Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

IEEE Transactions on Communications

Issue 12 • Dec 1988

Filter Results

Displaying Results 1 - 12 of 12
  • Simulated symbol error probability for a matched filter differential detector with variable delay for continuous phase modulation

    Publication Year: 1988, Page(s):1336 - 1339
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    A matched-filter differential detector for continuous phase modulation is proposed and simulated error probability for this detector is presented. The detector consists of a conventional differential detector operating with a delay, a bank of matched filters, and a Viterbi processor to perform sequence decision. The author shows that quaternary schemes outperform binary schemes, when the schemes a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approximation for the phase offset sensitivity of Viterbi detected continuous phase modulation signals

    Publication Year: 1988, Page(s):1324 - 1326
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    An approximation is presented for the loss in performance when the Viterbi algorithm receiver for CPM (continuous phase modulation) signals is subject to a phase offset. Pairs of symmetric error events are used to derive a closed-form result that approaches the asymptotic expression, based solely on minimum distance, as Es/ N0 approaches infinity. The improv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of trellis codes for a class of equalized ISI channels

    Publication Year: 1988, Page(s):1330 - 1336
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    The performance of trellis codes is examined for a class of intersymbol interference (ISI) channels that occur in high-frequency radio systems. The channels considered are characterized by in-band spectral nulls and by a rapid time variation. The baseline modulation technique is 4QAM (four-point quadrature amplitude modulation). When spectral nulls are absent, performance of fractionally spaced li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple access algorithms via group testing for heterogeneous population of users

    Publication Year: 1988, Page(s):1316 - 1323
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    The application of group testing techniques to the design of efficient algorithms for multiaccess systems with a heterogeneous population of users is studied. For a reservation system with binary (something/nothing) feedback, the authors present the procedure used to determine the optimal nested multiaccess algorithms. This procedure is not practical for moderate and large numbers of heterogeneous... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Queueing behavior of statistical multiplexers with correlated inputs

    Publication Year: 1988, Page(s):1339 - 1341
    Cited by:  Papers (80)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The author considers an asynchronous time-division-multiplexing system with a finite number of identical users generating data only during their so-called active periods, which alternate with so-called passive periods. Assuming geometric distributions for the active and passive periods of the users, the author derives a functional equation which describes the full steady-state buffer behavior of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Viterbi detection with simultaneous suboptimal maximum likelihood carrier phase estimation

    Publication Year: 1988, Page(s):1327 - 1330
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    The authors consider maximum-likelihood (ML) detection of convolutionally coded data over the AWGN channel with unknown carrier phase. A receiver is developed for simultaneous ML data decoding and suboptimal ML carrier-phase estimation. The receiver is readily implementable and, for a circular signal constellation, it is totally linear. Computer simulations using two different models of the time-v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive rate algorithm for FH/BFSK signaling

    Publication Year: 1988, Page(s):1269 - 1276
    Cited by:  Papers (3)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    The authors present a feedback rate control technique for FH/BFSK (frequency-hop/binary phase-shift keying) signaling over a jammed flat-flat fading channel. An algorithm is developed for tracking the channel fade level, dynamically adjusting the transmitted data rate, and mitigating the effects of partial-band noise jamming. Simulation studies indicate that improvements of about 2 dB can be obtai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The pi-persistent protocol for unidirectional broadcast bus networks

    Publication Year: 1988, Page(s):1277 - 1286
    Cited by:  Papers (84)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (892 KB)

    A protocol for multiaccess communication over unidirectional bus networks is proposed, and its performance capabilities are determined. Under this protocol, time is slotted with a slot equaling a packet's transmission time. A station with a packet to send persists in transmitting its packet in an empty slot with probability pi until it is successful. Three criteria for fairness... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating voice with the pi-persistent protocol for unidirectional broadcast bus networks

    Publication Year: 1988, Page(s):1287 - 1295
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    A previously proposed protocol is extended to include voice for multiaccess communication over unidirectional broadcast bus networks. The authors use a framed approach for integrating these two traffic types where a frame, which is repeated, consists of a voice subframe followed by a data subframe. They use speech detectors for modeling speech sources in order to prevent the loss of about 60% of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The intelligent network concept

    Publication Year: 1988, Page(s):1296 - 1301
    Cited by:  Papers (8)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    The intelligent network (IN) concept evolved from the networks which are planned or in existence in 1988 to provide network services such as the 800 service. The IN architecture will require an expansion of the capabilities which recognize the need for specialized processing and formulate a query to a database system. The expanded capabilities, along with an expected increase in the number of call... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extreme value engineering for local network traffic

    Publication Year: 1988, Page(s):1302 - 1308
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    Small switching offices and office information systems share some common properties in the description of load peaks. In both cases, because of the smaller user population, the structure of the underlying random process becomes important, and while the methods of extreme value engineering are applicable, the usual asymptotic distributions are not. The family of gamma distributions is proposed as a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On dual optical detection: homodyne and transmitted-reference heterodyne reception

    Publication Year: 1988, Page(s):1309 - 1315
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    The authors provide mathematical justification, using classical detection theory, for the observed superior performance of coherent dual optical detection over single-diode detection and establish a rationale for determining the intensity of the local oscillator. Viewing the dual detector as an optical channel with one input and two outputs, they show that in the limit of large local oscillator in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas