IEEE Transactions on Communications

Issue 3 • March 1983

Filter Results

Displaying Results 1 - 25 of 26
  • [Front cover and table of contents]

    Publication Year: 1983, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (194 KB)
    Freely Available from IEEE
  • Design Methodology for ΣΔM

    Publication Year: 1983, Page(s):360 - 370
    Cited by:  Papers (96)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1139 KB)

    The paper presents a design methodology based on correspondence between performance requirements, mathematical parameters, and circuit parameters of a sigma-delta modulator. This methodology will guide a design engineer in selecting the circuit parameters based on system requirements, in translating paper design directly into LSI design, in predicting the effect of component sensitivity, and in an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time Diversity with Adaptive Error Detection to Combat Rayleigh Fading in Digital Mobile Radio

    Publication Year: 1983, Page(s):378 - 387
    Cited by:  Papers (17)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1014 KB)

    A new diversity technique is proposed to combat Rayleigh fading in digital mobile radio systems transmitting speech signals. The speech signals are μ-law PCM encoded (mu = 255, 8 kHz sampling, 8 bits/code word, 64 kbit/s data rate), and alternate data words are used to form two streams called "odd" and "even." The even stream is delayed by τ seconds and the streams are interle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anisotropic Nonstationary Image Estimation and Its Applications: Part I - Restoration of Noisy Images

    Publication Year: 1983, Page(s):388 - 397
    Cited by:  Papers (77)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2059 KB)

    A new form of image estimator, which takes account of linear features, is derived using a signal equivalent formulation. The estimator is shown to be a nonstationary linear combination of three stationary estimators. The relation of the estimator to human visual physiology is discussed. A method for estimating the nonstationary control information is described and shown to be effective when the es... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anisotropic Nonstationary Image Estimation and Its Applications: Part II - Predictive Image Coding

    Publication Year: 1983, Page(s):398 - 406
    Cited by:  Papers (26)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1724 KB)

    A new predictive coder, based on an estimation method which adapts to line and edge features in images, is described. Quantization of the prediction error is performed by a two-level adaptive scheme: an adaptive transform coder, and threshold coding in both transform and spatial domains. Control information, which determines the behavior of the predictor, is quantized using a simple variable rate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Class of Two-Symbol-Interval Modems for Nonlinear Radio Systems

    Publication Year: 1983, Page(s):433 - 441
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (613 KB)

    Based on Feher's nonlinear filter (NLF) invention, we developed a class of intersymbol-interference and jitter-free (IJF) baseband signals and JJF-OQPSK systems. In [14] and [18] we demonstrated the performance advantages of these systems over QPSK, OQPSK, and MSK systems. In this paper a new class of IJF two-symbol-interval (TSI) baseband pulse shapes is introduced. The spectral properties and th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Image Compression by Outer Product Expansion

    Publication Year: 1983, Page(s):441 - 444
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (646 KB)

    We approximate a digital image as a sum of outer products dxyTwheredis a real number but the vectorsxandyhave elements +1, -1, or 0 only. The expansion gives a least squares approximation. Work is proportional to the number of pixels; reconstruction involves only additions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Diversity ALOHA - A Random Access Scheme for Satellite Communications

    Publication Year: 1983, Page(s):450 - 457
    Cited by:  Papers (82)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (653 KB)

    A generalization of the slotted ALOHA random access scheme is considered in which a user transmits multiple copies of the same packet. The multiple copies can be either transmitted simultaneously on different frequency channels (frequency diversity) or they may be transmitted on a single high-speed channel but spaced apart by random time intervals (time diversity). In frequency diversity, two sche... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on "Discrete-Time Queueing Systems and Their Networks"

    Publication Year: 1983, Page(s):461 - 463
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB)

    In the paper Bharath-Kumar presented an analysis of a discrete buffered system of infinite capacity, where the length of the packets is drawn from a geometric distribution and the packets leaving the resource have to be retransmitted with some probability. In this correspondence an analysis of the same system is given which applies for a general packet length distribution, and where the length of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on "Real-Time Speech Coding"

    Publication Year: 1983, Page(s):466 - 468
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Back cover]

    Publication Year: 1983, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (453 KB)
    Freely Available from IEEE
  • Sharing Memory Optimally

    Publication Year: 1983, Page(s):352 - 360
    Cited by:  Papers (88)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB)

    Efficient design of service facilities, such as data or computer networks that meet random demands, often leads to the sharing of resources among users. Contention for the use of a resource results in queueing. The waiting room is a part of any such service facility. The number of accepted service requests per unit of time (throughput), or the fraction of the time the servers are busy (utilization... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing to Multiple Destinations in Computer Networks

    Publication Year: 1983, Page(s):343 - 351
    Cited by:  Papers (193)  |  Patents (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (872 KB)

    Algorithms for effectively routing messages from a source to multiple destination nodes in a store-and-forward computer network are studied. The focus is on minimizing the network cost (NC), which is the sum of weights of the links in the routing path. Several heuristic algorithms are studied for finding the NC minimum path (which is an NP-complete problem). Among them are variations of a minimum ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error Rate Estimates in Digital Communication Over a Nonlinear Channel with Memory

    Publication Year: 1983, Page(s):407 - 412
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    The principal representations of Krein are known to provide very tight upper and lower bounds on the error probability in digital communication over a linear channel with intersymbol interference. These bounds depend on the signal-to-noise ratio, the amount of intersymbol interference, and the number of moments of the random interference variable. The same technique can be applied to a nonlinear c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of a Direct Sequence Spread-Spectrum System with Long Period and Short Period Code Sequences

    Publication Year: 1983, Page(s):412 - 419
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    In this paper, the performance of a direct sequence spread-spectrum system is analyzed with both a long period sequence and with a sequence whose period is one bit long. Bit error rates for both quadriphase and biphase chip spreading, in conjunction with both QPSK and BPSK data, are considered in the presence of noise and jamming. The frequency location of the jammer is arbitrary. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Multichannel Hardware Simulator for Frequency-Selective Mobile Radio Paths

    Publication Year: 1983, Page(s):370 - 377
    Cited by:  Papers (24)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB)

    We present the analysis and design of an efficient hybrid digital/analog multichannel hardware simulator for frequencyselective Rayleigh-fading mobile radio paths. The simulator has eight RF outputs and is linear and reciprocal. All outputs exhibit mutually independent Rayleigh fading over a 45 dB range and have identical time delay spreads. Analog RF techniques are combined with a digital signal ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparison of Two Types of Symbol Synchronizers for Which Self-Noise Is Absent

    Publication Year: 1983, Page(s):329 - 334
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    For most symbol synchronizers operating on a PAM waveform corrupted by noise, the timing error consists of a noisedependent term and a data-dependent term. When the signal-to-noise ratio (SNR) is high, the data-dependent term, which is often called self-noise, dominates, and the timing error variance becomes independent of SNR. In this paper we present two types of symbol synchronizers for which s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Line-Adaptive Hybrid Coding of Images

    Publication Year: 1983, Page(s):445 - 450
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    This paper describes novel adaptation strategy for hybrid transform/DPCM image coders. This strategy has yielded a 2-8 dB increase in signal-to-noise ratio in the transmission of a head and shoulders image at bit rates of 1-4 bits per pel and one-dimensional transform block sizes of 2-16. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Some Rearrangement Algorithms to a T-S-T Network

    Publication Year: 1983, Page(s):309 - 314
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    The degree to which rearrangement reduces blocking, and its cost in time and complexity, depend on the algorithm used. Here we apply two algorithms to a range of time-space-time networks and compare the results obtained with those produced by Akiyama. We note that in one of these algorithms some states can occur which make effective rearrangement impossible, a condition which does not have a paral... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Redundancy, the Discrete Fourier Transform, and Impulse Noise Cancellation

    Publication Year: 1983, Page(s):458 - 461
    Cited by:  Papers (110)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    The relationship between the discrete Fourier transform and error-control codes is examined. Under certain conditions we show that discrete-time sequences carry redundant information which then allow for the detection and correction of errors. An application of this technique to impulse noise cancellation for pulse amplitude modulation transmission is described. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Binary DPSK Error Rates Due to Noise and Intersymbol Interference

    Publication Year: 1983, Page(s):463 - 466
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    This paper presents a new series for evaluating the conditional bit error rate (BER) of a given transmitted data sequence in a band-limited binary differential-phase-shift-keyed system. This series involves modified Struve functions and it was found to have converged quickly. The conditional BER can then be averaged over all possible bit sequences to yield the system BER. The results obtained are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Class of High Rate Codes for Byte-Oriented Information Systems

    Publication Year: 1983, Page(s):334 - 342
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    In this paper we introduce a class of linear codes especially designed to provide additional error protection for data consisting of bytes all having even (or odd) parity (e.g., ASCII characters). The technique consists in adding an overall parity byte computed as a linear function of the information bytes. The linear function is designed such that the resulting codes can correct all single errors... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-Dimensional DPCM Image Transmission Over Fading Channels

    Publication Year: 1983, Page(s):315 - 328
    Cited by:  Papers (17)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1528 KB)

    A combined source-channel coding approach is described for the encoding, transmission, and remote reconstruction of image data. The transmission medium considered is that of a fading dispersive communications channel. Both the Rician fading and Rayleigh fading channel models are considered. The image source encoder employs two-dimensional (2-D) differential pulse code modulation (DPCM). This is a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Analytical Formulation for Grade of Service Determination in Telephone Networks

    Publication Year: 1983, Page(s):420 - 424
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    The paper provides a simple method for point-to-point blocking estimation in telephone networks. A one-moment model is developed which incorporates the definition of fictitious offered traffic that enables one to take into account the deviation of smooth and peaked traffics from the Poisson. Numerical results illustrate the accuracy of the method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bit Rate Reduction of Digitized Speech Using Entropy Techniques

    Publication Year: 1983, Page(s):424 - 430
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    We present the results of a study to reduce the bit rate of speech that has been digitized with a continuously variable slope delta modulator (CVSD) operating at 16, 24, and 32 kbits/s. The theoretical reduction is found from the bit stream entropy. The actual reduction, via Huffman coding, is within 1-2 Percent of the theoretical value. The conditional entropy indicates that additional bit rate r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas