Performance evaluation of proposed asymmetric turbo code in WCDMA HSDPA system
This paper considers the application of the proposed asymmetric turbo code system in MIMO High Speed Downlink Packet Access (HSDPA) service of WCDMA. In typical turbo code system, an encoder with code rate 1/3 is used together with bit repetition to achieve the code rate 1/4. However, this approach...
| Main Authors: | Ramasamy, K., Balamuralithara, B., Siddiqi, Mohammad Umar |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/14287/ http://irep.iium.edu.my/14287/1/Conf_-_2009_-__Performance_Evaluation_of_Proposed_Asymmetric_Turbo_Code_in_WBCDMA_HSDPA_System.pdf |
Similar Items
Optimal power allocation for the proposed asymmetric turbo code for 3G systems
by: Ramasamy, K., et al.
Published: (2009)
by: Ramasamy, K., et al.
Published: (2009)
Turbo Codes For Error Control In JPEG Image Transmission
by: Ramasamy, K.
Published: (2005)
by: Ramasamy, K.
Published: (2005)
Transform domain characterization of cyclic codes over Zm
by: Rajan, Sundar B., et al.
Published: (1994)
by: Rajan, Sundar B., et al.
Published: (1994)
Turbo codes: an error correction technique for 4G
by: Masud , Mosharrof Hussain, et al.
Published: (2011)
by: Masud , Mosharrof Hussain, et al.
Published: (2011)
Performance evaluation of a secure Low Level Reader Protocol
(LLRP) connection
by: Qadir, Sana, et al.
Published: (2009)
by: Qadir, Sana, et al.
Published: (2009)
Mobility support in nested NEMO: Proposals review and evaluation
by: Senan, Shayma, et al.
Published: (2010)
by: Senan, Shayma, et al.
Published: (2010)
Ultra wideband antenna with band notch using asymmetrical feedline
by: Alam, A. H. M. Zahirul, et al.
Published: (2011)
by: Alam, A. H. M. Zahirul, et al.
Published: (2011)
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings
by: Udaya, Paramapalli, et al.
Published: (1998)
by: Udaya, Paramapalli, et al.
Published: (1998)
Optimal biphase sequences with large linear complexity derived from sequences over Z4
by: Udaya, Paramapalli, et al.
Published: (1996)
by: Udaya, Paramapalli, et al.
Published: (1996)
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment
by: Qadir, Sana, et al.
Published: (2011)
by: Qadir, Sana, et al.
Published: (2011)
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013)
by: Hakiem, Nashrul, et al.
Published: (2013)
A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2014)
by: Tahir, Mohammad, et al.
Published: (2014)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Analysis of autocorrelation function of Boolean functions in Haar domain
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
The Haar-Recursive transform and its consequence to the Walsh-paley spectrum and the autocorrelation function
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Haar spectrum of Bent Boolean functions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
The avalanche and propagation characteristics from Haar
perspective with extended linear and Bent Haar
conditions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
Haar spectrum based construction of resilient and plateaued boolean functions
by: Rafiq, Hashum M., et al.
Published: (2017)
by: Rafiq, Hashum M., et al.
Published: (2017)
Correlation immunity and resiliency of boolean functions from haar domain perspective
by: Rafiq, Hashum M., et al.
Published: (2015)
by: Rafiq, Hashum M., et al.
Published: (2015)
Haar transformation of linear boolean function
by: Mohamed Rafiq, Hashum, et al.
Published: (2009)
by: Mohamed Rafiq, Hashum, et al.
Published: (2009)
Analysis and synthesis of cryptographic Boolean functions in Haar domain: Initial results
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
A framework for describing block cipher cryptanalysis
by: Phan, Raphael C. W., et al.
Published: (2006)
by: Phan, Raphael C. W., et al.
Published: (2006)
A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node
by: Qadir , Sana, et al.
Published: (2012)
by: Qadir , Sana, et al.
Published: (2012)
Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
by: Hakiem, Nashrul, et al.
Published: (2015)
by: Hakiem, Nashrul, et al.
Published: (2015)
Generalized discrete fourier transform based minimization
of PAPR in OFDM systems
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2014)
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2014)
Wireless physical layer security using encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Wireless physical layer security using channel state information
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Multilayers fast mode decision algorithm for scalable video coding: design, implementation, and streaming evaluation on IEEE 802.11g wireless LAN
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
BER performance of OFDM system with the effect of error control code
by: Jamil, Muhammad Sobrun, et al.
Published: (2014)
by: Jamil, Muhammad Sobrun, et al.
Published: (2014)
Multilayers fast mode decision algorithms for scalable video coding
by: Gunawan, Teddy Surya, et al.
Published: (2011)
by: Gunawan, Teddy Surya, et al.
Published: (2011)
An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
Proposed path loss models for suburban area in Kuala Lumpur
by: Chebil, Jalel, et al.
Published: (2011)
by: Chebil, Jalel, et al.
Published: (2011)
The use of convolutional code for narrowband interference suppression in OFDM-DVBT system
by: Abdullah, Aizura, et al.
Published: (2015)
by: Abdullah, Aizura, et al.
Published: (2015)
The use of convolutional code for narrowband interference suppression in OFDM-DVBT System
by: Abdullah, Aizura, et al.
Published: (2014)
by: Abdullah, Aizura, et al.
Published: (2014)
Speech recognition system using MATLAB : design, implementation, and samples codes
by: Abushariah, Ahmad A. M., et al.
Published: (2011)
by: Abushariah, Ahmad A. M., et al.
Published: (2011)
Energy harvesting network with wireless distributed computing
by: Alfaqawi, Mohammed, et al.
Published: (2019)
by: Alfaqawi, Mohammed, et al.
Published: (2019)
Generation of IPv6 addresses based on one-to-many reversible mapping using AES
by: Hakiem, Nashrul, et al.
Published: (2012)
by: Hakiem, Nashrul, et al.
Published: (2012)
Similar Items
-
Optimal power allocation for the proposed asymmetric turbo code for 3G systems
by: Ramasamy, K., et al.
Published: (2009) -
Turbo Codes For Error Control In JPEG Image Transmission
by: Ramasamy, K.
Published: (2005) -
Transform domain characterization of cyclic codes over Zm
by: Rajan, Sundar B., et al.
Published: (1994) -
Turbo codes: an error correction technique for 4G
by: Masud , Mosharrof Hussain, et al.
Published: (2011) -
Performance evaluation of a secure Low Level Reader Protocol
(LLRP) connection
by: Qadir, Sana, et al.
Published: (2009)