IEEE Transactions on Communications

Issue 10 • October 1985

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover and table of contents]

    Publication Year: 1985, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Coding for Frequency-Hopped Spread-Spectrum Communication with Partial-Band Interference - Part I: Capacity and Cutoff Rate

    Publication Year: 1985, Page(s):1036 - 1044
    Cited by:  Papers (36)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (779 KB)

    The performance of optimal codes on frequency-hopped channels with partial-band interference is investigated. The performance measures considered are channel capacity and cutoff rate. Worst-case partial-band Gaussian noise interference is assumed with the interference independent of the transmitted signal. The capacity and cutoff rate are calculated as a function of the signal-to-noise ratio. We c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coding for Frequency-Hopped Spread-Spectrum Communication with Partial-Band Interference - Part II: Coded Performance

    Publication Year: 1985, Page(s):1045 - 1057
    Cited by:  Papers (49)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1068 KB)

    The performance of codes in a frequency-hopped spreadspectrum communication system with partial-band interference is investigated. The performance measure considered is the decoded bit error probability. A simplified interference model and worst-case partial-band Gaussian noise interference model is considered with the interference noise statistically independent of the transmitted signal. We cons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coded Error Probability for DS Spread-Spectrum Systems with Periodic Pulsed Multiple-Tone Interference

    Publication Year: 1985, Page(s):1126 - 1132
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    The coded error probability for direct sequence (DS) BPSK or QPSK spread-spectrum systems, used with or without interleaving, and operating in the presence of pulsed multiple-tone interference, is investigated. We consider the worst-case channel error probability under conditions of pulsed multiple-tone jamming for the various systems, and present coded error probability as a function of interleav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improvement of the minimum distortion encoding algorithm for vector quantization

    Publication Year: 1985, Page(s):1132 - 1133
    Cited by:  Papers (247)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB)

    In this note we present a very simple method for improving the efficiency of minimum distortion encoding for vector quantization. Simulations indicates a reduction of up to 70 percent in the number of multiplications for a full search vector quantizer with a large number of codewords, and about 25-40 percent for a tree search vector quantizer. Similar improvement can be achieved in other vector qu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of Narrow-Band Filters on the Error Probability of M-ary FSK with a Limiter-Discriminator-Integrator Detector

    Publication Year: 1985, Page(s):1133 - 1136
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB)

    We derive an equation for the error probability ofM-ary frequency shift keying with a limiter-discriminator-integrator detector in the presence of narrow-band filters in the transmitter and receiver. We present numerical results for the case of quaternary symbols, wide-band transmitter filter, and Butterworth filter in the receiver with 2, 3, and 4 poles. We optimize the sampling time a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asymmetrical Pulse Shaped QPSK Modulation Systems

    Publication Year: 1985, Page(s):1146 - 1150
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    To enable differential detection of coincident, hard-limited, and reduced sidelobe QPSK type of signals, we introduce asymmetrical pulse shapes. This asymmetry in theIandQbaseband channels leads to coincident (unstaggered) QPSK system applications. We consider the bit error probability performance of these modulation schemes on a hardlimited channel in the presence of uplink ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Back cover]

    Publication Year: 1985, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (328 KB)
    Freely Available from IEEE
  • Mean Packet Queueing Delay in a Buffered Two-User CSMA/CD System

    Publication Year: 1985, Page(s):1136 - 1139
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    We consider a system of two users of slotted CSMA-CD (carrier-sense multiple-access with collision detection). The two users are assumed to have independent identical packet arrival streams, the identical randomizing policy for retransmission, and an infinite capacity for storing queued packets. The mean packet delay (including the queueing and retransmission delays) is derived explicitly. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Realization of Finite Impulse Response Filters Using Coefficients +1, 0, and -1

    Publication Year: 1985, Page(s):1117 - 1125
    Cited by:  Papers (49)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (872 KB)

    New classes of nonrecursive linear digital filters are proposed as alternatives to conventional methods for digital signal processing devices. In fact, the traditional approach, where signal samples are represented by 8-15 bit words, can be very expensive to implement due to the complexity of multibit multipliers and adders. Filter structures consisting of a transversal filter with tap coefficient... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Speech Interpolation for Variable Rate Coders with Application to Subband Coding

    Publication Year: 1985, Page(s):1100 - 1108
    Cited by:  Papers (6)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (888 KB)

    A theoretical method of evaluating degradations of variable rate coders in a multichannel digital speech interpolation (DSI) system is developed. Each of the coder outputs has a variable rate based on the algorithm. The DSI system multiplexes the outputs of these variable rate coders into a fixed bit rate channel. During periods of high activity all active users are served, but at a reduced rate d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Traffic Access Control Strategies in Integrated Service Networks

    Publication Year: 1985, Page(s):1085 - 1093
    Cited by:  Papers (85)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    A common digital transmission facility provides service to a community of heterogeneous users generating traffic with differing intensity, message length, and bit rate. In order for this type of integrated communication system to handle its traffic demands with high efficiency and flexibility, close control of access and switching at the input node is required. We propose, analyze, and compare two... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Update of Replicated Topology Databases

    Publication Year: 1985, Page(s):1076 - 1084
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1112 KB)

    In computer communication networks, routing is often accomplished by maintaining copies of the network topology and dynamic performance characteristics in various network nodes. The present paper describes an algorithm that allows complete flexibility in the placement of the topology information. In particular, we assume that an arbitrary subset of network nodes are capable of maintaining the topo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Optimal Transform Trellis Code with Applications to Speech

    Publication Year: 1985, Page(s):1109 - 1116
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    This paper presents a rate-distortion derived transform trellis coding (TTC) scheme with applications to Gaussian AR sources and speech data. The optimal encoder consists of a Karhunen-Loeve transform (KLT) on the source output, followed by a search on a trellis structured random code, where the decoder is a time-variant nonlinear filter. The scheme is implementable and applicable to stationary Ga... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficiency of Outphasing RF Power-Amplifier Systems

    Publication Year: 1985, Page(s):1094 - 1099
    Cited by:  Papers (179)  |  Patents (98)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    The outphasing technique (LINC) combines two nonlinear RF power amplifiers into a linear RF power-amplifier (PA) system. The two PA's are driven with signals of different phases, and the phases are controlled so that the addition of the PA outputs produces a system output of the desired amplitude. However, the resultant time-varying impedances presented to the PA's alter their dc power consumption... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Automatic Equalizer Including a Decoder of Error-Correcting Code

    Publication Year: 1985, Page(s):1142 - 1146
    Cited by:  Papers (12)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    A new proposed automatic equalizer including a decoder of error-correcting code (AEDEC) is obtained by the joint adaptive operation of an automatic equalizer and a decoder. This AEDEC can reduce misadjustment of tap values and error propagation owing to decision errors, and stabilize convergence even without a known training signal in noisy channels. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Two-Stage Rearrangeable Broadcast Switching Network

    Publication Year: 1985, Page(s):1025 - 1035
    Cited by:  Papers (47)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1176 KB)

    A new rearrangeable broadcast switching network has been invented. In its simplest form, the network has two stages. For larger networks, the switches in each stage can be replaced with two-stage networks to reduce crosspoint cost. The invention is based on an innovative approach of connecting each inlet channel to a multiplicity of first-stage switches according to a predetermined connection patt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multiaccess Protocol for Multihop Radio Networks

    Publication Year: 1985, Page(s):1067 - 1075
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB)

    We describe an adaptive multiaccess channel protocol for use in radio networks with an arbitrary distribution of stationary hidden nodes, which provides the nodes with controlled, collision-free access to the channel. The protocol can be considered to belong to the BRAM [5] protocol family, but differs in significant ways from BRAM. In this paper we describe the tenets of the protocol, then develo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simulation Study of Clock Recovery in QPSK and 9QPRS Systems

    Publication Year: 1985, Page(s):1139 - 1142
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    Computer simulation is employed to assess jitter performance of a clock recovery circuit as a function of the characteristics of the rectifier being used. Several types of rectifiers are compared, some operating at baseband, others at intermediate frequency (IF). It is shown that the best choice between them depends both on the modulation format and on the excess bandwidth factor of the pulse spec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flow Control in Local-Area Networks of Interconnected Token Rings

    Publication Year: 1985, Page(s):1058 - 1066
    Cited by:  Papers (71)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (896 KB)

    We investigate flow-control issues in local-area networks consisting of multiple token rings interconnected through bridges. To achieve high throughput, bridges perform only a very simple routing and store-and-forward function, but are not involved in error- or flowcontrol. In case of congestion, bridges discard arriving frames, which will be recovered through an appropriate end-to-end protocol be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas