By Topic

IEEE Transactions on Communications

Issue 2 • February 1984

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover and table of contents]

    Publication Year: 1984, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (308 KB)
    Freely Available from IEEE
  • In Memoriam: W. R. Bennett - Some Early Memories

    Publication Year: 1984, Page(s): 109
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • ALOHA with Multipacket Messages and ARQ-Type Retransmission Protocols - Throughput Analysis

    Publication Year: 1984, Page(s):148 - 154
    Cited by:  Papers (27)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (647 KB)

    The throughput of slotted ALOHA systems with multipacket message transmissions is evaluated. The conventional strategy of retransmitting the entire message when collisions occur results in a reduction in throughput when compared with the single packet case. However, it is proved analytically that the use of ARQ-type retransmission protocols can provide significant performance improvement. In parti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revisions to "Theory of Spread-Spectrum Communications - A Tutorial"

    Publication Year: 1984, Page(s):211 - 212
    Cited by:  Papers (11)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Back cover]

    Publication Year: 1984, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (349 KB)
    Freely Available from IEEE
  • Threshold Detection in Narrow-Band Non-Gaussian Noise

    Publication Year: 1984, Page(s):134 - 139
    Cited by:  Papers (97)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    The Middleton Class A narrow-band non-Gaussian noise model [9]-[12] is examined. It is shown that this noise model (which is known to fit closely a variety of non-Gaussian noises) can itself be closely approximated by a computationally much simpler noise model. It is then shown by numerical examples that, for the problem of locally optimum detection, the simplest form of this approximation yields ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Phase and Frequency Transfer Between Mutually Synchronized Oscillators

    Publication Year: 1984, Page(s):110 - 117
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    Accurate phase and frequency transfer between mutually synchronized oscillators is a problem of current interest. This paper addresses a system of two mutually synchronized oscillators with inherently sinusoidal phase detectors. The system is studied in the context of nonlinear phase-locked loop theory. This is accomplished by Statistically characterizing the "time" and "space and time" increments... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error-Correcting Codes Against the Worst-Case Partial-Band Jammer

    Publication Year: 1984, Page(s):124 - 133
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    This paper provides performance analyses of a broad spectrum of error-correcting codes in an antijam communication system under worst-case partial-band noise jamming conditions. These analyses demonstrate the coding advantages available for systems operating with and without frequency diversity. Utilizing both the exact approach (where possible) and upper-bounding approaches (Chernoff and union bo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • mB1C Code and Its Performance in an Optical Communication System

    Publication Year: 1984, Page(s):163 - 168
    Cited by:  Papers (28)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    This paper describes a new line code which is suitable for a high-speed optical digital transmission system of more than 400 Mbits/s. This line code, named mB1C code, is created by means of a complemental pulse which is inserted every m bits. This complemental pulse prevents long series of "l"'s or "0"'s. Power spectrum,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of Nonzero-Centroid and Skewness of Fading Spectrum on Incoherent FSK and DPSK Error Probabilities

    Publication Year: 1984, Page(s):201 - 206
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    The effects of nonzero-centroid and skewness of a fading spectrum are shown to influence the binary error probabilities of incoherent FSK and differentially coherent phase-reversal (DPSK) matched-filter receivers. It is also shown that for incoherent FSK, the skewness or nonzero centroid in the fading spectrum causes different error probabilities for binary signals, resulting in a binary asymmetri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Formulation of Spectrum-Orbit Utilization Efficiency for Satellite Communications in Interference-Limited Situations

    Publication Year: 1984, Page(s):212 - 214
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    The spectrum-orbit utilization efficiency of satellite communications is becoming increasingly important. A first attempt is made in this paper to try to formulate the spectrum-orbit utilization efficiency in interference-limited situations by defining the self-efficiency for a single satellite, and the cross-efficiency and coordination efficiency for each pair of adjacent satellites. The various ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Waiting Times at Very Fast, Constant Service Time Merger Nodes

    Publication Year: 1984, Page(s):189 - 194
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    The paper concerns the study of waiting times at a packet-switched merger node for which the outgoing capacity exceeds or is equal to the sum of the capacities of the incoming channels. The case of constant service times, fixed-length packets, and general independent inputs is considered. A trivial upper bound on the waiting time is derived. Exact results on waiting time are obtained for certain s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Locating Data Frames in Direct-Detection Optical Communication Systems

    Publication Year: 1984, Page(s):118 - 123
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    The maximum-likelihood rule for locating a frame-synchronization pattern in a direct-detection optical communication system employing either Q -ary pulse-position modulation or on-off keying is identified. We show that equivalent performance for the simple correlation and postdctection-correlation rules used in practice can require substantially more than a 3 dB... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Two-Dimensional Tree Encoding of Images Using Spatial Masking

    Publication Year: 1984, Page(s):177 - 189
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2408 KB)

    An adaptive approach to two-dimensional tree encoding of images is presented based upon the use of spatial masking concepts. Specifically, we make use of an adaptive encoding filter of the smoothing variety whose smoothing action is controlled by the local visibility of the encoding noise. The approach is an attempt to obtain an optimum compromise between slope overload and granular noise characte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Integrated Voice/Data Multiplexing

    Publication Year: 1984, Page(s):140 - 147
    Cited by:  Papers (28)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    -A model of a moving-boundary, fixed frame length, integrated multiplexor is proposed and analyzed. The assignment of slots within a frame to the voice and data sources is made by an allocation function. The joint distributions of queue length and expected waiting time are derived. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Block Error Performance of Noncoherent FSK Modulation on Rayleigh Fading Channels

    Publication Year: 1984, Page(s):206 - 209
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    In this paper, the calculation of the probability P_{f}(M, N) of more than M bit errors in a block of N bits transmitted over a Rayleigh fading channel using noncoherent frequency shift keying is considered. Accurate approximations to P_{f}(M, N)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-Coupled Phase-Locked Loop with Closed Loop Amplitude Control

    Publication Year: 1984, Page(s):195 - 199
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    In this work a new version of the cross-coupled phaselocked loop (CCPLL) interference canceller is presented. This detector consists of two phase-locked loop (PLL) demodulators interconnected in such a manner as to permit one PLL to lock onto and track the instantaneous frequency of the stronger received signal, while the other loop tracks and demodulates the weaker of two received signals. In add... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bandwidth Conversion of ELF Noise Parameters

    Publication Year: 1984, Page(s):209 - 211
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The Field-Lewinstein-Modestino model represents ELF noise as the sum of Gaussian and impulsive components. This model has proven to be accurate and is especially convenient for analysis and simulation. However, the parameters of the model are bandwidth dependent and have been measured for only a few specific bandwidths. No method of calculating the parameters for other bandwidths has been presente... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sequential Coding Algorithms: A Survey and Cost Analysis

    Publication Year: 1984, Page(s):169 - 176
    Cited by:  Papers (397)  |  Patents (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1000 KB)

    The cost of a number of sequential coding search algorithms is analyzed in a systematic manner. These algorithms search code trees, and find use in data compression, error correction, and maximum likelihood sequence estimation. The cost function is made up of the size of and number of accesses to storage. It is found that algorithms that utilize sorting are much more expensive to use than those th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Repeater Fault Location for a Submarine Optical Fiber Cable Transmission System

    Publication Year: 1984, Page(s):155 - 162
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    This paper introduces a repeater fault location system for a repeated submarine optical fiber transmission system of 400 Mbits/ s at 1.3μm. The repeater fault location system is used in an out-of-service test. The fault locator transmits a test signal via a main optical fiber line, in order to make a loop-back path in one of the repeaters for returning the test signals via another main optica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Technique for Improving the Efficiency of M-ary Signaling

    Publication Year: 1984, Page(s):199 - 201
    Cited by:  Papers (2)  |  Patents (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    The coding gain of M -ary communication systems using orthogonal alphabets have been shown to improve by using concatenated orthogonal codes, each of length m = \sqrt {M} . In the receiver, a two-stage MF/correlator and ML detection are utilized to provide the final decision through only View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas