Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Communication Technology Proceedings, 1996. ICCT'96., 1996 International Conference on

Date 5-7 May 1996

Go

Filter Results

Displaying Results 1 - 25 of 128
  • Author index

    Publication Year: 1996
    Save to Project icon | Request Permissions | PDF file iconPDF (1836 KB)  
    Freely Available from IEEE
  • Analysis of a slotted access channel with average cycle method

    Publication Year: 1996 , Page(s): 1080 - 1083 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (236 KB)  

    Random access techniques in the packet broadcasting environment are a very important research topic. A broadcast channel is a radio packet communication channel, and the relative distances between the users and the receiver can vary greatly. Thus, packets from different transmitters arrive at the receiver with substantially different power levels. These phenomena give rise to a capture effect at the receiver. The packet arriving with the highest power level has a good chance of being detected accurately, even when other packets arrive at the same time. This capture effect improves the system throughput and other performance measures. The mean cycle times of the slotted access channel are analyzed by using the average cycle method. Analytic formulae for mean values of a successful period and a colliding period and an idle period are derived. Also, the upper bounds on the throughput of the system with capture effect are provided View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical fiber personal computer data transmission system for local area networking

    Publication Year: 1996 , Page(s): 1084 - 1087 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (252 KB)  

    This paper describes an improved optical fiber transmission system for personal computer data transmission through analog telephone modems and optical links. The modem is internally connected to the optical link so that the transmission through the optical fibers is complete. The system is constructed using a square-wave frequency modulation (SWFM) scheme for digital data transmission before the electrical output obtained from the modem in fed to the electrical-to-optical converter. The system was used successfully when digital data was transmitted over a distance of 3500 m using multimode graded index (GI) optical fibers View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pipeline algorithms of RSA data encryption and data compression

    Publication Year: 1996 , Page(s): 1088 - 1091 vol.2
    Cited by:  Papers (1)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (304 KB)  

    Various pipeline algorithms of data compression and encryption are designed to assess the impact of encryption on data compression. The first pipeline shows that encryption fails to map a large amount of redundancy for the input file into a favourable form for its later compression. The second pipeline, however, offers a good potential to improve the compressed output for further compression by another compression algorithm. The pipeline algorithm also identifies the different performance between dictionary data compression and statistical compression algorithms. In addition, the compression prior to encryption improves the efficiency of encryption and lead to the possible development of a multifunctional algorithm which could operate as both compression and encryption View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information set decoding of generalised concatenated codes

    Publication Year: 1996 , Page(s): 764 - 766 vol.2
    Cited by:  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (196 KB)  

    A generalised concatenated code (GCC) structure is proposed, which allows the construction of some binary linear codes which are optimum or close to the minimum-distance bounds. Either good overall coding rate or powerful error detection and correction can be achieved. Information set decoding is applied to these codes, and their performance is investigated View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Zero-knowledge proof protocol of the isomorphism of graphs

    Publication Year: 1996 , Page(s): 1092 - 1093 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (132 KB)  

    The discussion of the zero knowledge-proof protocol of the nonisomorphism of graphs (GNI) has appeared in many papers, but they are not complete zero-knowledge proof protocols at all. We will propose a complete zero-knowledge proof protocol, it implies that it is very difficult to design a secure zero-knowledge interactive proof protocols View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Alternative architectures for pulse stuffing synchronizers

    Publication Year: 1996 , Page(s): 813 - 816 vol.2
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (268 KB)  

    It is shown that the jitter produced by pulse stuffing synchronizers, used in digital transmission networks, can be decreased by using improved SNR Σ-Δ modulator circuits. For example, the technique of adaptive threshold modulation which is widely used in SONET/SDH synchronizers is shown to be such a circuit. The performance of these circuits can be further improved by the use of additional circuitry but maintaining their stability becomes a problem. This paper proposes stable alternative modulator architectures which are suitable for synchronizers. The performance of the proposed circuits is compared with the existing techniques View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ATM switching system for broadband network

    Publication Year: 1996 , Page(s): 727 - 730 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (408 KB)  

    The ATM (asynchronous transfer mode) network is regarded as effective for a multimedia telecommunication environment that enables highspeed and broadband communication. This paper reports the development of the FETEX-150 ESP(enhanced switching platform) which has been designed as an ATM switch in a public broadband network. To track the latest ATM standards and trends, a simple, scaleable, and open architecture was set forth for the FETEX-150 ESP design target at the beginning of the system design. This paper describes design concept and system architecture of the FETEX-150 ESP system from the hardware and software design viewpoint. Also, this paper describes traffic management, system features and operation and maintenance features in the FETEX-150 ESP View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new preplanned self-healing scheme for multicast ATM network

    Publication Year: 1996 , Page(s): 888 - 891 vol.2
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (312 KB)  

    We study several backup path building schemes for multicast tree in self-healing ATM networks. Point-to-point link and path protection schemes are extended and modified for point-to-multipoint connection in ATM networks. A new scheme that modified from link protection and taking the advantage of the special structure of multicast tree is proposed. To minimize the spare capacity usage, several integer linear programming formulations are formulated and solved. After evaluating several test cases, we conclude that the new proposed theme has a good efficiency in the spare capacity usage and a fast restoration time View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A time code division multiple access (TCDMA) system proposal for indoor wireless communications

    Publication Year: 1996 , Page(s): 1094 - 1097 vol.2
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (312 KB)  

    Indoor environments for mobile radio communications provide special challenges due to the physical characteristics of the radio wave propagation. A hybrid access scheme (combining the advantages of both TDMA and wideband CDMA) called time code division multiple access (TCDMA) is proposed and investigated for indoor wireless communications. The indoor radio channel is modeled in terms of channel impulse responses by taking into account various indoor measurement results. Various simulation methods are used to reduce the computational complexity and to ensure the result accuracy. The simulation results of the system performance reveal the capability and the capacity of TCDMA in a typical indoor cell modeled as a multipath fading radio channel View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of finite output buffer ATM switch with Bernoulli arrival of two priorities

    Publication Year: 1996 , Page(s): 965 - 969 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (228 KB)  

    A theoretical queue model of an ATM switch with Bernoulli arrivals of two priorities and finite output buffer capacity is developed. The average queue size, the loss probability of packets and the average waiting times are considered. Finally, a computer simulation proved the results of the analysis View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image quality estimation in subband coding techniques based on human visual system

    Publication Year: 1996 , Page(s): 651 - 653 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (260 KB)  

    This paper seeks to provide image quality estimation in subband coding techniques based on the human visual system. Subband coding techniques using differential pulse code modulation and the discrete cosine transform with some practical results are demonstrated. A simple objective measure for image quality is recommended View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of an ATM cell multiplexer with MMPP input and a neural connection admission control approach

    Publication Year: 1996 , Page(s): 916 - 919 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (344 KB)  

    ATM will be used to implement the BISDN. Because the cells of individual calls are combined in a statistical fashion, congestion may occur at multiplexers and switches in ATM networks. Understanding the queueing behaviour and the cell loss performance of ATM networks is very important for switch design, buffer dimensioning, and developing congestion control strategies. We study the performance of a finite-buffered statistical multiplexer with MMPP input. An exact analysis of the MMPP/D/1/K queue is carried out, yielding the loss probability. A supervised neural network is used for QOS estimation in admission control schemes so as to comply with ATM real time requirements. The inputs to the neural network are link statistics that are computationally easy to obtain and yield a good description of the aggregate link traffic. The neural network target QOS is derived by an accurate MMPP/D/1/K model to allow for a high utilization of network resources View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Despreading techniques on IS-95 forward channels with synchronous system timing

    Publication Year: 1996 , Page(s): 1110 - 1113 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (232 KB)  

    This paper presents a full-digital design of demodulating the forward CDMA channel which are spread according to IS-95. The system timing and combination of multi-PN-codes are considered. The discussion on tailoring the design for digital devices is also given View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet transform coding of image sequences with variable bit rate

    Publication Year: 1996 , Page(s): 654 - 657 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (196 KB)  

    A scheme of variable bit rate video coding for ATM networks is proposed in this paper. A two-layer coding method of image sequences using the wavelet transform (WT) over a VBR network is given, and, the statistical multiplexing gain of the WT coding scheme over ATM B-ISDN networks is also computed. The computing simulation results of the mean SNR and the mean data compression rate of reconstructed images with WT show that the subjective and the objective qualities of reconstructed images the using proposal coding scheme are satisfied View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Considerations for ATM deployment in the telephony network

    Publication Year: 1996 , Page(s): 1041 - 1044 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (344 KB)  

    As the deployment of broadband technology for data gains more ground, the application of asynchronous transfer mode (ATM) in the public switched telephony network (PSTN) begins to be considered. The network providers evaluate business drivers which may lead to the change, and identify the technology issues to be addressed. This paper presents a set of factors which will influence the introduction of ATM in the PSTN and highlights the network architecture and technology aspects to be considered for implementation View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CDMA communication system with trellis coding and orthogonal signaling

