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System
18
作者 Youngho Park Su Jin Shin Sang Uk Shin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期671-688,共18页
Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly... Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly,to reduce the on-chain storage cost,a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform.Moreover,the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace.In the data marketplace,it is a challenge how to trade the data securely outsourced to the external cloud in a way that restricts access to the data only to authorized users across multiple domains.In this paper,we propose a cross-domain bilateral access control protocol for blockchain-cloud based data trading systems.We consider a system model that consists of domain authorities,data senders,data receivers,a blockchain layer,and a cloud provider.The proposed protocol enables access control and source identification of the outsourced data by leveraging identity-based cryptographic techniques.In the proposed protocol,the outsourced data of the sender is encrypted under the target receiver’s identity,and the cloud provider performs policy-match verification on the authorization tags of the sender and receiver generated by the identity-based signature scheme.Therefore,data trading can be achieved only if the identities of the data sender and receiver simultaneously meet the policies specified by each other.To demonstrate efficiency,we evaluate the performance of the proposed protocol and compare it with existing studies. 展开更多
关键词 Bilateral access control blockchain data sharing policy-match
在线阅读 下载PDF
Sub-channel shared resource allocation for multi-user distributed MIMO-OFDM systems
19
作者 Na-e ZHENG You ZHOU +1 位作者 Han-ying HU Sheng WANG 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2014年第11期1048-1057,共10页
Well-controlled resource allocation is crucial for promoting the performance of multiple input multiple output orthogonal frequency division multiplexing(MIMO-OFDM) systems. Recent studies have focused primarily on tr... Well-controlled resource allocation is crucial for promoting the performance of multiple input multiple output orthogonal frequency division multiplexing(MIMO-OFDM) systems. Recent studies have focused primarily on traditional centralized systems or distributed antenna systems(DASs), and usually assumed that one sub-carrier or sub-channel is exclusively occupied by one user. To promote system performance, we propose a sub-channel shared resource allocation algorithm for multiuser distributed MIMO-OFDM systems. Each sub-channel can be shared by multiple users in the algorithm, which is different from previous algorithms. The algorithm assumes that each user communicates with only two best ports in the system. On each sub-carrier, it allocates a sub-channel in descending order, which means one sub-channel that can minimize signal to leakage plus noise ratio(SLNR) loss is deleted until the number of remaining sub-channels is equal to that of receiving antennas. If there are still sub-channels after all users are processed, these sub-channels will be allocated to users who can maximize the SLNR gain. Simulations show that compared to other algorithms, our proposed algorithm has better capacity performance and enables the system to provide service to more users under the same capacity constraints. 展开更多
关键词 MIMO-OFDM multi-user Resource allocation Sub-channel shared Signal to leakage plus noise ratio(SLNR)
原文传递
HYBRID ORTHOGONAL/RANDOM MULTIPLE ACCESS SCHEME WITH IMPROVED PERFORMANCE FOR DOWNLINK CDMA SYSTEMS
20
作者 Zhou Gao Fan Pingzhi Hao Li 《Journal of Electronics(China)》 2008年第1期47-52,共6页
In this paper, a hybrid orthogonal and random multiple access scheme with improved performance for capacity-enhanced downlink Code-Division Multiple-Access (CDMA) systems is presented, which is in fact a combination o... In this paper, a hybrid orthogonal and random multiple access scheme with improved performance for capacity-enhanced downlink Code-Division Multiple-Access (CDMA) systems is presented, which is in fact a combination of the conventional orthogonal spreading scheme and the synchronous Interleave Division Multiple Access (IDMA) scheme. The proposed scheme can achieve near single user performance for very large number of users by the iterative turbo like detection. Analysis and simulation results show that the proposed scheme performs better than the synchronous IDMA scheme for the same time complexity. Meanwhile, larger capacity can be provided compared with the conventional orthogonal schemes. 展开更多
关键词 Code-Division Multiple-access (CDMA) Interleave-Division Multiple-access (IDMA) multi-user Detection (MUD) Hybrid multiple access
在线阅读 下载PDF
上一页 1 2 42 下一页 到第
使用帮助 返回顶部