By Topic

IEE Proceedings - Communications

Issue 2 • Date Apr 1996

Filter Results

Displaying Results 1 - 9 of 9
  • Hybrid-ARQ system for HF channels based on codeword partitioning

    Publication Year: 1996
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (396 KB)

    A technique by which the codewords of an error-correcting code are partitioned to obtain an error-detecting code with half the original length is described. It is intended to be used in a hybrid-ARQ system for achieving high throughput on HF channels. Performance evaluations of examples based on BCH and RS codes are also provided View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reduced-state trellis and its decoding for full-response CPM

    Publication Year: 1996
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (404 KB)

    A new reduced-state trellis and Viterbi decoding for binary full-response continuous phase modulation (FRCPM) are derived. The theoretical and simulated error-rate performance of the reduced-state trellis decoding is presented. It is shown that the reduced-state trellis decoding of FRCPM with small modulation index can provide almost the same error-rate performance as the original-state trellis de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical power distribution in wireless infrared LANs

    Publication Year: 1996
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (400 KB)

    The problem of optical power distribution in a wireless, in-room, local-area network based on IR technology is studied. The distribution of optical power in an office room or shop floor environment produced by a grid of light sources is examined. The influence in the uniformity of power distribution of factors, such as radiant intensity, pattern of the light sources and number of transmitters is s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of efficient trellis methods for soft decision decoding of Reed-Solomon codes

    Publication Year: 1996
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (768 KB)

    Various novel trellis decoding methods are suggested that make it easy to incorporate soft decision methods for Reed-Solomon codes. For each decoding method the advantages and disadvantages are pointed out. The performance and computational efficiency of each decoder are estimated using simulation on an AWGN channel. From the simulation results the best of these trellis decoding schemes is suggest... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sojourn time analysis of prioritised DQDB (IEEE802.6) MAN with bursty traffic input

    Publication Year: 1996, Page(s):112 - 116
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (544 KB)

    The sojourn time of the prioritised DQDB MAN with bursty traffic input is studied. The expression of the mean sojourn time of the message transmitted at the higher priority level is given. After an investigation of the transient behaviour of a related random walk process, the sojourn time of the packet at the lower priority level is derived. The authors obtain the expression for the mean sojourn t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital transmission using multimode phase-continuous chirp signals

    Publication Year: 1996
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (536 KB)

    In a spread-spectrum system the transmitted signal is spread over a wide frequency band, often much wider than the minimum bandwidth needed for the information to be conveyed. The concept of varying the modulation index of a continuous phase FSK (i.e. CPFSK) waveform is applied to digital transmission using chirp signals. These multimode chirp waveforms are described and their ability to perform o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast adaptive polynomial I and Q predistorter with global optimisation

    Publication Year: 1996
    Cited by:  Papers (8)  |  Patents (8)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (840 KB)

    High spectral efficiency modulation methods such as quadrature amplitude modulation are of considerable interest for future mobile communication systems. These methods are highly sensitive to transmitter power amplifier nonlinearities. The linearity of a power amplifier can be improved by using an adaptive nonlinear predistorter. A modified version of a previously reported polynomial lineariser is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preventive flow control method for packet video

    Publication Year: 1996
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (480 KB)

    Broadband ISDN (B-ISDN) networks utilising asynchronous transfer mode (ATM) are expected to provide the transport infrastructure for broadband multiservice applications. A preventive flow control method suitable for video services within an ATM network is presented. In this method each video encoder employs a model of the aggregate traffic of all sources sharing the virtual path with the heaviest ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discrete-time analysis of the leaky bucket scheme with threshold-based token generation intervals

    Publication Year: 1996, Page(s):105 - 111
    Cited by:  Papers (1)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (524 KB)

    In the ATM network, the leaky bucket scheme is a promising method that regulates the input traffic for preventive congestion control. In order to satisfy the loss probability constraint of more bursty input traffic, it is known that the leaky bucket scheme with a static token generation interval requires a larger data buffer and token pool size. This causes an increase in the mean waiting time for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.