Scheduled System Maintenance
On Saturday, December 10, single article sales and account management will be unavailable from 5:00 AM-7:30 PM ET.
We apologize for the inconvenience.
By Topic

IEEE Transactions on Communications

Issue 9 • September 1979

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover and table of contents]

    Publication Year: 1979, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (177 KB)
    Freely Available from IEEE
  • Hardware for Detection and Partial Correction of PCM Transmission Errors

    Publication Year: 1979, Page(s):1310 - 1315
    Cited by:  Papers (2)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    In pulse code modulation (PCM) of speech, transmission errors cause changes in the statistical properties of the received samples. Recently published work describes computer simulations of a difference detection and correction (DDC) system which detect errors on the basis of these changes. The system examines the differences between adjacent received samples. If a particular difference exceeds a t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • KEYPAC - A Telephone Aid for the Deaf

    Publication Year: 1979, Page(s):1366 - 1371
    Cited by:  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    This paper presents a telecommunications system, KEYPAC (Key Phone Alphanumeric Communication), that enables a user to communicate over the telephone without the use of speech. The design of this system was motivated by the need for a low cost, yet simple and useful means of telephone communication in the deaf community. The KEYPAC system provides a flexible means for speechless telephone communic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Performance in a System Where Data Packets are Transmitted During Voice Silent Periods - Single Channel Case

    Publication Year: 1979, Page(s):1371 - 1375
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB)

    We develop a mathematical analysis for the steady state performance of a system where voice calls and data packets are transmitted over the same channel. The voice calls have priority over the data packets, in that the data packets are transmitted only when there are no voice calls present in the system or the voice conversation is in a long silent period. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Back cover]

    Publication Year: 1979, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (258 KB)
    Freely Available from IEEE
  • Demand Assigned Multiple Access Systems Using Collision Type Request Channels: Traffic Capacity Comparisons

    Publication Year: 1979, Page(s):1325 - 1331
    Cited by:  Papers (23)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB)

    The traffic carrying capabilities of demand assigned multiple access (DAMA) systems in which requests for communication circuits are transmitted over shared collision type channels to a master controller are investigated. The circuit request protocol permits both busy and blocked responses in addition to circuit allocations. The theoretically maximum traffic capacity is determined and it is shown ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Failsafe Distributed Routing Protocol

    Publication Year: 1979, Page(s):1280 - 1287
    Cited by:  Papers (78)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (912 KB)

    An algorithm for constructing and adaptively maintaining routing tables in communication networks is presented. The algorithm can be employed in message as well as circuit switching networks, uses distributed computation, provides routing tables that are loop-free for each destination at all times, adapts to changes in network flows, and is completely failsafe. The latter means that after arbitrar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effects of Repeater Hard-Limiting, Filter Distortion, and Noise on a Pseudo-Noise, Time-Of-Arrival Estimation System

    Publication Year: 1979, Page(s):1271 - 1279
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB)

    Employment of a repeater in a communication system may lead to the introduction of several sources of potential performance degradation. They are hard-limiting, IF filter group delay distrotion and center frequency offset, and additional noise in the links from transmitter-to-repeater and repeater-to-receiver. Specifically, the hardlimiter and IF filter may introduce signal waveform distortion whi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Link Systems with Delay

    Publication Year: 1979, Page(s):1261 - 1270
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB)

    This paper discusses two classical methods of calculating grade of service parameters for link systems, i.e., the methods of Jacobaeus and Lotze. The possibility of extending these theories to cover delay systems and in particular to calculate the waiting time distribution is looked into. Numerical results from the theories are compared with simulations results. Throughout this paper, pure Poisson... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transparent Wideband Data Transmission in Digital Communication Networks

    Publication Year: 1979, Page(s):1302 - 1309
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    This paper presents a systematic study of the possibilities of time-transparent and of code-transparent binary data transmission in digital communication networks where PCM or differential PCM (DPCM) systems are employed for the encoding of speech or video signals. To describe the effects that occur if data signals instead of speech or video signals are sampled and transmitted by these two encodin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frequency Detectors for PLL Acquisition in Timing and Carrier Recovery

    Publication Year: 1979, Page(s):1288 - 1295
    Cited by:  Papers (83)  |  Patents (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    A significant problem in phase-locked loop (PLL) timing and carrier extraction is the initial acquisition. Very narrow loop bandwidths are generally required to control phase jitter, and acquisition may depend on an extremely accurate initial VCO frequency (VCXO) or sweeping. We describe two simply implemented frequency detectors which, when added to the traditional phase detector, can effect acqu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Compression Using Block Truncation Coding

    Publication Year: 1979, Page(s):1335 - 1342
    Cited by:  Papers (394)  |  Patents (55)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2104 KB)

    A new technique for image compression called Block Truncation Coding (BTC) is presented and compared with transform and other techniques. The BTC algorithm uses a two-level (one-bit) nonparametric quantizer that adapts to local properties of the image. The quantizer that shows great promise is one which preserves the local sample moments. This quantizer produces good quality images that appear to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generation and Performance of Quadraphase Welti Codes for Radar and Synchronization of Coherent and Differentially Coherent PSK

    Publication Year: 1979, Page(s):1296 - 1301
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    A class of quadraphase synchronizing sequences, whose lengths may be any power of two, is constructed using codes originally reported by Welti. It is shown that there exist realizations of the codes for both coherent and differentially coherent PSK systems. Like binary maximal length sequences (BMLS) their generation and detection require circuits whose complexity grows as View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resolution of Overlapping Echo Signals in Sonar/Radar Systems

    Publication Year: 1979, Page(s):1321 - 1325
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    A procedure is developed for resolving a time sequence of overlapping echo signals and estimating an a priori unknown number of echoes present in the sequence. The proposed receiver structure is an extension of the conventional narrow-band matched filter envelope detector. Computer simulation results are presented which show the feasibility and satisfactory performance of the receiver proposed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of Optical Receivers with Avalanche Photodetection

    Publication Year: 1979, Page(s):1315 - 1321
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    This paper reports the results of a computer study to numerically evaluate the digital performance of an optical receiver with avalanche photodetectors. Exact and approximate APD statistics were implemented and error probabilities in the range l0^{-1} to l0^{-4} were computed. Both shot-noise and receiver-noise limited... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximations of Queue Dynamics and Their Application to Adaptive Routing in Computer Communication Networks

    Publication Year: 1979, Page(s):1331 - 1335
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    Various adaptive algorithms have been proposed for routing, flow and congestion control in packet-switched computer communication networks. In most of them, information on queue lengths, or equivalently, time delays, at various points in the network is required for proper adaptation. Since up-to-date information is not always available, these quantities must be estimated based on prior information... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effect of Bandlimiting Filters on Probability of Error of MSK

    Publication Year: 1979, Page(s):1348 - 1353
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    Minimum Shift Keying (MSK) is a method of modulation which can be viewed as a special case of Frequency Shift Keying or a special form of Offset Quadrature Phase Shift Keying; therefore, it can be detected either by a discriminator or with a pair of matched filters. In the latter case, the system is optimal, provided there are no bandlimiting filters in the transmitter and receiver. These filters ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Coding Scheme for Conflict-Free Multiaccess Using Global Scheduling

    Publication Year: 1979, Page(s):1353 - 1360
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    A coded multiple access protocol (CMAP) to improve the delay-throughput performance of a global scheduling multiaccess model for data communication over a broadcast channel, which exhibits a short propagation delay, is described and analyzed. Upper and lower bounds on delay-throughput characteristics are obtained. It is shown that CMAP reduces system delay compared to the 1-out-of- View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of Digital Demodulation on Component Coding of NTSC Color Signals

    Publication Year: 1979, Page(s):1342 - 1348
    Cited by:  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (928 KB)

    Effects of nonideal filtering in the digital demodulation of the composite NTSC signal into luminance and chrominance components on the coding of the luminance component are discussed. The residual chrominance component is shown to cause degradation in prediction and/or motion detection algorithms which are based on line or frame difference signals. Simple techniques for reducing these effects usi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental Mesurements of Viterbi Decoding in Burst Channels

    Publication Year: 1979, Page(s):1360 - 1366
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    Experimental measurements of the performance of Viterbi-algorithm decoders in the presence of burst-interference are presented. Results are shown for different code rates and different interference-burst duty factors, amplitudes, and burst lengths. Considerable stress is placed on interference-mitigation techniques (such as symbol erasure, blanking, limiting, and quantizer backoff) that can be add... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas