Scheduled System Maintenance
On Saturday, December 10, single article sales and account management will be unavailable from 5:00 AM-7:30 PM ET.
We apologize for the inconvenience.
By Topic

IEEE Transactions on Communications

Issue 9 • September 1985

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover and table of contents]

    Publication Year: 1985, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (197 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 1985, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (349 KB)
    Freely Available from IEEE
  • Communication Using Pseudonoise Modulation on Electric Power Distribution Circuits

    Publication Year: 1985, Page(s):964 - 974
    Cited by:  Papers (51)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1008 KB)

    Localized communication networks for office automation, security monitoring, environmental management of buildings, computer communications, and other applications enjoy every increasing demand. This paper considers communication of data and analog message signals over electric power distribution circuits for such applications, using pseudonoise (PN) modulation. Advantages of power distribution ci... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spatial TDMA: A Collision-Free Multihop Channel Access Protocol

    Publication Year: 1985, Page(s):934 - 944
    Cited by:  Papers (233)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (960 KB)

    In this paper we define a broadcast channel access protocol called spatial TDMA, which is designed specifically to operate in a multihop packet radio environment where the location of the nodes of the network is assumed to be fixed. The defined protocol assigns transmission rights to nodes in the network in a local TDMA fashion and is collisionfree. Methods for determining slot allocations are dev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of a Priority Polling System for Two-Way Traffic

    Publication Year: 1985, Page(s):1001 - 1006
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    Polling systems are a common mechanism for packet transmission in switching systems with distributed control, and computer communication systems, where data and signaling packets must be passed between a set of peripheral device controllers and a central control facility. Presented in this paper is the queueing analysis of the transmission delays for the two-way data traffic between the central co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Studies on Loss Aging in Submarine Coaxial Cable During Storage

    Publication Year: 1985, Page(s):945 - 954
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1000 KB)

    Attenuation loss change in submarine coaxial cables during 4 years of storage has been measured. Attenuation loss is shown to increase for one year after manufacturing. Then, loss is also shown to increase during summer (May to October) and to stay constant or to decrease during winter (November to April of the next year). This work concentrates on the causes and an estimation method of loss aging... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Results on Mean Time-to-First-Slip for a First-Order Loop

    Publication Year: 1985, Page(s):897 - 903
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    Approximate results are derived from a new expression for the mean time-to-first-slip for a first-order loop with arbitrary periodic equivalent phase detector characteristic in the presence of frequency detuning. They are accurate for loop signal-to-noise ratios greater than 3 dB or less than 0 dB. The approximations found serve to provide insight into the mean first slip time dependence on the sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tree-Based Multiaccess Protocols Where Collision Multiplicities Are Known

    Publication Year: 1985, Page(s):999 - 1001
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    We compute the stability region and mean packet delay for a class of tree-based, multiaccess protocols proposed recently in the literature for an ALOHA-type channel when collision multiplicities are known, and Show that within the stability region, all the moments of the delay distribution are finite. We also show that the main advantage, of knowing the collision multiplicities is being able, in e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Motion Compensated Interframe Image Prediction

    Publication Year: 1985, Page(s):1011 - 1015
    Cited by:  Papers (101)  |  Patents (38)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Interframe motion estimation of subblocks based on improved search techniques is developed. These techniques are based on minimizing the mean difference between the subblock in question in the present frame and the displaced subblock in the previous frame. The performance of the motion compensated prediction developed here is investigated for various block sizes and is compared to other techniques... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digitally Phase Modulated (DPM) Signals

    Publication Year: 1985, Page(s):911 - 918
    Cited by:  Papers (18)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    Some properties of digitally phase modulated (DPM) signals are presented. Phase modulation with (overlapping) pulses generated by a digital FIR filter belong to this class, which may be considered to be a practical approximation to continuous phase modulated (CPM) signals. The power spectra of DPM signals are derived analytically. The ability of these signals to operate through an additive white G... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Probability Density Function of the Squared Envelope of a Sum of Random Phase Vectors

    Publication Year: 1985, Page(s):993 - 996
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    A recursive solution is presented for the probability density function of the sum of N independent, random phase vectors. The recursion parameter is N , the number of vectors in the sum. This approach allows one to rapidly compute a complete set of these density functions for values of N...
						<a href= View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Time CSMA: Why Two Clocks Are Better than One

    Publication Year: 1985, Page(s):919 - 933
    Cited by:  Papers (53)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1704 KB)

    A new carrier sense multiple access (CSMA) algorithm, called virtual time CSMA, is described and analyzed. This algorithm uses a novel approach to granting access to the shared broadcast channel based on variable-rate clocks. Unlike other CSMA algorithms, the operation of virtual time CSMA reduces to the ideal case in the zero propagation time limit: a work-conserving, first-come first-served View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weak-Signal DPSK Detection in Narrow-Band Impulsive Noise

    Publication Year: 1985, Page(s):1008 - 1011
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    The weak-signal receiver for binary differential phase-shift keying (DPSK) in additive noise is derived, and its performance in terms of the error probability in the most general narrow-band impulsive (nonGaussian) noise model, Middleton's class A noise, is analyzed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Analysis of the Sensitivity of Digital Modulation Techniques to Frequency-Selective Fading

    Publication Year: 1985, Page(s):986 - 992
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    This Paper investigates the sensitivity to frequency-selective fading of different modulation techniques commonly used in digital radio systems. The modulation methods considered are phase-shift-keying ( M ary PSK), nonoffset and offset quadrature amplitude modulation ( M -ary QAM), and quadrature partial response signaling ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The N-Phase Digital Tanlock Loop for Tracking Suppressed-Carrier N-ary PSK Signals

    Publication Year: 1985, Page(s):904 - 910
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    In this paper, the performance of an N -phase digital tanlock loop (DTL) in the presence of phase error disturbance is studied. The N phase DTL is a digital loop for tracking suppressed-carrier N -ary phaseshift keyed (PSK) signals. It has linear phase characteristics in the modulo- View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simple, Approximate Method of Generating Baseband-Serial MSK

    Publication Year: 1985, Page(s):1006 - 1008
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    An alternate derivation of the serial formulation of the MSK signal leads to an approximate implementation that is based on filtering an easily generated three-level data signal through a high- Q , two-pole filter whose low-pass and bandpass outputs are modulated onto quadrature carriers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparison of Some Error Detecting CRC Code Standards

    Publication Year: 1985, Page(s):996 - 998
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    Many data communication systems make use of cyclic redundancy check (CRC) codes for error detection purposes. In this paper, an asymptotic result concerning the undetected error probability P(\epsilon) of CRC codes is derived. The P(\epsilon) 's of a number of CRC codes which have been adopted as international standards ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Smearing Filters for Data Transmission Systems

    Publication Year: 1985, Page(s):955 - 963
    Cited by:  Papers (13)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB)

    In this paper, we introduce a new approach to design smearing and desmearing filters for data transmission systems to suppress pulse-like disturbances inserted in the communication channel. Our method is based on time domain considerations. It consists of the optimization of two merit factors defined for the impulse response functions of the filters. The first one is a measure of the smearing effi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Availability of Multilevel CPFSK Systems with Modulation Pulse Shaping During Multipath Propagation

    Publication Year: 1985, Page(s):975 - 985
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1072 KB)

    The behavior of CPFSK systems with modulation pulse shaping and limiter-discriminator detection is tested in the prsence of multipath fading. With the aim of determining the eye-closure domain, a theoretical analysis is presented for a generic number of modulation levels. It is shown that, by suitably varying the maximum angular frequency deviation ωd, control of outage probability... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Postfiltered DPCM Scheme

    Publication Year: 1985, Page(s):1019 - 1021
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    Quantization noise constitutes the limiting factor on DPCM performance. For a low number of levels in the quantizer, this noise is also correlated. In this correspondence we present a technique for improving the performance of the DPCM system at a very modest cost. The technique involves the use of an adaptive transversal filter at the receiver output to reduce the effects of quantization noise. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stack Algorithm Speech Encoding with Fixed and Variable Symbol Release Rules

    Publication Year: 1985, Page(s):1015 - 1018
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    Tree codes find wide use in a variety of problems such as source encoding, sequential decoding, pattern recognition, and related fields. Efficient algorithms exist to explore the code trees and are well documented in the literature. All of these algorithms search code trees in an incremental manner, releasing a path map symbol at a time. A recent work has investigated the effect of releasing multi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas