By Topic

IEEE Transactions on Communications

Issue 12 • December 1986

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover and table of contents]

    Publication Year: 1986, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (201 KB)
    Freely Available from IEEE
  • Editorial: COMSOC's New Book Series - Frontiers in Communications

    Publication Year: 1986, Page(s): 1169
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Two Parallel Queues with Dynamic Routing

    Publication Year: 1986, Page(s):1170 - 1175
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (558 KB)

    We consider two parallelM/M/1queueing systems where a new arrival (customer, job, message) joins the shorter of the two queues. Such problems arise naturally in computer communications and packet switched data networks. An asymptotic approach is developed to obtain approximations to the steady-state joint distribution of the number of customers in the two systems. We first analyze the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Better OPM/L Text Compression

    Publication Year: 1986, Page(s):1176 - 1182
    Cited by:  Papers (25)  |  Patents (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (739 KB)

    An OPM/L data compression scheme suggested by Ziv and Lempel, LZ77, is applied to text compression. A slightly modified version suggested by Storer and Szymanski, LZSS, is found to achieve compression ratios as good as most existing schemes for a wide range of texts. LZSS decoding is very fast, and comparatively little memory is required for encoding and decoding. Although the time complexity of L... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Performance of Combined Quadrature Amplitude Modulation and Convolutional Codes for Cross-Coupled Multidimensional Channels

    Publication Year: 1986, Page(s):1190 - 1201
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1125 KB)

    The performance of cross-coupled,M-ary quadrature amplitude modulation (QAM) systems is determined when bandwidth efficient trellis codes are used to combat interference. Performance with and without compensation for cross-coupled interference is presented. It is found that simple trellis codes can maintain the error probability at an acceptable level for cross-coupling parameters that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multiprocessor Architecture for the (M, L)-Algorithm Suitable for VLSI Implementation

    Publication Year: 1986, Page(s):1218 - 1224
    Cited by:  Papers (24)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (722 KB)

    The(M, L)-algorithm has been widely used in speech and image encoding. Recently, use of(M, L)-Iike algorithms has been suggested for decoding phase codes. With its ever-increasing use, there arises a need to explore architectures suitable for real-time applications. Toward this end, we present a multiprocessor architecture for the(M, L)algorithm that employs an SIM... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comment on "Algorithm for Construction of Variable Length Code with Limited Maximum Word Length"

    Publication Year: 1986, Page(s):1252 - 1253
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB)

    In the above correspondence, two algorithms for the construction of a minimum redundancy code have been described. In this correspondence, it is pointed out that the strategy in the correspondence does not always lead to an optimal code. A correction of both algorithms is presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Back cover]

    Publication Year: 1986, Page(s): 0
    Request permission for commercial reuse | PDF file iconPDF (3020 KB)
    Freely Available from IEEE
  • Performance Analysis of Replication ALOHA for Fading Mobile Communications Channels

    Publication Year: 1986, Page(s):1256 - 1259
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    This paper describes an ALOHA random access protocol for fading communications channels. A two-state Markov model is used for the channel error process to account for the channel fading memory. The ALOHA protocol is modified to send multiple contiguous copies of a message at each transmission attempt. Both pure and slotted ALOHA channels are considered. The analysis is applicable to fading environ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dual Sign Algorithm for Adaptive Filtering

    Publication Year: 1986, Page(s):1272 - 1275
    Cited by:  Papers (52)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    A new algorithm, which is a variant of the sign algorithm, is proposed for the adaptive adjustment of an FIR digital filter with an aim of improving the original convergence characteristics, yet retaining the advantage of hardware simplicity. Based on a recently proposed theory for the sign algorithm, a practical design method is derived for the new algorithm, and it is shown by computer simulatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End-to-End Speech Freeze-Out Fractions in a Network with Speech Interpolations

    Publication Year: 1986, Page(s):1236 - 1245
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (904 KB)

    The end-to-end speech freeze-out fraction formula is derived in a multiple-link network employing a network-wide simultaneous speech interpolation (e.g., burst-switched network). The freeze-out fraction formula for a TASI system derived by Weinstein is shown to be a special case of this formula. A computing algorithm for the formula is developed for a tandem network in which calls can arise betwee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maximum Entropy and the Method of Moments in Performance Evaluation of Digital Communications Systems

    Publication Year: 1986, Page(s):1183 - 1189
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB)

    The maximum entropy criterion for estimating an unknown probability density function from its moments is applied to the evaluation of the average error probability in digital communications. Accurate averages are obtained, even when a few moments are available. The method is stable and results compare well with those from the powerful and widely used Gauss quadrature rules (GQR) method. For test c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asynchronous and Timing Jitter Insensitive Data Echo Cancellation

    Publication Year: 1986, Page(s):1209 - 1217
    Cited by:  Papers (14)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1008 KB)

    An approach to the implementation of asynchronous and timing jitter insensitive data echo cancellation is described. This approach introduces a small amount of jitter in the transmitted data signal, or alternatively in the received signal sampling, and uses a simple digital phase-locked loop together with the storage of two sets of echo canceler coefficients. The effect of derived timing jitter on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of Data in Burst Switching

    Publication Year: 1986, Page(s):1259 - 1263
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    The performance of interactive data traffic in burst switching is analyzed with a model that allows a number of the channels to be reserved for data messages, assumes that voice talkspurts have preemptive priority over data messages in the shared channels, and uses a fluid-flow approximation for the data traffic. Extensive validations are provided for the model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Slot Synchronization in Optical PPM Communications

    Publication Year: 1986, Page(s):1202 - 1208
    Cited by:  Papers (23)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    Maintaining slot clock synchronization in a baseband pulse position modulated (PPM) communication link is vital to its performance. This paper examines the slot clocking design associated with a direct detection, photodetecting optical PPM system. Although theoretical PPM synchronizers for optical links have been derived in the past, there is still interest in finding more practical, simpler, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Programmable Signal Processor Assemblers and Simulators

    Publication Year: 1986, Page(s):1275 - 1277
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    A method of programming an assembler and simulator for a programmable digital signal processor (PDSP) is proposed. This method is general and simple to execute, and makes use of theUNIX®; utilities awk, sed, and grep to translate a source program, consisting of assembly instructions and C statements, to either machine code for the assembler or a C program for the simulator. The app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast Algorithm for Sorting and Counting Third-Order Intermodulation Products

    Publication Year: 1986, Page(s):1266 - 1272
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    This paper presents a fast algorithm that performs a selective counting of the third-order intermodulation products generated when several carriers of various types are transmitted through a common nonlinear device. In deriving the algorithm, the carrier configuration and the frequency distribution of intermodulation products are both described by polynomials which are related to each other. The f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Zonal Sampling and Bit Allocation HT Coefficients in Image Data Compression

    Publication Year: 1986, Page(s):1246 - 1251
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    In this paper we report our investigation on zonal sampling, probability fitting tests, and bit allocation for Hadamard transform image data compression. The energy distribution of the transform coefficients suggests a sampling strategy which retains as much energy as possible for a fixed number of coefficients. The probability fitting tests indicate that Laplacian is a better model for non-dc coe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of Single Access Classes on the IEEE 802.4 Token Bus

    Publication Year: 1986, Page(s):1253 - 1256
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    The IEEE 802.4 token bus defines both synchronous and asynchronous message access classes. Their performance is compared for networks implementing a single message class. Throughput bounds are derived from the access class timer. It is shown that for some configurations, the asynchronous class yields lower observable message delays. Mean observable delay is minimized by allowing each medium access... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maximum Likelihood Sequence Detection for QPSK on Nonlinear, Band-Limited Channels

    Publication Year: 1986, Page(s):1225 - 1235
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB)

    A receiver structure based on maximum likelihood sequence estimation (MLSE) for receiving quaternary phase shift keyed signals over band-limited, nonlinear satellite channels, in the presence of additive downlink Gaussian noise, is derived. This work is an extension of work done by Mesiya et al. [2] for binary PSK transmission. Error performance of the receiver at low to moderate signal-to-noise r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two Multiplierless Designs for MF Receivers

    Publication Year: 1986, Page(s):1263 - 1266
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    Admitting coefficients that are sums of powers of 2, two multiplierless designs of digital MF receivers are proposed. Design 1. requires 22 additions per set of six output values. Design 2 requires 11 additions per set of three output values, but there is a strict requirement that the input be a valid MF sequence. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas