By Topic

IEEE Transactions on Communications

Issue 1 • Date January 1983

Filter Results

Displaying Results 1 - 25 of 28
  • [Front cover and table of contents]

    Publication Year: 1983, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (235 KB)
    Freely Available from IEEE
  • Editorial Notes

    Publication Year: 1983, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • An Analysis of a Real-Time Transform Domain Filtering Digital Communication System - Part II: Wide-Band Interference Rejection

    Publication Year: 1983, Page(s):21 - 27
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (561 KB)

    Employing the technique of transform domain filtering described in Part I of this paper, a system is presented to detect a binary spread-spectrum signal embedded in a wide-band, stationary, colored Gaussian noise process. Using a specific example of a colored noise process, the performance of the system is analyzed. In addition, a specific technique using surface acoustic wave devices is presented... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on "Power Spectrum of Angle Modulated Correlated Digital Signals"

    Publication Year: 1983, Page(s):160 - 161
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    It is pointed out that the sufficiency portion of Theorem 3 in the above paper concerning the existence of discrete spectral components is not proved and, in fact, is not true. A counterexample is provided. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author's reply

    Publication Year: 1983, Page(s):161 - 162
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Back cover]

    Publication Year: 1983, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (384 KB)
    Freely Available from IEEE
  • Generalized Analysis for the Evaluation of Search Strategy Effects on PN Acquisition Performance

    Publication Year: 1983, Page(s):37 - 49
    Cited by:  Papers (39)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1040 KB)

    Pseudonoise (PN) coding may be incorporated into the signal structure of a communication system for a variety of reasons. Once present, the PN code must be appropriately acquired before it can be tracked by the receiver. Toward this end various acquisition schemes have been proposed. These schemes include combinations of predetection/postdetection processing and code search strategies. With regard... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rejection of Pulsed CW Interference in PN Spread-Spectrum Systems Using Complex Adaptive Filters

    Publication Year: 1983, Page(s):10 - 20
    Cited by:  Papers (43)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    In this paper, the performance of direct sequence QPSK spread-spectrum systems using complex adaptive filters in the presence of pulsed CW interference is analyzed. Both adaptive prediction error filters and adaptive transversal filters with two-sided taps are considered. It is shown that the time constant of the tap weight adaptation in the interference off-interval is usually much greater than t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SS/TDMA Time Slot Assignment with Restricted Switching Modes

    Publication Year: 1983, Page(s):149 - 154
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    The time-slot assignment problem for a satellite-switched time-division multiple access system where only a restricted set of all possible switching modes is to be used is studied. An efficient algorithm for finding an optimal assignment is proposed. Also, methods for selecting restricted sets of switching modes are presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secret Telephony as a Historical Example of Spread-Spectrum Communication

    Publication Year: 1983, Page(s):98 - 104
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB)

    The spread-spectrum properties of the X-System for secret telephony developed by Bell Telephone Laboratories for use in World War II are examined. In this system, the bandwidth of the speech signal was reduced by a vocoder, the vocoder signals were sampled and quantized to base six, and a random, never-reused, six-valued key stream was added modulo six to obtain a public message which was undeciph... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental Results on Constant Envelope Signaling with Reduced Spectral Sidelobes

    Publication Year: 1983, Page(s):157 - 160
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    Considerable recent attention has been given to the use of pulse modification to reduce spectral sidelobes in constant envelope data transmission within the "offset" modulation format that includes offset QPSK and MSK. Analytic techniques have been developed which predict probabilistically (without dependence on simulation) the power spectral density that results from pulse modification combined w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error Sensitivity of CCITT Standard Facsimile Coding Techniques

    Publication Year: 1983, Page(s):69 - 81
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1136 KB)

    The CCITT has defined Group 3 facsimile apparatus as that which digitally transmits an ISO A4 document over a switched telephone circuit in approximately one minute. Data compression is employed to achieve the reduced transmission time. Study Group XIV of the CCITT has drafted Recommendation T.4 to achieve compatibility between Group 3 facsimile devices. The standard data compression technique spe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Center Arraying

    Publication Year: 1983, Page(s):145 - 149
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    One way to increase the amount of data that can be received from weak signal sources (such as spacecraft in the vicinity of the outer planets) is to array several ground antennas in such a way as to increase the total effective aperture of the receiving system. One such method is virtual center arraying (VCA). In VCA, a combined carrier reference is derived at a point that is, conceptually, the ge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two Interfering Queues in Packet-Radio Networks

    Publication Year: 1983, Page(s):123 - 129
    Cited by:  Papers (45)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    We consider several classes of interfering queues that appear in packet-radio networks. We analyze the class of systems where one of the queues is given full priority and obtain an expression for the joint probability distribution of the queue lengths. For ALOHA-type systems with two symmetric queues we calculate the average packet waiting time and queue lengths, and for symmetric systems with an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconsideration of "A Fast Computational Algorithm for the Discrete Cosine Transform"

    Publication Year: 1983, Page(s):121 - 123
    Cited by:  Papers (32)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    Some corrections are made for the original paper "A fast computational algorithm for the discrete cosine transform," 1 which contains some errors of indexes and of multiplication factors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approximate Method for the Performance Analysis of Buffer Insertion Rings

    Publication Year: 1983, Page(s):50 - 55
    Cited by:  Papers (54)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    A new analytic approach for the performance evaluation of buffer insertion rings is proposed which overcomes the basic limitations of former analyses. Key to our analysis is that the global performance model of a buffer insertion ring is decomposed into submodels in such a way that the basic interdependence of interarrival and transmission times of the frames transmitted is taken into account. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Nonblocking Switching Networks Composed of Digital Symmetrical Matrices

    Publication Year: 1983, Page(s):2 - 9
    Cited by:  Papers (29)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    Significant advances in semiconductor technology make it possible to construct new components called digital symmetrical matrices, which mix in the same integrated circuit, time and space switching. In this paper, structures of multistage nonblocking networks composed of such matrices are described. The condition under which the network will be nonblocking is formulated, and the relationship betwe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Residual Correlation of the Hadamard Transforms of Stationary Markov-1 Signals

    Publication Year: 1983, Page(s):119 - 121
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    The residual correlation of the Hadamard transforms of stationary Markov-1 signals is investigated. It is shown that the decorrelation in the Hadamard domain is not substantially improved by increasing the block size or the number of data points. This is in sharp contrast with the DFT and other sinusoidal transforms known for their asymptotic equivalence to the KLT. The computational simplicity of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Further Notes and Anecdotes on Spread-Spectrum Origins

    Publication Year: 1983, Page(s):85 - 97
    Cited by:  Papers (9)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1912 KB)

    This sequel to R. A. Scholtz's monograph of May 1982, in this TRANSACTIONS, adds to the early history of spread-spectrum communications from circa 1900 until about 15 years ago. Relevant to the origins of this field of radio signaling, the following are included in a number of items of quite recent appreciation: the 1930 invention of secret communications featuring spectrum despreading via a local... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Path Rearranging in a Data Switching Network

    Publication Year: 1983, Page(s):155 - 157
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    Path rearranging results in a 60 percent savings of hardware in a nonblocking 2048-line switch. The blocked connection is freed up by exchanging paths between two middle matrices. Selection criteria for the middle matrices include the incidence of duplicate connections through these matrices. A path rearranging algorithm is derived from the Paull method and implemented in software by the network c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of IJF-OQPSK Modulation Schemes in a Complex Interference Environment

    Publication Year: 1983, Page(s):137 - 144
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    The error probability (Pe) performance of intersymbolinterference and jitter-free offset-QPSK (IJF-OQPSK) modems in a cochannel and adjacent-channel interference environment is evaluated using a computer simulation technique. Hardware design and experiments have been completed to verify the simulation results. The results indicate that a spectral efficiency of 1.5 bits/s/Hz can be obtai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Communications System Which Prioritizes the Queues, Service Channels, and Traffic

    Publication Year: 1983, Page(s):113 - 118
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    A new priority communications protocol has been defined and analyzed. This M/M/C/K system is unique because priorities are assigned not only to the incoming traffic, but also to the queues and the service channels (which may process calls only of an equal or higher priority). This nonpreemptive priority assignment technique significantly improves the grade o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notes on Spread-Spectrum History

    Publication Year: 1983, Page(s):82 - 84
    Cited by:  Papers (5)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    This paper presents additional historical information relating to the spread-spectrum history described in [1]. Included here are ties with speech scrambling technology, wide-band matched filter design, stimulus of the WHYN system design by British research, ITT's efforts to protect vital information during World War II, and other miscellaneous notes and references. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Three-Stage Rearrangeable Connecting Networks in the Thermodynamic Limit: Number of Needed Reswitchings

    Publication Year: 1983, Page(s):110 - 113
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    We show that for sufficiently large systems the needed number of reswitchings is independent of the size and we derive formulas giving the relation between the probability that we have to rearrange and the average number of needed reswitchings. These formulas are backed by computer simulations. Moreover, the packing hunting strategy leads to a greater average number of reswitchings when a call is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Impact of Mismatch on the Performance of Coded Narrow-Band FM with Limiter/Discriminator Detection

    Publication Year: 1983, Page(s):28 - 36
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB)

    The performance of uncoded narrow-band FM with limiter/discriminator (L/D) detection over the additive white Gaussian noise channel has received widespread attention [1]-[14] over the years both from simulation and analytical standpoints. By comparison, little or nothing has appeared in the literature for the performance of this modulation/demodulation technique when used together with coding/deco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas