Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (Cat. No.98TH8361)

8-11 Sept. 1998

Go

Filter Results

Displaying Results 1 - 25 of 111
  • Personal, Indoor and Mobile Radio Communications '98

    Publication Year: 1998, Page(s):0_3 - 0_16
    Request permission for commercial reuse | PDF file iconPDF (957 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1998, Page(s):1575 - 1581
    Request permission for commercial reuse | PDF file iconPDF (391 KB)
    Freely Available from IEEE
  • Approximation of an integrated CDMA system

    Publication Year: 1998, Page(s):1045 - 1049 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    There is a limited amount of RF spectrum that has been allocated by the FCC to cellular communications (800-900 MHz and 1.8-2.0 GHz). To increase capacity, the only alternatives available, in lieu of increasing available RF spectrum, are to invent new technology or to more efficiently use the currently available technology. The Telecommunication Industry Association (TIA) has standardized CDMA as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning algorithms for blind multiuser detection in CDMA downlink

    Publication Year: 1998, Page(s):1040 - 1044 vol.3
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    CDMA (code division multiple access) is a multiple access technique based on spread spectrum methods. In a downlink signal processing, only the code of the mobile phone user is known, while the codes of the interfering users are unknown. Blind source separation or multiuser detection is an approach offering the solution to this problem. In this work, we compare novel and efficient learning blind s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic load sharing algorithm through power control in cellular CDMA

    Publication Year: 1998, Page(s):1280 - 1284 vol.3
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    An algorithm that dynamically maximizes the CDMA capacity usage by adjacent cell load sharing is proposed and investigated via simulation. For comparison purposes, the scheme proposed by Hanly (see IEEE J. Select. Areas Commun., vol.14, no.7, p.1332-41, Sept. 1995) is reviewed and a set of criteria is established for the comparison. It is conjectured that the proposed algorithm is amenable to prac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using higher order constellations with minimum mean square error (MMSE) receiver for severe multipath CDMA channel

    Publication Year: 1998, Page(s):1035 - 1039 vol.3
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    Third generation wireless systems are expected to be characterized by high data rates and multimedia traffic. This paper is a preliminary investigation to determine if two dimensional higher order constellations, in conjunction with code division multiple access (CDMA), can be used to support the data communication needs of such systems. We compare the performance of QPSK and 16-QAM in a high mult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coverage prediction for cellular networks from limited signal strength measurements

    Publication Year: 1998, Page(s):1147 - 1151 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    The quality of coverage of any wireless network design depends on the accuracy of the propagation model. For accurate designs, the propagation models are estimated from signal strength measurements taken in the service area. Even though it is known that modeling error is introduced when only a few signal strength measurements are processed, this is not completely understood. In this paper, we inve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CFAR TMDA burst detection schemes for constant modulus signals

    Publication Year: 1998, Page(s):1235 - 1239 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    In this paper, the performances of burst detection schemes which employ constant false-alarm rate (CFAR) algorithms are analyzed and compared. These schemes can be used for a typical time division multiple access (TDMA) protocol. The burst detection probabilities and corresponding false-alarm probabilities are derived to understand the effect of the received signal quality degradation at the recei... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DC offset canceller in a direct conversion receiver for QPSK signal reception

    Publication Year: 1998, Page(s):1314 - 1318 vol.3
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    This paper presents a method to remove the DC offset which degrades the performance of a direct conversion receiver for burst mode QPSK signals. A canceller constructed from analog and digital signal processing circuits is proposed. Computer simulation results show that the canceller has a remarkable function of reducing the degradation in BER (bit error rate) performance by only 0.4 dB. The resul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security system for wireless local area networks

    Publication Year: 1998, Page(s):1550 - 1554 vol.3
    Cited by:  Papers (1)  |  Patents (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    Security and privacy issues complicate wireless local area network deployment. For a wired network, certain levels of security are maintained since access to the physical medium is restricted to the devices physically connected to the network. Though wireless local area networks offer some built-in security features, security breaches are possible if appropriate precautions are not taken. This pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CDMA reverse link capacity in a Manhattan like microcellular system

    Publication Year: 1998, Page(s):1029 - 1034 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    In this paper, the effect of the hard and soft handoff on the reverse link capacity for a CDMA Manhattan like microcellular system is evaluated. We obtain analytical expressions for the relative other-cell interference factor as a function of the breakpoint, the cell radio, the variance of the random variation and the propagation path loss exponents for both hard and soft handoff. It is shown that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An experimental performance comparison between antenna diversity schemes at 1800 MHz

    Publication Year: 1998, Page(s):1141 - 1146 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    A measurement campaign to compare four different base station two-branch antenna diversity schemes in the 1800 MHz band has been carried out. The measurements were performed in such a way that the performance of the diversity schemes could be compared directly for different environments. The main conclusion to be drawn from this measurement campaign is that polarisation diversity schemes performed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CHOS-based channel tracking in cellular TDMA communications

    Publication Year: 1998, Page(s):1231 - 1234 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    The channel tracking problem in the reverse link of a TDMA cellular system exploiting cyclostationary higher order statistics (CHOS) is studied. An adaptive algorithm based on fourth-order cyclic cumulants of the fractionally spaced baseband received signal is derived. The algorithm reveals from experimental verification improved performance with respect to the traditional MMSE method View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance modeling and analysis of hierarchical wireless communications networks with overflow and take-back traffic

