Symbolic Computation for DS-CDMA Code Acquisition Using First Order Logic

Symbolic Computation for DS-CDMA Code Acquisition Using First Order Logic

Ruo Ando (Keio University, Japan) and Yoshiyasu Takefuji (Keio University, Japan)
DOI: 10.4018/978-1-59904-762-1.ch011
OnDemand PDF Download:


Code division multiple access (CDMA) is widely used because of its effectiveness to send multiple signal and confidentiality of career signal. We present a formulation of state-space problem of which solution is directed by redundant reasoning control method for semiheuristic and lightweight DS-CDMA code acquisition. The reasoning of the state-space problem provides us with the way to find a K bit synchronized sequence among K dephased sequences with less calculation cost, compared with serial search and matched filter. In this process, redundancy-restriction method, called weighting strategy, enhances the searching ability of FOL (first order logic) reasoning for the faster and lightweight code acquisition. The combination of weighting strategy and correlator enables us to achieve the peak-detection within K/3 times of calculating inner products and its measurement. Our system is evaluated by the reduced cost of proving state-space problem using weighting strategy and its robustness of using the proposal code acquisition framework. Experiment shows that the proposal method is robust if K/N sequences are grouped with N ranging from 3 to 5.

Complete Chapter List

Search this Book:
Table of Contents
Hideyasu Sasaki
Chapter 1
Hideyasu Sasaki, Yasushi Kiyoki
In this chapter, we present a formulation for protecting digital library as intellectual property, especially image digital library. The entire... Sample PDF
Digital Library Protection Using Patent of Retrieval Process
Chapter 2
Richard A. Spinello, Herman T. Tavani
This chapter presents some foundational concepts and issues in intellectual property. We begin by defining intellectual objects, which we contrast... Sample PDF
Intellectual Property Rights: From Theory to Practical Implementation
Chapter 3
Shiguo Lian
The principal concern of this chapter is to provide those in the multimedia or content protection community with an overview of multimedia content... Sample PDF
Multimedia Encryption Technology for Content Protection
Chapter 4
Mirko Luca Lobina, Luigi Atzori, Davide Mula
Many audio watermarking techniques presented in the last years make use of masking and psychological models derived from signal processing. Such a... Sample PDF
Masking Models and Watermarking: A Discussion on Methods and Effectiveness
Chapter 5
Kensuke Naoe, Yoshiyasu Takefuji
In this chapter, we propose a new information hiding and extracting method without embedding any information into the target content by using a... Sample PDF
Damageless Watermark Extraction Using Nonlinear Feature Extraction Scheme Trained on Frequency Domain
Chapter 6
Mauro Barni, Franco Bartolini, Alessia De Rosa
The idea of embedding some information within a digital media, in such a way that the inserted data are intrinsically part of the media itself, has... Sample PDF
Perceptual Data Hiding in Still Images
Chapter 7
Yuh-Jzer Joung, Shi-Cho Cha
We propose a new technical and legal approach, called online personal data licensing (OPDL), for responding to concerns about the privacy of... Sample PDF
Online Personal Data Licensing: Regulating Abuse of Personal Data in Cyberspace
Chapter 8
Giaime Ginesu, Mirko Luca Lobina, Daniele D. Giusto
Authentication is the way of identifying an individual. The techniques used to accomplish such practice strongly depend on the involved parties... Sample PDF
Property Protection and User Authentication in IP Networks Through Challenge-Response Mechanisms: Present, Past, and Future Trends
Chapter 9
Jun Sasaki, Hiroaki Shimomukai, Yutaka Funyu
The mobile Internet has been used widely in Japan. If we use a cellular phone with the Quick Response (Q-R) code reader function (a two-dimensional... Sample PDF
Q-R Code Combined with Designed Mark
Chapter 10
Kimihito Ito, Yuzuru Tanaka
Web applications, which are computer programs ported to the Web, allow end-users to use various remote services and tools through their Web... Sample PDF
Visual Environment for DOM-Based Wrapping and Client-Side Linkage of Web Applications
Chapter 11
Ruo Ando, Yoshiyasu Takefuji
Code division multiple access (CDMA) is widely used because of its effectiveness to send multiple signal and confidentiality of career signal. We... Sample PDF
Symbolic Computation for DS-CDMA Code Acquisition Using First Order Logic
Chapter 12
Yoshiyasu Takefuji, Koichiro Shoji, Takashi Nozaki
In this chapter, we present a device-driver-based computer that realizes the reduction of mode (domain or vertical) switching overheads between user... Sample PDF
Device Driver-Based Computer in Broadband Age
Chapter 13
Natalie Pang
In recent years, impacts of information and communication technologies, market enclosures, and the struggle to retain public goods have had... Sample PDF
Cultivating Communities Through the Knowledge Commons: The Case of Open Content Licenses
Chapter 14
Suliman Al-Hawamdeh, Shubert Foo
Until recently, digital libraries have provided free access to either limited resources owned by an organization or information available in the... Sample PDF
E-Commerce and Digital Libraries
Chapter 15
Knut Blind, Nikolaus Thumm
This chapter presents the first attempt at analyzing the relationship between strategies to protect intellectual property rights and their impact on... Sample PDF
Intellectual Property Protection and Standardization
Chapter 16
Marc Rysman, Tim Simcoe
This chapter uses citations to patents disclosed in the standard setting process to measure the technological significance of voluntary standard... Sample PDF
The Performance of Standard Setting Organizations: Using Patent Data for Evaluation
Chapter 17
Aura Aoininen
Multiple cases have been reported in which patents have posed dilemmas in the context of cooperative standard setting. Problems have come to the... Sample PDF
Patents and Standards in the ICT Sector: Are Submarine Patents a Substantive Problem or a Red Herring?
Chapter 18
Davide Mula, Mirko Luca Lobina
Nowadays the Web page is one of the most common medium used by people, institutions, and companies to promote themselves, to share knowledge, and to... Sample PDF
Legal Protection of the Web Page as a Database
Chapter 19
Merrill Warkentin, Mark B. Schmidt, Ernest Bekkering
In the digital environment, steganography has increasingly received attention over the last decade. Steganography, which literally means “covered... Sample PDF
Steganography and Steganalysis
Chapter 20
Irene Kafeza, Eleanna Kafeza
The Grid environment is rapidly emerging as the dominant paradigm for wide-area-distributed application systems. The multimedia applications demand... Sample PDF
Intellectual Property Protection in Multimedia Grids
Chapter 21
Ruo Ando, Yoshiyasu Takefuji
With the rapid advance in digital network, digital libraries, and particularly WWW (World Wide Web) services, we can retrieve many kinds of images... Sample PDF
Secure Image Archiving Using Novel Digital Watermarking Techniques
About the Contributors