Optimal power allocation for the proposed asymmetric turbo code for 3G systems
We proposed a new class of asymmetric turbo encoder for 3G systems that performs well in both “water fall” and “error floor” regions in Ramasamy et al. [Weight distribution analysis of proposed asymmetric turbo code for improved performance, Int J Electron Commun 60(7) 479–93]. In this paper, a mod...
| Main Authors: | Ramasamy, K., Balamuralithara, B., Siddiqi, Muhammad Umar |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
ELSEVIER
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/14285/ http://irep.iium.edu.my/14285/1/2009_-_Optimal_Power_Allocation_For_The_Proposed_Asymmetric_Turbo_Code_for_3G_Systems.pdf |
Similar Items
Performance evaluation of proposed asymmetric turbo code in WCDMA HSDPA system
by: Ramasamy, K., et al.
Published: (2009)
by: Ramasamy, K., et al.
Published: (2009)
Turbo codes: an error correction technique for 4G
by: Masud , Mosharrof Hussain, et al.
Published: (2011)
by: Masud , Mosharrof Hussain, et al.
Published: (2011)
Turbo Codes For Error Control In JPEG Image Transmission
by: Ramasamy, K.
Published: (2005)
by: Ramasamy, K.
Published: (2005)
Transform domain characterization of cyclic codes over Zm
by: Rajan, Sundar B., et al.
Published: (1994)
by: Rajan, Sundar B., et al.
Published: (1994)
Self-organized HGBBDSA approach for the power allocation in OFDMA-based heterogeneous network
by: Mohammad Kamrul, Hasan, et al.
Published: (2016)
by: Mohammad Kamrul, Hasan, et al.
Published: (2016)
Optimizing time and power allocation for cooperation diversity in a decode-and-forward three-node relay channel
by: Elsheikh, Elsheikh Mohamed Ahmed
Published: (2008)
by: Elsheikh, Elsheikh Mohamed Ahmed
Published: (2008)
The impact of time and power allocation on the performance of the three-node decode and-forward relay channel
by: Khairol Fauzi, Muhammad Zarol Fitri, et al.
Published: (2017)
by: Khairol Fauzi, Muhammad Zarol Fitri, et al.
Published: (2017)
AWGN and rayleigh fading behavior of the wireless decode-and-forward relay channel with arbitrary time and power allocation
by: Zarol Fitri Khairol Fauz, Muhammad Zarol Fitri, et al.
Published: (2018)
by: Zarol Fitri Khairol Fauz, Muhammad Zarol Fitri, et al.
Published: (2018)
Optimal biphase sequences with large linear complexity derived from sequences over Z4
by: Udaya, Paramapalli, et al.
Published: (1996)
by: Udaya, Paramapalli, et al.
Published: (1996)
Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings
by: Udaya, Paramapalli, et al.
Published: (1998)
by: Udaya, Paramapalli, et al.
Published: (1998)
Self-organizing joint sensing and power allocation scheme (SJSPA) to coordinate cross-tier interference for LTE-A heterogeneous networks
by: Hasan, Mohammad Kamrul, et al.
Published: (2014)
by: Hasan, Mohammad Kamrul, et al.
Published: (2014)
Multilayers fast mode decision algorithm for scalable video coding: design, implementation, and streaming evaluation on IEEE 802.11g wireless LAN
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
Ultra wideband antenna with band notch using asymmetrical feedline
by: Alam, A. H. M. Zahirul, et al.
Published: (2011)
by: Alam, A. H. M. Zahirul, et al.
Published: (2011)
Dynamic channel allocation scheme for mobile satellite systems
by: Anthony, Angeline, et al.
Published: (2003)
by: Anthony, Angeline, et al.
Published: (2003)
On iterative low-complexity algorithm for optimal antenna selection and joint transmit power allocation under impact pilot contamination in downlink 5g massive MIMO systems
by: Mohammed Ahmed, Adeeb Ali
Published: (2020)
by: Mohammed Ahmed, Adeeb Ali
Published: (2020)
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment
by: Qadir, Sana, et al.
Published: (2011)
by: Qadir, Sana, et al.
Published: (2011)
Performance evaluation of a secure Low Level Reader Protocol
(LLRP) connection
by: Qadir, Sana, et al.
Published: (2009)
by: Qadir, Sana, et al.
Published: (2009)
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013)
by: Hakiem, Nashrul, et al.
Published: (2013)
A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2014)
by: Tahir, Mohammad, et al.
Published: (2014)
Resource allocation technique for video streaming applications in the LTE system
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2010)
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2010)
Self-organizing spectrum allocation (SON-SA) scheme for heterogeneous network
by: Hasan, Mohammad Kamrul, et al.
Published: (2014)
by: Hasan, Mohammad Kamrul, et al.
Published: (2014)
Game theory for resource allocation in heterogeneous wireless networks - a review
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Analysis of autocorrelation function of Boolean functions in Haar domain
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
The Haar-Recursive transform and its consequence to the Walsh-paley spectrum and the autocorrelation function
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Haar spectrum of Bent Boolean functions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
The avalanche and propagation characteristics from Haar
perspective with extended linear and Bent Haar
conditions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
Haar spectrum based construction of resilient and plateaued boolean functions
by: Rafiq, Hashum M., et al.
Published: (2017)
by: Rafiq, Hashum M., et al.
Published: (2017)
Correlation immunity and resiliency of boolean functions from haar domain perspective
by: Rafiq, Hashum M., et al.
Published: (2015)
by: Rafiq, Hashum M., et al.
Published: (2015)
Haar transformation of linear boolean function
by: Mohamed Rafiq, Hashum, et al.
Published: (2009)
by: Mohamed Rafiq, Hashum, et al.
Published: (2009)
Analysis and synthesis of cryptographic Boolean functions in Haar domain: Initial results
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
Bandwidth allocation policy using the game theory model in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
A framework for describing block cipher cryptanalysis
by: Phan, Raphael C. W., et al.
Published: (2006)
by: Phan, Raphael C. W., et al.
Published: (2006)
A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node
by: Qadir , Sana, et al.
Published: (2012)
by: Qadir , Sana, et al.
Published: (2012)
Wireless decode-and-forward relay channels: time allocation strategies for cooperation and optimum operation
by: Elsheikh, Elsheikh Mohamed Ahmed
Published: (2010)
by: Elsheikh, Elsheikh Mohamed Ahmed
Published: (2010)
Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
by: Hakiem, Nashrul, et al.
Published: (2015)
by: Hakiem, Nashrul, et al.
Published: (2015)
Generalized discrete fourier transform based minimization
of PAPR in OFDM systems
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2014)
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2014)
Wireless physical layer security using encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Similar Items
-
Performance evaluation of proposed asymmetric turbo code in WCDMA HSDPA system
by: Ramasamy, K., et al.
Published: (2009) -
Turbo codes: an error correction technique for 4G
by: Masud , Mosharrof Hussain, et al.
Published: (2011) -
Turbo Codes For Error Control In JPEG Image Transmission
by: Ramasamy, K.
Published: (2005) -
Transform domain characterization of cyclic codes over Zm
by: Rajan, Sundar B., et al.
Published: (1994) -
Self-organized HGBBDSA approach for the power allocation in OFDMA-based heterogeneous network
by: Mohammad Kamrul, Hasan, et al.
Published: (2016)