[1]
|
Simon, M.K., Omura, J.K., Scholtz, R.A. and Levitt, B.K. (1994) Spread Spectrum Communications Handbook (Volume 2). McGraw-Hill, New York.
|
[2]
|
Lee, J.S. and Miller, L.E. (1998) CDMA Systems Engineering Handbook. Artech House, Inc., Boston, London.
|
[3]
|
Korowajczuk, L. and Xavier, B.S.A. (2005) Designing CDMA2000 Systems. John Wiley & Sons, Hoboken.
|
[4]
|
Mullen, G.L. and Panario, D. (2013) Handbook of Finite Fields. CRC Press, Boca Raton.
|
[5]
|
Scilab Enterprises (2012) Scilab: Free and Open Source Software for Numerical Computation (Linux, Version 5.5.0) [Software]. http://www.scilab.org
|
[6]
|
Tsai, Y.R. (2009) M-ary Spreading-Code-Phase-Shift-Keying Modulation for DSSS Multiple Access Systems. IEEE Transactions on Communications, 57, 3220-3224. http://dx.doi.org/10.1109/TCOMM.2009.11.050526
|
[7]
|
Gold, R. (1967) Optimal Binary Sequences for Spread Spectrum Multiplexing (Corresp.). IEEE Transactions on Information Theory, 13, 619-621. http://dx.doi.org/10.1109/TIT.1967.1054048
|
[8]
|
Ahmad, A., Al-Busaidi, S.S. and Al-Musharafi, M.J. (2013) On Properties of PN Sequences generated by LFSR—A Generalized Study and Simulation Modeling. Indian Journal of Science and Technology, 6, 5351-5358.
|
[9]
|
Mitra, A. (2008) On Pseudo-Random and Orthogonal Binary Spreading Sequences. International Journal on Information Technology, 4, 137-144.
|
[10]
|
Al-Omar, S. (2014) Method of Designing Generators of Pseudorandom Sequences for Information Protection Based on Shift Register with Non-Linear Feedback Function. Journal of Information Security, 5, 218. http://dx.doi.org/10.4236/jis.2014.54020
|