This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
In the first part of the paper, the capacity of a general multiuser code division multiple access (CDMA) jamming channel was analyzed for noncooperative and cooperative users in up...
This work analyses two heuristic algorithms based on the genetic evolution theory applied to direct sequence code division multiple access (DS/CDMA) communication systems. For diff...
This paper presents an interference suppression using subband adaptive array for space-time block coding (STBC) code division multiple access (CDMA) under the frequency selective ...
Nordin Bin Ramli, Xuan Nam Tran, Tetsuki Taniguchi...
Abstract: While code division multiple access (CDMA) is becoming a promising cellular communication system, the design for a CDMA cellular system configuration has posed a practica...
: This paper introduces the use of decimal sequences in a code division multiple access (CDMA) based watermarking system to hide information for authentication in black and white i...
Abstract-- We consider code division multiple access communication over a binary input additive white Gaussian noise channel using random spreading. For a general class of symmetri...
Variable environments in ad hoc networks require a joint control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. In this paper,...
—Interleave division multiple access (IDMA) and orthogonal frequency division multiplexing – interleave division multiple access (OFDM-IDMA) have been proposed for beyond third...
— This letter considers a combined source-channel coding scheme for image transmission over the uplink of a wireless IS-95 code division multiple access (CDMA) channel using disc...
In the upcoming high transmission rate system, based on code division multiple access, standard multi-user detection methods are restricted because of performance and implementati...