Evaluation of Spectral Efficiency, System Capacity And Interference Effects on CDMA Communication System
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 6
Abstract
Wireless communication technology have been developed based on exploring new mobile communications frequency bands, reasonable use of frequency resources and minimization, portability and multifunction’s of mobile stations. The technology of wireless communications with duplex transmission is one of the fastest expanding in the world today. A very effective solution in achieving network performance in terms of system capacity and spectral efficiency with respect to the CDMA wireless network is presented in this paper. The effect of how interference grows as the number of users increases is analyzed. Equally, this paper presents the major problems in CDMA as the multiple access interference which arises due to the deviation of the spreading codes from orthogonality.
Authors and Affiliations
Ifeagwu N, Ekeh J, Ohaneme o, Okezie c
Ontology based Intrusion Detection System in Wireless Sensor Network for Active Attacks
WSNs are vulnerable to attacks and have deemed special attention for developing mechanism for securing against various threats that could effect the overall infrastructure. WSNs are open to miscellaneous classes of attac...
JWOLF: Java Free French Wordnet Library
The electronic lexical databases WordNets, have become essential for many computer applications, especially in linguistic research. Free French WordNet is an XML lexical database for French language based on Princeton Wo...
TGRP: A New Hybrid Grid-based Routing Approach for Manets
Most existing grid-based routing protocols use reactive mechanisms to build routing paths. In this paper, we propose a new hybrid approach for grid-based routing in MANETs which uses a combination of reactive and proacti...
Intelligent Security for Phishing Online using Adaptive Neuro Fuzzy Systems
Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low false-positive rates, but blacklist approaches utilizes website URLs only. This study analyses and combines phishing em...
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
Now-a-days smartphones have been used worldwide for an effective communication which makes our life easier. Unfortunately, currently most of the cyber threats such as identity theft and mobile malwares are targeting smar...