Notice
There is currently an issue with the citation download feature. Learn more

Universal Personal Communications, 1998. ICUPC '98. IEEE 1998 International Conference on

5-9 Oct. 1998

Go

Filter Results

Displaying Results 1 - 25 of 96
  • IEEE 1998 International Conference on Universal Personal Communications [front matter]

    Publication Year: 1998, Page(s):i - xxxiii
    Request permission for commercial reuse | PDF file iconPDF (1245 KB)
    Freely Available from IEEE
  • Authors

    Publication Year: 1998, Page(s):vii - xi
    Request permission for commercial reuse | PDF file iconPDF (232 KB)
    Freely Available from IEEE
  • A matrix-algebraic approach to linear hybrid interference cancellation in CDMA

    Publication Year: 1998, Page(s):1319 - 1323 vol.2
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    In this paper we consider a matrix algebraic approach to a linear hybrid interference canceller (HIC). This scheme is a combination of parallel and successive cancellation. It is shown that both the single-stage and multistage linear HIC can be expressed as a one-shot linear matrix filter on the received chip-matched filtered signal vector. It is proved that if the linear HIC converges, it will co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced channel access protocol for DECT systems with multimedia traffic

    Publication Year: 1998, Page(s):1049 - 1053 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    According to the idea of an enhanced wireless access interface to the fixed network in a prospective UMTS scenario, DECT is required to efficiently support multimedia traffic while guaranteeing the effective sharing and exploitation of the limited radio resources. To this aim, a modified channel access algorithm, based on slot-segmentation during the channel contention phase, is designed and the e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonlinear channels: predistortion or enhanced detection?

    Publication Year: 1998, Page(s):1117 - 1122 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    Using a union bound on the error probability of optimal receivers for nonlinear channels, this work points out important factors affecting the error performance in the simple case of M-ary pulse amplitude modulation (M-PAM) with no intersymbol interference and unlimited transmission bandwidth. The performance is compared to that obtainable when the nonlinear device is perfectly linearized under a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DSP-based noncoherent detectors for multilevel signals in flat fading channels

    Publication Year: 1998, Page(s):1313 - 1317 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    This paper addresses the issue of recovering multilevel signals in the presence of slow, frequency nonselective fading and additive white Gaussian noise (AWGN). First, we present a novel noncoherent detector which performs approximate maximum likelihood detection in unknown amplitude and phase (ML-UAP). This ML-UAP detector is implemented using the Viterbi algorithm (VA), which we call the subopti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the utilization of voice-unused resource for data transmission in PRMA systems

    Publication Year: 1998, Page(s):1043 - 1047 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    In the paper voice-unused resource in a voice-only PRMA system is analyzed. A mechanism for the detection of voice-unused resource is proposed. How to use the voice-unused resource for data transmission is proposed. Therefore, the voice subsystem is totally a voice-only PRMA system, and the existence of data transmission just improves the channel utilization efficiency, without any influence on th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of an ATM-based access segment for third generation mobile systems

    Publication Year: 1998, Page(s):847 - 851 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    An issue in third-generation mobile systems theory, e.g., UMTS, is integration with B-ISDN. We design a UMTS segment under the assumption that it is ATM-based. A pertinent design process is defined and various problems that arise in this context are highlighted. Finally, a case study is conducted, concluding remarks are drawn and issues for further study are presented. The work of this paper highl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On noncoherent sequence detection of continuous phase modulations

    Publication Year: 1998, Page(s):1111 - 1115 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    Based on Laurent (1986) decomposition of a multilevel continuous phase modulation (CPM) as a sum of linearly modulated components, we derive new noncoherent sequence detection algorithms for M-ary CPM signals transmitted over additive white Gaussian noise (AWGN) channels. Noncoherent sequence detection based on the Viterbi algorithm (.) has been proposed for linearly modulated signals. These schem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of FH/CDMA and DS/CDMA for wireless survivable networks

    Publication Year: 1998, Page(s):1305 - 1309 vol.2
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    The future of military radio networks is changing dramatically along with commercial radio systems. Users are demanding higher bandwidths to support video, image, file transfers, and high quality voice. The methods for supplying capacity retains the centralized approach for commercial systems due to improved cell coverage, hand-off requirements, and access to the wired infrastructure. The military... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of the PRMA protocol for voice and data transmissions in low Earth orbit mobile satellite systems

    Publication Year: 1998, Page(s):1037 - 1041 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    The Universal Mobile Telecommunications System (UMTS) will provide multimedia services to users in whatever environment via uniform service access procedures. Efficient medium access control (MAC) protocols are needed to guarantee a high capacity. This paper deals with packet reservation multiple access (PRMA), widely considered as an efficient MAC protocol in terrestrial microcellular systems, fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In-service link quality estimation for link adaptation algorithms, applied to GSM

    Publication Year: 1998, Page(s):1169 - 1173 vol.2
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    This paper investigates link quality estimates for GSM, in order to use them as an input for link adaptation algorithms. Two channel heuristics are extracted from the GSM transmission chain. Their suitability as triggering criteria is assessed by mapping them onto a bit error rate estimate. Then a real bit error rate characterisation is outlined, and the prediction error obtained is compared to th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of polling protocols for data transmission on wireless communication networks

    Publication Year: 1998, Page(s):1241 - 1245 vol.2
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    The growing interest of mobile computing and communication devices, leads to the needs of wireless broadband networks. Data transmission over such networks requires suitable error control schemes to guarantee high data reliability as well as efficient bandwidth utilization. This paper proposes an accurate but simple analytical approach to evaluate the performance of wireless networks using gated a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensor-assisted multiple access protocols for wireless networks