    Publication Year: 1998, Page(s):1176 - 1180 vol.3
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    Hierarchical structuring of cellular systems is an effective way to address the problem of continuing growth in traffic volume from users with varying degrees of mobility in wireless networks. Overflow and take-back strategies integrate the two tiers (microcell and macrocell) smoothly, within which both microcells and macrocells serve as a secondary resource to each other, taking into account the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High gain antennas in a random environment

    Publication Year: 1998, Page(s):1275 - 1279 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    The scattering environment encountered in mobile and personal communications is usually not considered as a practical background for directive antennas. However, when using adaptive antennas such as antenna arrays at each end of the link it is possible on average to achieve array gains almost as high as in free space. This presupposes a known channel at both ends which is a possibility with time-d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A predistorter for nonlinear distortion in multi-code CDMA systems

    Publication Year: 1998, Page(s):1481 - 1485 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    In this paper, we present a predistorter for compensating for nonlinear distortion introduced by high power amplifiers (HPAs) employed in multi-code code division multiple access (CDMA) systems. Since the multi-code CDMA system has the multi-level property in its signal amplitude, the performance of the system is severely degraded by the nonlinear effect of the HPA in the transmitter. In order to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed intelligent agent approach for fraud detection in PCS

    Publication Year: 1998, Page(s):1545 - 1549 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    Billions of dollars in revenue are lost annually on fraudulent use of telecommunications networks. The opportunities for fraudulent activity are greater in mobile communications as a result of the transport medium and the desire of network operators to attract large numbers of customers quickly. This paper describes problems currently encountered by mobile phone network operators and the technolog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Other cell interference and capacity of power controlled CDMA in wireless fixed access networks

    Publication Year: 1998, Page(s):1023 - 1028 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    We study here the reverse link interference of a power controlled CDMA network in wireless fixed access deployments. We show that the directionality of the subscriber antenna unit may significantly reduce the other cell interference and consequently increase the system frequency reuse. The frequency reuse gain is strongly dependent on the channel statistics as well as the beamwidth of the subscrib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple and accurate analysis method of SIC performance using spatial cell modeling in DS/CDMA system

    Publication Year: 1998, Page(s):1290 - 1293 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    A new cell modeling concept is proposed to analyze the performance of successive interference cancellation (SIC) with accuracy and simplicity. The conventional cell modeling method which distinguishes the user by each user's spreading code is complex to model and difficult to analyze the accurate performance due to the complexity of a realistic cell modeling. We proposed the spatial cell modeling ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capacity of TDMA cellular systems with slow Rayleigh fading counter-measures

    Publication Year: 1998, Page(s):1240 - 1244 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    This paper compares the performance of three techniques for providing tolerance to slow Rayleigh fading channels in cellular communication schemes: regular cyclic frequency hopping, adaptive modulation and coding, and dynamic carrier assignment (frequency jumping). It is assumed for the channels considered that the fading rates are slow enough that simple feedback adaptive techniques are applicabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Outage analysis of cellular systems in an arbitrary lognormal shadowed Rician environment

    Publication Year: 1998, Page(s):1136 - 1140 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    Current techniques used to tackle the outage problem in a lognormal shadowed (LNS) Rician environment follow the philosophy of using the chain rule in probability. The crucial issue is to determine the probability density function (pdf) of the total power of the co-channel interferers (CCI), ending up with a mathematically intractable integral of multiple fold. Results available in the literature,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of techniques for cochannel interference cancellation in TDMA communication systems

    Publication Year: 1998, Page(s):1226 - 1230 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    Different receiver structures that enable digitally modulated signals to be received in the presence of a number of similarly modulated cochannel interfering signals, which may additionally be dispersed in time owing to the influence of the channel, were investigated. Simplified MLSE techniques using decision feedback are analyzed mathematically and simulated. The performance of the different rece... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic engineering for the wireless LAN access point

    Publication Year: 1998, Page(s):1170 - 1175 vol.3
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    Today almost all popular wireless LAN applications such as web access, email processing, telnet, FTP, and data base access are using client-server architecture. A mobile client, such as a laptop equipped with a WLAN, connects to the wired backbone network through an access point (AP) to establish a connection to the fixed server providing the application. In planning to deploy a WLAN a system arch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cellular planning optimisation for non-uniform traffic distributions

    Publication Year: 1998, Page(s):1198 - 1202 vol.3
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    A cellular planning optimisation algorithm-the algorithm of coverage iteration with traffic partition-is presented, proposing, through a mixed structure of micro and macro cells, an optimum cellular planning for the coverage of an urban environment with a real (non-uniform) traffic distribution. The results of the algorithm, micro and macro cells radii and estimation of cells location, are obtaine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal array combiner and sequence detector in mobile radio channels

    Publication Year: 1998, Page(s):1270 - 1274 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    The use of spatial diversity at the receiver front-end together with a sequence detector implies a joint design problem of the spatial combiner and the sequence detector impulse response. This joint design is usually faced under the constraint that the impulse response of the sequence detector is matched to the channel and combiner response. This procedure maximizes the signal to noise ratio at th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.