期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
New code match strategy for wideband code division multiple access code tree management 被引量:1
1
作者 杨宗凯 刘光然 何建华 《Journal of Central South University of Technology》 2006年第3期265-269,共5页
Orthogonal variable spreading factor channelization codes are widely used to provide variable data rates for supporting different bandwidth requirements in wideband code division multiple access (WCDMA) systems. A new... Orthogonal variable spreading factor channelization codes are widely used to provide variable data rates for supporting different bandwidth requirements in wideband code division multiple access (WCDMA) systems. A new code match scheme for WCDMA code tree management was proposed. The code match scheme is similar to the existing crowed-first scheme. When choosing a code for a user, the code match scheme only compares the one up layer of the allocated codes, unlike the crowed-first scheme which perhaps compares all up layers. So the operation of code match scheme is simple, and the average time delay is decreased by 5.1%. The simulation results also show that the code match strategy can decrease the average code blocking probability by 8.4%. 展开更多
关键词 orthogonal variable spreading factor code placement strategy code match strategy code blocking probability
在线阅读 下载PDF
Intermediate Spoofing Strategies and Countermeasures 被引量:8
2
作者 Yang Gao Hong Li +1 位作者 Mingquan Lu Zhenming Feng 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第6期599-605,共7页
Intermediate spoofing can impact most off-the-shelf Global Navigation Satellite Systems (GNSS) receivers, therefore low cost detection of such spoofing is very important to protect the reliability of the GNSS receiv... Intermediate spoofing can impact most off-the-shelf Global Navigation Satellite Systems (GNSS) receivers, therefore low cost detection of such spoofing is very important to protect the reliability of the GNSS receivers used in critical safety and financial applications. This paper presents two strategies to analyze attacks by intermediate spoofing attackers to identify the weaknesses of such attacks. The analyses lead to a code and carrier phase consistency detection method with simulation results showing that this method can indicate the receiver when spoofing has occurred. The method can be used by most receivers, is inexpensive, and requires only a small software upgrade. 展开更多
关键词 intermediate spoofing dragging code phase strategy low cost countermeasures code and carrierphase consistency
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部