Advanced Search
Volume 19 Issue 6
Nov.  1997
Turn off MathJax
Article Contents
Xu Guo-Yu, Chen Xing-Yuan, Du Xue-Hui. An Authentication Scheme Using Hierarchical Identity Based Signature in Large-scale Delay Tolerant Networks[J]. Journal of Electronics & Information Technology, 2013, 35(11): 2615-2622. doi: 10.3724/SP.J.1146.2012.01735
Citation: Wang Yan, Cheng Shixin. CAPACITY OF CDMA FOR INTEGRATED TRAFFIC IN DIFFERENT WIRELESS ENVIRONMENT[J]. Journal of Electronics & Information Technology, 1997, 19(6): 803-809.

CAPACITY OF CDMA FOR INTEGRATED TRAFFIC IN DIFFERENT WIRELESS ENVIRONMENT

  • Received Date: 1996-05-28
  • Rev Recd Date: 1997-03-10
  • Publish Date: 1997-11-19
  • The developments of Personal Communication and Mobile Computing stimulate the introducation of integrated traffics into mobile communication. CDMA is suitable for transmission of integrated traffics. In this paper, we introduced an admission control algorithm. Under this algorithm, the capacity of a CDMA system for integrated traffics is evaluted. Users with different QoS requirements are allocated different power. To solve the problem of higher-rate traffics using higher powers, wider bandwidth to higher-rate traffics is given. All the traffics are transmitted in the same frequency band. Finally, according to the measured data of CODIT, we derived the capacity of different traffics in different environments.
  • Baier A. Design study for a CDMA-based third-generation mobile radio system. IEEE J. of SAC, 1994, SAC-12(4): 733-744.[2]Chih-Lin I. Variable spreading gain CDMA with adaptive control for integrated traffic in wireless networks. Proc. VTC95, Chicago: July, 1995, 907-911.[3]Marta Pizarroso, et al. Common basic for evaluation of ATDMA and CODIT system concept. MPLA/TDE/SIGS/DS/P/001/bl Sep.1995.[4]Marta Pizarroso, et al. Prelimiary evaluation of ATDMA and CODIT system concept.[5]MPLA/TDE/SIG5/DS/P/002/bl Sep.1995.
  • Cited by

    Periodical cited type(3)

    1. 夏逸珉,许春根,窦本年. 一种标准模型下基于身份的匿名加密方案. 信息网络安全. 2018(04): 72-78 .
    2. 徐国愚,王颖锋,马小飞,王科锋,颜若愚. 面向分级身份密码批验签的错误签名混合筛选算法. 计算机应用. 2017(01): 217-221 .
    3. 徐磊,许春根,窦本年. 非对称双线性对下的基于身份的加密方案. 通信技术. 2014(08): 941-945 .

    Other cited types(4)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1821) PDF downloads(357) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return