1980
DOI: 10.1002/j.1538-7305.1980.tb03037.x
|View full text |Cite
|
Sign up to set email alerts
|

Frequency-Hopping, Multiple-Access, Phase-Shift-Keying System Performance in a Rayleigh Fading Environment

Abstract: Recently, various Frequency‐Hopping, Multiple‐Access (fhma) schemes have been proposed as alternatives to frequency‐division (fdma) techniques for guarding against interference from other users and multipath fading in transmitting digitized speech in mobile radio. While the advantage of frequency diversity against fading is well known, the system degradation of frame‐asynchronous fhma‐psk due to interference from other users and fading has not been studied, except by modeling the interference as additive white… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

1985
1985
2017
2017

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…The variable " is an unknown, strictly positive value which is a function of the energy, delay and phase of the colliding users as well as a function of the energy, proximity to the frequency i, delay and phase of the other users and the noise. When we assume no noise and no interferering sidelobes, the expected value of " across the phase becomes P j2S" 1 4 (A j (l) jk ) 2 where S " is the set of users present at that location and (l) jk is the fraction of time (normalized by T) that the jth user's chip overlaps the kth user's lth time slot. Ideally, the value of E aj would be 1 4 (A j (l) jk ) 2 .…”
Section: Asynchronous Multistage Multiuser Detectormentioning
confidence: 99%
See 1 more Smart Citation
“…The variable " is an unknown, strictly positive value which is a function of the energy, delay and phase of the colliding users as well as a function of the energy, proximity to the frequency i, delay and phase of the other users and the noise. When we assume no noise and no interferering sidelobes, the expected value of " across the phase becomes P j2S" 1 4 (A j (l) jk ) 2 where S " is the set of users present at that location and (l) jk is the fraction of time (normalized by T) that the jth user's chip overlaps the kth user's lth time slot. Ideally, the value of E aj would be 1 4 (A j (l) jk ) 2 .…”
Section: Asynchronous Multistage Multiuser Detectormentioning
confidence: 99%
“…When we assume no noise and no interferering sidelobes, the expected value of " across the phase becomes P j2S" 1 4 (A j (l) jk ) 2 where S " is the set of users present at that location and (l) jk is the fraction of time (normalized by T) that the jth user's chip overlaps the kth user's lth time slot. Ideally, the value of E aj would be 1 4 (A j (l) jk ) 2 . Unfortunately, this value is corrupted by the noise and the sidelobes of other asynchronous interferers.…”
Section: Asynchronous Multistage Multiuser Detectormentioning
confidence: 99%
“…A comparison of average number of usable "channels" per cell for FH-DPSK and FM systems showed that they do not differ greatly. In [38], it is noted that no error occurs if the transmission is frame synchronous (which is possible for base to mobile communications), and for frame-asynchronous mobile to base communications, a good. [34].…”
Section: Performance Anaiysis Of Fh Dpsk Systemmentioning
confidence: 99%