IEEE Transactions on Communications

Issue 5 • May 1986

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover and table of contents]

    Publication Year: 1986, Page(s): 0
    Request permission for commercial reuse | |PDF file iconPDF (197 KB)
    Freely Available from IEEE
  • A BPSK/QPSK Timing-Error Detector for Sampled Receivers

    Publication Year: 1986, Page(s):423 - 429
    Cited by:  Papers (377)  |  Patents (95)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (666 KB)

    A simple algorithm for detection of timing error of a synchronous, band-limited, BPSK or QPSK data stream is proposed. The algorithm requires only two samples per symbol for its operation. One of the two samples is also used for the symbol decision. Derivation of thescurve reveals a sinusoidal shape. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jitter Accumulation for Periodic Pattern Signals

    Publication Year: 1986, Page(s):475 - 480
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (644 KB)

    It is important to accurately evaluate and reduce jitter accumulation in long-haul digital repeatered lines. Jitter accumulation caused by random pattern signals has already been analyzed. However, periodic pattern signals such as pseudorandom signals are usually used to measure jitter accumulation. This paper describes the difference between the jitter accumulation for both signals and the necess... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computation of the Bit Error Rate of Coherent M-ary PSK with Gray Code Bit Mapping

    Publication Year: 1986, Page(s):488 - 491
    Cited by:  Papers (104)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (350 KB)

    Efficient computation of the bit error rate (BER) for the coherentM-ary PSK signals with Gray code bit mapping is considered. A closed-form expression for the exact BER of 8-ary PSK is presented. Tight upper and lower bounds on BER are also obtained forM-ary PSK with largerM. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comment on "Performance of Baseband Digital Data Transmission in Nonlinear Channels with Memory"

    Publication Year: 1986, Page(s):491 - 492
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (210 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author's reply

    Publication Year: 1986, Page(s): 492
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (127 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Choice of the Timeout Distribution in Decentralized Random Access Systems

    Publication Year: 1986, Page(s):501 - 504
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (388 KB)

    A decentralized multiple access system in whichm geq 2collided users employ a random access protocol is considered. Maximum entropy considerations are used to select the appropriate timeout distribution under various moment constraints. This analysis extends and corrects an earlier result form = 2. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deterministic Routing to Buffered Channels

    Publication Year: 1986, Page(s):504 - 507
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (453 KB)

    Considernexponential transmission channels which transmit information with different rates. Every channel has a buffer which is capable of storing an unlimited number of messages. A new message first arrives at the controller, which immediately routes it to one of the channels according to an infinite deterministic routing sequence. A cost per unit of staying time is charged in each of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Back cover]

    Publication Year: 1986, Page(s): 0
    Request permission for commercial reuse | |PDF file iconPDF (205 KB)
    Freely Available from IEEE
  • Calculating Error Probabilities for Intersymbol and Cochannel Interference

    Publication Year: 1986, Page(s):430 - 435
    Cited by:  Papers (112)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (584 KB)

    The probability of error in a binary symmetric channel with intersymbol interference and additive noise is efficiently calculated by numerical quadrature of a Laplace inversion integral along a contour in the complex plane passing through a saddlepoint of the integrand. For Gaussian noise, a bound is set on the truncation error incurred by necessarily restricting the integration to a finite interv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Algorithm for Performance Analysis of Networks with Unreliable Components

    Publication Year: 1986, Page(s):496 - 497
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (288 KB)

    A new approach for analyzing the performance of communication networks with unreliable components was given in a recent paper [2]. An algorithm was developed to generate the most probable states of a network, and an analysis of those states gave a good approximation of the network performance. In this paper, we present a new algorithm for generating the most probable states. This new algorithm is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Concatenated Coding Scheme for Error Control

    Publication Year: 1986, Page(s):481 - 488
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (760 KB)

    In this paper, a concatenated coding scheme for error control in data communications is presented and analyzed. In this scheme, the inner code is used for both error correction and detection; however, the outer code is used only for error detection. A retransmission is requested if either the inner code decoder fails to make a successful decoding or the outer code decoder detects the presence of e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Coding Gain for Degraded Channels

    Publication Year: 1986, Page(s):492 - 496
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (592 KB)

    This correspondence deals with the coding gain for harddecisioned codes used over realistic channels. A simulation-based procedure is described, by which the performance (BER) curve of a coded system can be straightforwardly determined. The coding gain for real, i.e., "degraded" channels is discussed, vis-a-vis that for idealized channels. A formula for asymptotic coding gain for the latter type o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Discrete-Time Delta Modulation System

    Publication Year: 1986, Page(s):510 - 512
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (312 KB)

    Delta modulation communication systems are a popular and effective approach for transmitting analog signals over a binary channel. The performance of a discrete-time linear and leaky delta modulator is compared to the performance of the optimal delta modulator for a firstorder Gauss-Markov source. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Viterbi Detection of Class IV Partial Response on a Magnetic Recording Channel

    Publication Year: 1986, Page(s):454 - 461
    Cited by:  Papers (156)  |  Patents (67)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (792 KB)

    The application of Viterbi detection to Class IV partial response on a magnetic recording channel is discussed. The theoretical performance is analyzed in the presence of noise correlation and quantizing errors. A simplified algorithm is described which was implemented on a transverse-scan magnetic tape recorder operating at a linear density of 1800 bits/mm and a transfer rate of 120 Mbits/s. Foll... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Theory of an Imperfect PCM Encoder-Decoder Pair Using Half-Channel Measures

    Publication Year: 1986, Page(s):507 - 510
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (416 KB)

    A theory is presented for the quantization noise power and gain of a PCM channel in terms of static and dynamic errors in encoder decision levels and decoder output levels. Decision profiles are used in a statistical model for encoder imperfections, while conditional output distributions describe those of the decoder. The model describes the combined behavior of any encoder and decoder that have b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of Channel Errors on the Delay-Throughput Performance and Capacity of ALOHA Multiple Access Systems

    Publication Year: 1986, Page(s):497 - 501
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (488 KB)

    The effects of channel transmission errors as well as packet collisions on delay-throughput performance are determined for ALOHA systems. The results are applied to the optimization of multichannel system throughput when retransmissions from bit errors prevent efficient utilization of a single wide-band power-limited channel. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coded Phase/Frequency Modulation

    Publication Year: 1986, Page(s):446 - 453
    Cited by:  Papers (64)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (704 KB)

    Channel coding combined with expanded signal sets has been shown [1] to improve error performance over uncoded modulation without expanding the bandwidth of the transmitted signals. In this paper, new coded modulation formats defined over an expanded set of signals varying both in phase and frequency are presented. The new schemes combine FSK and PSK modulation and make use of trellis coding and V... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synchronization Failures in a Chain of PLL Synchronizers

    Publication Year: 1986, Page(s):436 - 445
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (936 KB)

    In digital transmission systems employing PLL repeaters, timing jitter is produced mostly by intersymbol interference (ISI). Despite the fact that IS1 represents a narrow-band disturbance to the PLL for a long chain of N repeaters, it is responsible for cycle slips of the PLL repeater. It is demonstrated that the cycle slip rate is the key parameter determining the error performance of the system.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic Analysis of a Token Ring PBX

    Publication Year: 1986, Page(s):417 - 422
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (728 KB)

    A new approximation is described for the calculation of the transmission delay distribution experienced by voice subscribers connected to a token ring PBX. Together with simulation, the new technique is used to explore the dependence of delays to transmission on ring latency, voice packet length, and number of active subscribers for a 20 Mbit/s ring. Transmission delays are found to be relatively ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Computer Model to Evaluate Airborne Receiver Performance in Interference Environments

    Publication Year: 1986, Page(s):462 - 474
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1296 KB)

    A computer model is described to evaluate airborne radio performance in a mixed environment of friendly and hostile emitters. A new performance criterion, the communications operability volume, is introduced. This criterion permits operational, scenario-based comparisons of various radio designs over a range of interference environments. Communications operability volumes can be calculated for dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas