Results 1 - 10
of
50,046
TABLE II OPPORTUNISTIC MULTIPLE ACCESS SYSTEM FORWARD LINK BUDGET
Table 5-1 Reuse and Diversity Mechanisms Domain Multiple Access (Reuse) Diversity (Fading Mitigation)
"... In PAGE 4: ... Examples are FDMA/TDMA, CDMA/SDMA or pseudo-SDMA, and the combination of FDMA and PDMA used in some satellite systems. Table5 -1 contrasts the use of these... In PAGE 15: ...Table5 -2. Summary of multi-polarized adaptive array and cross-polarized interference cancellation literature Reference Application Array SINR Improvement, dB BER Improve- ment, dB XIF [5.... In PAGE 16: ...Table5 -2. Summary of multi-polarized adaptive array and cross-polarized interference cancellation literature (continued) Reference Application Array SINR Improvement, dB BER Improve- ment, dB XIF [5.... ..."
Table 3 H1: Assigning codes to divisions
2007
"... In PAGE 14: ... One important observation was that prefix compression cuts di- visions in the path closer to the root often containing smaller values. Hence, we tailored the Huffman code in Table3 to observe this behavior. Now a DeweyID representation consists of a one-byte field Lpip (length of pre- fix inherited from predecessor) and the actually stored remainder (Rem) of the DeweyID.... ..."
Cited by 2
Table 2 UMTS coverage versus theoretical transmission rate
2004
"... In PAGE 17: ... The main differences are the use of Wideband Code Division Multiple Access (WCDMA) and the use of Asynchronous Transfer Mode (ATM) in the radio access network. Table2 shows the ... ..."
Table 9. A comparison of the maximum number of users achievable for downlink multiple-access schemes.
in Description of Communication System Options for Single-Aperture Multiple-Link (SAML) Mission Support
"... In PAGE 36: ... The key advantage of CFDMA with coherent TFR is that the loss due to multiple access is negligible since each user is allowed a 3-MHz bandwidth. Table9 compares the maximum number of S/C that can be supported for these three multiple-access schemes for a bandwidth of 3, 10, and 30 MHz. For the CDMA scheme in this table, one null was assumed with a 0.... ..."
Table 1: Comparison of bandwidth and power requirements for three multiple access schemes.
"... In PAGE 5: ... 5 BANDWIDTH REQUIREMENT Let us now compare the bandwidth occupied by the transmitted signal for various multiple access schemes. Table1 shows the bandwidth utilization and required transmit power for the three schemes considered, TDMA, CDMA, and DDMA. This table is intended for comparison only, without emphasis on hard num- bers.... ..."
TABLE II. Bandwidth requirements of time domain multiple access methods.
Table 2: Sample COBOL Application Showing Sizes of Code Divisions Using Logical Statements and Physical Lines of Code
2006
"... In PAGE 4: ... Unfortunately, the difference between physical lines of code and logical statements is often omitted from the software metrics literature. Table2 illustrates some of the code counting ambiguity for a simple COBOL application, using both logical statements and physical lines. This table shows the sizes of the various divisions of typical COBOL applications, and how physical lines of code counts and logical statement counts might vary: Table 2: Sample COBOL Application Showing Sizes of Code Divisions Using Logical Statements and Physical Lines of Code ... ..."
Table 4 Power up/down times for WCDMA standby mode.
2003
"... In PAGE 11: ... Core logic functions are given a variable voltage supply and a variable speed clock so that voltage and frequency may be reduced when performance is not critical. Table4 lists the time intervals required to perform various power-up and power-down operations which implement a temporal power management policy for a Wideband Code Division Multiple-Access (WCDMA) cellular communications protocol [25]. Such 3G protocols support partitioning of tasks into variable-sized intervals so that handset electronics may be idle more of the time than active.... ..."
Cited by 4
Table 2.1 Parameters of WCDMA [2] Multiple access method DS CDMA
2007
Results 1 - 10
of
50,046