Javascript must be enabled to continue!
Penetration Depth Analysis of UMTS Networks Using Received Signal Code Power
View through CrossRef
This paper examines the coverage of three UMTS networks in Calabar, using the received signal code power (RSCP). A drive test conducted with the aid of a TEMS investigation software, collected log files of RSCP which were analyzed as coverage plots by a TEMS discovery software and further put through statistical measures using excel. The low values of calculated standard error depicts that the data used in this study is accurate and not manipulated. The data distribution in MTN and 9mobile network were slightly leptokurtic but slightly mesokurtic for Airtel network. Again, the data distribution for the three networks were approximately symmetric. Finally, 81.5%, 96.36% and 92.1% of the drive test routes for 9 mobile, Airtel and MTN network met with the NCC performance threshold. The result of this study will assist RF engineers in the optimization of UMTS networks and also in designing propagation models for accurate transmission of UMTS network signals in the study area.
Sciencedomain International
Title: Penetration Depth Analysis of UMTS Networks Using Received Signal Code Power
Description:
This paper examines the coverage of three UMTS networks in Calabar, using the received signal code power (RSCP).
A drive test conducted with the aid of a TEMS investigation software, collected log files of RSCP which were analyzed as coverage plots by a TEMS discovery software and further put through statistical measures using excel.
The low values of calculated standard error depicts that the data used in this study is accurate and not manipulated.
The data distribution in MTN and 9mobile network were slightly leptokurtic but slightly mesokurtic for Airtel network.
Again, the data distribution for the three networks were approximately symmetric.
Finally, 81.
5%, 96.
36% and 92.
1% of the drive test routes for 9 mobile, Airtel and MTN network met with the NCC performance threshold.
The result of this study will assist RF engineers in the optimization of UMTS networks and also in designing propagation models for accurate transmission of UMTS network signals in the study area.
Related Results
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
<p><code>Intelligent reflecting surface (IRS) is a promising concept for </code><code><u>6G</u></code><code> wireless communications...
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
<p><code>Intelligent reflecting surface (IRS) is a promising concept for </code><code><u>6G</u></code><code> wireless communications...
Toward All-IP networks : IP and wireless networks convergence
Toward All-IP networks : IP and wireless networks convergence
In this thesis the state of the art for IP networks and the two most predominant wireless access networks, UMTS and Wireless LANs, has been reviewed with respect to the enhancement...
Double resonant sum-frequency generation in an external-cavity under high-efficiency frequency conversion
Double resonant sum-frequency generation in an external-cavity under high-efficiency frequency conversion
In recent years, more than 90% of the signal laser power can be up-converted based on the high-efficiency double resonant external cavity sum-frequency generation (SFG), especially...
Alih Kode Dan Campur Kode Dalam Interaksi Masyarakat Terminal Motabuik Kota Atambua
Alih Kode Dan Campur Kode Dalam Interaksi Masyarakat Terminal Motabuik Kota Atambua
This research aims to describe the use of language in community interactions at the Motabuik terminal, Atambua City. The use of language in question is the form and function of cod...
Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
Systematic Evaluation of AI-Generated Python Code: A Comparative Study across Progressive Programming Tasks
Systematic Evaluation of AI-Generated Python Code: A Comparative Study across Progressive Programming Tasks
Abstract
Background: AI-based code assistants are on the rise in software development as powerful technologies offering streamlining of code generation and better-quality c...
Code Switching and Code Mixing in the Communication of Arabic Language Education Master Students UIN Malang: A Sociolinguistic Study
Code Switching and Code Mixing in the Communication of Arabic Language Education Master Students UIN Malang: A Sociolinguistic Study
Code switching is the phenomenon of changing the use of language or language variants in a conversation by a speaker, either between languages (e.g., from Indonesian to English) or...