    Publication Year: 1998, Page(s):1149 - 1153 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    This paper describes a neural network-based system for stabilizing Aloha random access networks. A grid of sensors is used to gather energy measurements for the neural network. The neural network has been trained to estimate the number of colliding users in a given slot. This information is used to set the parameters of the backoff algorithm so as to stabilize the network. This information can als... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic reservation integrated services multiple access for wireless ATM networks

    Publication Year: 1998, Page(s):841 - 845 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    A new dynamic reservation integrated services multiple access (DRISMA) protocol is proposed for the emerging wireless ATM networks. Compared to other PRMA-based protocols, DRISMA has two distinctive features. First, while each voice station reserves isochronous channels by capturing mini-slots, both the capturing probability and the number of mini-slots per frame are adjusted dynamically to enhanc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Noncoherent sequence detection of coded linear modulations

    Publication Year: 1998, Page(s):1105 - 1109 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    New noncoherent sequence detection algorithms for combined demodulation and decoding of coded amplitude/phase modulations transmitted over additive white Gaussian noise (AWGN) channels are presented. Optimal noncoherent sequence detection requires a tree search and a complexity exponentially increasing with the duration of the transmission. In order to realize simple suboptimal receivers based on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel concatenated coding schemes for wireless application

    Publication Year: 1998, Page(s):807 - 811 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    We design parallel concatenated convolutional coding (PCCC) schemes (“turbo codes”) suitable for wireless applications requiring short latencies. Particular attention is devoted to the comparison of different solutions for the code interleaver. A new algorithm is applied to the evaluation of the distance spectrum of the overall PCCC, and several interleaver alternatives are analyzed an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security issues for wireless ATM networks

    Publication Year: 1998, Page(s):1359 - 1363 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    To be able to fulfil the need of the wireless ATM user, the system has to acquire features. One of the system features required for the wireless ATM is functionality, especially the security aspect. There is so far little, or no, security consideration in the development of the wireless ATM standard. Therefore a wide range of features in the security functions are under consideration. This paper d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A low-complexity multiuser detector for CDMA QPSK communication systems with adaptive antenna arrays

    Publication Year: 1998, Page(s):1195 - 1199 vol.2
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    This paper deals with a multiuser detector for DS-CDMA wireless communication systems. The proposed detector's main feature lies in the joint utilization of the space and time processing techniques since adaptive antenna arrays and decorrelating multiuser receiver are supposed to be used together. The complexity growth is lowered by implementing a multiuser detection technique based on the sliding... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of IFDMA to mobile radio transmission

    Publication Year: 1998, Page(s):1267 - 1272 vol.2
    Cited by:  Papers (14)  |  Patents (66)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    “Interleaved frequency-division multiple-access” (IFDMA) has been introduced which is a new spread-spectrum multiple-access scheme showing several advantages over other multiple-access schemes. In this paper, the application of IFDMA to mobile radio transmission is considered. Especially, the frequency-diversity achievable with IFDMA taking into account the influence of pulse shaping i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bootstrap equalization

    Publication Year: 1998, Page(s):1221 - 1225 vol.2
    Cited by:  Papers (6)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    We introduce bootstrapping as a generic method for improving channel equalization in TDMA cellular systems where the channels remain approximately constant over a transmitted burst. Bootstrapping implies that the detection is repeated, using an equalizer tuned with detected symbols. The procedure can be iterated to achieve even better performance. The initial equalizer is assumed to be tuned using... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A pilot symbol assisted compensation scheme of fading and frequency offset for 16QAM

    Publication Year: 1998, Page(s):921 - 924 vol.2
    Cited by:  Papers (1)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    Pilot symbol assisted modulation (PSAM) has been proposed to compensate the distortion of the transmission lines. It is mainly targeted at fading such as Rayleigh and Rician. In one of the PSAM techniques, the compensation scheme using the fast Fourier transform (FFT) has characteristics including a simple zero insertion and precise estimation even in fast fading environments. We use this scheme t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Narrowband interference suppression in spread spectrum CDMA communications using pipelined recurrent neural networks

    Publication Year: 1998, Page(s):1299 - 1303 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    This paper investigates the application of pipelined recurrent neural networks (PRNN) to the narrowband interference (NBI) suppression over spread spectrum CDMA channels in the presence of AWGN plus non-Gaussian observation noise. Optimal detectors and receivers for such channels are no longer linear. A PRNN that consists of a number of simpler small-scale recurrent neural network (RNN) modules wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple link packet access for wireless cellular networks

    Publication Year: 1998, Page(s):1031 - 1035 vol.2
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    The potential to provide multiple logical packet links to distant base stations exists in a reasonable part of the coverage area either by overlapping or hierarchical cell structure. This potential can be tapped in a packet mode to increase system throughput, improve performance and simplify the mobility and handoff procedures. Our discussion includes four key issues: (i) multiple link packet prot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Microcell performance evaluation in IS-95 based CDMA networks

    Publication Year: 1998, Page(s):899 - 903 vol.2
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    A practical CDMA microcell structure is systematically studied on both forward link and reverse link. The embedded microcell shares the same frequency and has full connectivity with the overlaying macrocell. The capacity of microcell and macrocell are derived and simulated at various traffic distributions. The microcell capacity is 1.03 to 1.12 times that of a regular cell. The capacity of the com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.