    Publication Year: 1996 , Page(s): 1098 - 1101 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (220 KB)  

    We discuss the application of trellis coding in a (direct sequence spread spectrum) CDMA system where orthogonal signaling is used. Our approach is to construct the trellis codes over the set of biorthogonal sequences. A general analysis is presented. We compared the analysis with computer simulation. The results show that the trellis coded CDMA system outperforms the corresponding uncoded DS/SSMA system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A supervisory control theoretical approach to congestion management

    Publication Year: 1996 , Page(s): 857 - 861 vol.2
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (492 KB)  

    This paper presents a supervisory control theoretical approach to congestion management in virtual circuit networks. The network behavior is considered as a dynamic discrete-event system (DES). Then, a synthesis algorithm is applied to derive a supervisor that restricts network operation to avoid congestion. In our approach, a colored Petri net (CP-net) is used to model a network, an equivalence relation over behaviors of switches is defined to reduce the state space, and a congestion control specification is expressed as forbidden markings of the CP-net View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survivability study of SDH self-healing ring

    Publication Year: 1996 , Page(s): 892 - 895 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (200 KB)  

    The survivability related to hardware failures for the SDH network is analysed. We give the features of hardware failure for 2-fiber and 4-fiber bidirectional self-healing ring (BSHR/2 and BSHR/4). With an assumption of the traffic pattern, models for survivability of single-ring and multiple-rings are established, the analysis of survivability is carried out with these models View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of BIP codes in SDH on Poisson distribution of errors

    Publication Year: 1996 , Page(s): 829 - 832 vol.2
    Cited by:  Papers (1)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (240 KB)  

    This paper introduces, in some detail, the bit interleaved parity (BIP) codes adopted in SDH for error monitoring, and derives the general relationship equation between the BIP error block probability and bit error rate (BER) in the presence of Poisson distribution errors. Some typical curves of the BIP error block probability versus the BER in SDH are also presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying object-oriented analysis and design in SDH network management system

    Publication Year: 1996 , Page(s): 870 - 874 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (416 KB)  

    Optical fiber SDH transmission network is under fast developing in China, network management is its key technology, unlike the traditional approach, ITU-T had published a series of recommendations, using the object oriented techniques, this paper analysis its main issue and introduce a real application View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-similar traffic and its implications for ATM network design

    Publication Year: 1996 , Page(s): 1053 - 1056 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (336 KB)  

    Self-similar (or fractal) stochastic processes have been proposed as more accurate models of certain categories of traffic (e.g., Ethernet traffic, variable-bit-rate video) which will be transported in ATM networks. Self-similar processes exhibit a long range dependence structure which is not the case for traditional models. The distinct differences between these two classes of models, have significant implications for performance prediction and network design. We describe simulation results using both synthetic self-similar processes and empirical video traces. Based on these simulation results, we analyze certain existing congestion control schemes and show that, although these schemes may be promising under traditional models, they face serious challenge under self-similar models View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The procurement and testing process of synchronous digital hierarchy (SDH)

    Publication Year: 1996 , Page(s): 796 - 799 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (312 KB)  

    The relationships established between the procurement and the conformance testing processes of SDH equipment for the Italian transport network are described. In particular great emphases is given to the necessity to correlate the two different processes as far as transmission equipment specification and test specification are concerned. The test environment under development in CSELT is described focusing mainly on the transmission aspects View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A blind equalizer based on nonlinear dynamics neural networks

    Publication Year: 1996 , Page(s): 920 - 925 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (480 KB)  

    Based on nonlinear dynamics theory, this article presents an artificial neural network (ANN) blind equalizer associated with its nonlinear dynamic equation and its stability conditions. Simulation results indicate that this ANN blind equalizer has a very strong tolerance of and adaptation to the time-varying high speed channel. The bit rate of its equalized channel can be as high as 10 Gbps View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance improvement with slot reuse on a high speed multiaccess network

    Publication Year: 1996 , Page(s): 623 - 626 vol.2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (308 KB)  

    High speed multimedia applications are becoming the main stream of broadband integrated services. LAN/MANs have evolved considerably and network speed has expanded from tens of megabit/sec to several gigabit/sec to meet the increasing demand. We present a simple slot reuse scheme on the ACTA (adaptive cycle tunable access) network. The ACTA is a simple slot-accessed bus/ring network protocol based on an adaptive variation of the cycle-lengths according to the network offered load. We discuss the network performance under different traffic distribution patterns. Simulation results show that the slot reuse scheme is very effective in network throughput improvement. With slot reuse, the improved ACTA network is very attractive for high speed multimedia applications View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.