By Topic

Communications, IEE Proceedings-

Issue 5 • Date Oct 2001

Filter Results

Displaying Results 1 - 10 of 10
  • Restorable VP-layout design in ATM networks for efficient support for multicast traffic

    Publication Year: 2001 , Page(s): 290 - 301
    Click to expandAbstract | PDF file iconPDF (1199 KB)  

    The authors present a new network design problem that is applicable for designing restorable virtual paths (VPs) in an asynchronous transfer mode (ATM) network to efficiently support multicast applications. They decompose the design procedure into two main phases: working VP layout (VPL) and backup VPL design phases. For the working VPL design phase, the design objective is to minimise the network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unequal error protection TCM codes

    Publication Year: 2001 , Page(s): 265 - 272
    Cited by:  Papers (4)
    Click to expandAbstract | PDF file iconPDF (639 KB)  

    A family of unequal error protection (UEP) codes using multilevel codes and a four-way partition of a one-dimensional lattice is considered. The non-regular set partitioning combined with a nonuniform signal constellation yields codes with large minimum distance and small path multiplicity. However, this is not in itself sufficient for reliable coding gain estimation. New code search methods are i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delay performance of voice and MMPP video traffic in cellular wireless ATM network

    Publication Year: 2001 , Page(s): 302 - 309
    Click to expandAbstract | PDF file iconPDF (596 KB)  

    An approximate analysis is derived of real-time voice and Markov modulated Poisson process (MMPP) video traffic over an enhanced time division multiple access with dynamic reservation (TDMA/DR) MAC protocol in a wireless ATM setting. This yields the mean delay and the delay distribution of such traffic under light loads (less than 60% of the total channel capacity). The reasonableness of the appro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interdeparture time analysis of CBR traffic in AAL multiplexer with bursty background traffic

    Publication Year: 2001 , Page(s): 310 - 315
    Click to expandAbstract | PDF file iconPDF (467 KB)  

    The authors present a discrete time model of a queue to represent an AAL multiplexer with two types of traffic and to analyse the cell delay variation of constant bit rate (CBR) traffic in ATM networks. It is assumed that a single periodically deterministic CBR traffic stream and several variable size bursty background traffic streams are multiplexed in the AAL multiplexer and one ATM cell payload... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complex-valued collaborative coding multiple access for fading channels

    Publication Year: 2001 , Page(s): 327 - 332
    Cited by:  Papers (3)
    Click to expandAbstract | PDF file iconPDF (551 KB)  

    The complex-valued collaborative coding multiple access (CV-CCMA) scheme has been previously proposed by the authors to provide a practical means of implementing CCMA over radio channels. The technique employs complex-valued collaborative codes and spatial diversity to estimate the complex channel gain coefficients representing the amplitude and phase associated with each user path and to detect t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subspace-based multiuser detection for DS-CDMA systems with correlated noise

    Publication Year: 2001 , Page(s): 316 - 320
    Click to expandAbstract | PDF file iconPDF (419 KB)  

    Two subspace-based multiuser detectors are presented for a synchronous DS-CDMA system operating over a multipath fading channel with correlated noise. Based on the training sequence transmitted by the desired user and employing a noise whitening process, a linear MMSE detector is obtained which does not require knowledge of the code sequences and the propagation channel response. When the training... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor

    Publication Year: 2001 , Page(s): 273 - 279
    Cited by:  Papers (16)  |  Patents (2)
    Click to expandAbstract | PDF file iconPDF (670 KB)  

    The results of the implementation of elliptic curve cryptography (ECC) over the field GF(p) on an 80 MHz, 32-bit ARM microprocessor are presented. A practical software library has been produced which supports variable length implementation of the elliptic curve digital signature algorithm (ECDSA). The ECDSA and a previously proposed ECC-based wireless authentication protocol are implemented using ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of C-filter based adaptive spread spectrum receiver in non-Gaussian channels

    Publication Year: 2001 , Page(s): 321 - 326
    Click to expandAbstract | PDF file iconPDF (566 KB)  

    The performance of an adaptive spread spectrum receiver based on the combination filter (C-filter) in the presence of multiuser interference and impulsive channel noise is investigated. For many years, the problem of single user detection in multiuser impulsive channels has been addressed through the use of heuristics in an attempt to reduce the influence of outlying observations. This approach, h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spectral characteristics of dual header pulse interval modulation (DH-PIM)

    Publication Year: 2001 , Page(s): 280 - 286
    Cited by:  Papers (2)
    Click to expandAbstract | PDF file iconPDF (461 KB)  

    The authors present a detailed derivation of the power spectral density of the DH-PIM scheme. It is shown that the spectral profile resembles a general sinc envelope shape, which contains DC and potential distinct slot components. The amplitude of both components and the location of the slot component largely depend on the bit resolution and the pulse duty cycle. To confirm the validity of the mat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimised soundprint selection for identification in audio streams

    Publication Year: 2001 , Page(s): 287 - 289
    Click to expandAbstract | PDF file iconPDF (258 KB)  

    An improved iterative method for the selection of reference soundprints from a set of sound records to be identified is presented. The soundprints applied to reliable streaming audio identification should have maximum dissimilarity to each other. As the first trial of the iteration, a set of soundprints is randomly selected according to a grid placed on the records. To the accepted set, a further ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.