By Topic

Communications Letters, IEEE

Early Access Articles

Early Access articles are new content made available in advance of the final electronic or print versions and result from IEEE's Preprint or Rapid Post processes. Preprint articles are peer-reviewed but not fully edited. Rapid Post articles are peer-reviewed and edited but not paginated. Both these types of Early Access articles are fully citable from the moment they appear in IEEE Xplore.

Filter Results

Displaying Results 1 - 25 of 130
  • Channel-Aware Medium Access Control in Multichannel Cognitive Radio Networks

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (286 KB)  

    Distributed medium access control (MAC) is important for efficient exploitation of spectrum opportunities in cognitive radio networks. This paper proposes a channel-aware distributed MAC protocol for multichannel cognitive radio networks. The transmitting nodes use channel state information to exploit the available multiuser and multichannel diversity, by contending only under relatively favorable... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy Efficient Optimization for CC-HARQ over Block Rayleigh Fading Channels

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (265 KB)  

    In this letter, the energy efficiency (EE) of Chase combining based hybrid automatic repeat request (CC-HARQ) over block Rayleigh fading channels is analyzed and optimized from a cross-layer perspective. Specifically, we derive the EE of CC-HARQ in a tractable closed-form expression using a new log-domain linear threshold approximation method. Then the optimum payload length and average transmissi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Tie Based Cooperative Jamming for Physical Layer Security

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (85 KB)  

    In this letter, we investigate the cooperative jamming decision problem among multiple jammers for physical layer security. We introduce the social tie concept to model the cooperative jammer’s willingness to cooperate. We first formulate the problem as a social tie based cooperative jamming game. We establish the existence of a pure Nash equilibrium (NE) and then devise an algorithm to com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SER for Optimal Combining in the Presence of Multiple Correlated Co-channel Interferers

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (281 KB)  

    Symbol error rate (SER) performance has been analyzed for a receive diversity system in the presence of multiple interferers and noise over fading channels. Both unequal power interferers and correlated interferers have been considered. The derived approximate SER expressions are easy to evaluate and are applicable to any QAM constellation and arbitrary number of receive antennas and interferers. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Variational Bayesian Method for Joint Channel Estimation and Signal Detection in OFDM-Based AF Relay Networks

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (303 KB)  

    We propose improved joint channel estimation and data detection in orthogonal frequency division multiplexing (OFDM) amplify-and-forward (AF) relay network in the case of imperfect partial channel knowledge at the destination. To improve the detection accuracy, we adopt the variational Bayesian approximation (VBA) which is an iterative Bayesian method for channel estimation. We derive a modified i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delay Minimization for Progressive Construction of Satellite Constellation Network

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2008 KB)  

    During the construction of satellite constellation, communication relay service could be provided by a partially constructed constellation through buffering data and forwarding it at a later time. However, this will introduce extra end-to-end delay during the construction period. We propose a scheme to determine an optimal construction process, which is used to insert satellites into appropriate p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Tight Bound on the Distance between a Noncentral Chi Square and a Normal Distribution

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (238 KB)  

    We provide a nonasymptotic bound on the distance between a noncentral chi square distribution and a normal approximation. It improves upon both the classical Berry-Esséen bound and previous distances derived specifically for this situation. First, the bound is nonasymptotic and provides an upper limit for the real distance. Second, the bound has the correct rate of decrease and even the cor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy Efficiency of Distributed Antenna Systems using Fractional Frequency Reuse

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (585 KB)  

    This letter investigates the trade-off between the downlink ergodic spectral efficiency (ESE) and the energy efficiency (EE) of Distributed Antenna Systems (DAS) by using a new mathematical approach. Maximum Ratio Transmission (MRT) and Fractional Frequency Reuse (FFR) are applied and composite Nakagami-m fading and log-normal shadowing are considered. The performance evaluation of DAS in FFR mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simulation Study of Energy Efficient Ethernet with Two Modes of Low-Power Operation

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (263 KB)  

    Section 78.1.3 of the IEEE 802.3bj-2014 standard defines two modes of Low Power Idle (LPI) operation for the physical layers of Energy Efficient Ethernet (EEE) links that work at a speed of 40 Gb/s and higher; Fast Wake and Deep Sleep. In this paper, it is shown by simulation that combing two modes of low(er)-power operation in EEE links can result in significant savings with a reasonable performa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message-Passing-Based Dynamic Point Selection for Coordinated Multipoint Transmission

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (428 KB)  

    This letter develops a dynamic point selection (DPS) strategy for coordinated multipoint (CoMP) transmission using a message-passing approach. The dynamic determination of the best transmit point (TP) for individual users with the objective of the sum-rate maximization can be cast as a bipartite b- matching problem, the computational cost of which, however, becomes quickly intractable with the inc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Queueing Analysis of Deadline-Constrained Broadcasting in Wireless Networks

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (108 KB)  

    Time-constrained broadcasting is an essential operation needed for data dissemination and real-time multimedia broadcasting over wireless networks. This letter considers a deadline-constrained broadcasting based on the slotted-Aloha in wireless networks, in which various relevant features including message delivery deadline, node distribution and stochastic message arrival process are taken into c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asymptotic Orthogonality Analysis of Time-Domain Sparse Massive MIMO Channels

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (303 KB)  

    The theoretical analysis of downlink massive MIMO usually assumes the ideal Gaussian channel matrix with asymptotic orthogonality of channel vectors associated with different users, since it can provide the favorable propagation condition. Meanwhile, recent experiments have shown that massive MIMO channels between a certain user and massive base station antennas appear the spatial common sparsity ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Minimizing Energy Consumption of Duty-Cycled Wireless Sensors

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (558 KB)  

    This letter considers an energy consumption minimization problem of duty-cycled wireless sensors which are associated with a central controller, say an access point (AP), in a single-hoped synchronous wireless sensor network (WSN). The cost function we propose consists of the energy consumed during periodic wake-ups for wireless sensors to check a beacon frame from the AP and the one consumed for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote Driver Identification using Minimal Sensory Data

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1903 KB)  

    This letter proposes a driver identification algorithm developed for using minimal information transmitted in vehicleto- vehicle (V2V) environment, based on the assumption that each driver has his/her own unique driving behaviour characteristics hidden in conventional driving behaviour signals. Performance evaluation using real-world data shows that the proposed algorithm accurately identifies thr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coverage gain and Device-to-Device user Density: Stochastic Geometry Modeling and Analysis

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (416 KB)  

    Device-to-device (D2D) communication has huge potential for capacity and coverage enhancements for next generation cellular networks. The number of potential nodes for D2D communication is an important parameter that directly impacts the system capacity. In this paper, we derive analytic expression for average coverage probability of cellular user and corresponding number of potential D2D users. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoE-based reduction handover delays for multimedia application in IEEE 802.11 networks

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (176 KB)  

    Wireless Local Area Network (WLAN) is becoming increasingly important due to the explosive growth of mobile data traffic. The user in some hot spot areas is usually covered with multiple access points (APs). However, the subsequent challenge is the users’ devices need to handover between these APs as the user moves, and it introduces large latency during the handoff process. For multimedia ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint User Grouping and Resource Allocation for Multi-User Dual Layer Beamforming in LTE-A

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (103 KB)  

    In TD-LTE-A system, dual layer beamforming is introduced to improve throughput of specific users with high SINRs. In order to solve the problem of resource allocation for multi-user dual layer beamforming, a low complexity joint user grouping and resource allocation algorithm is proposed in the paper. We first calculate priorities of all active users according to channel quality and then the resou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust THP Transceiver Design for MIMO Interference Channel

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (172 KB)  

    This letter focuses on robust Tomlinson-Harashima Precoding(THP) transceiver optimization for Multiple-Input Multiple-Output (MIMO) interference channel, where a bounded channel error model is assumed. Two optimization problems are formulated as minimizing the maximum per-user mean square error (MSE) and sum MSE with per-transmitter power constraint, respectively. Since both optimization problems ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capacity analysis of two-hop multichannel relaying with subchannel pairing

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (120 KB)  

    This letter analyses capacity of a multichannel relay system with subchannel pairing (SP) over Rayleigh fading channels. We aim to derive unified capacity expressions for three SP cases, i.e., ordered subchannel pairing (OSP), reversely ordered subchannel pairing (ROSP) and non-subchannel pairing (NSP). In particular, we quantify higher-order statistics of the capacity in decode-and-forward (DF) p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opportunistic Cooperative Channel Access in Distributed Wireless Networks with Decode-and-Forward Relays

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (106 KB)  

    This letter studies distributed opportunistic channel access in a contention-based wireless network with decode-andforward relays. If a source wins a contention, the channel state information in the first-hop channel is estimated, and a decision is made for the winner source to either give up the transmission opportunity and let all sources start a new contention, or transmit to the relay. Once th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Scheme of High Performance Quasi-Cyclic LDPC Codes With Girth 6

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (238 KB)  

    The letter presents a new technique for constructing regular and irregular Quasi-Cyclic (QC) Low Density Parity Check (LDPC) codes with girth 6. Codes are designed by the combinatorial concept, in which subsets representing circulant matrices are originated from a particular subset. Conducted simulations confirm that implemented codes have low error floor, while they provide good performance in th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secret Precoding-Aided Spatial Modulation

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (110 KB)  

    In this letter, the precoding-aided spatial modulation (PSM) is generalized to a secret PSM (SPSM) scheme, which has the capability to resist the malicious eavesdropping from an eavesdropper that is unknown to the transmitter. We design a time-varying precoder for the SPSM, so that it can retain all the PSM’s advantages at the desired receiver while produces a timevarying interference to th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On a Cognitive Radio Networks Random Access Game with a Poisson Number of Secondary Users

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (387 KB)  

    In this letter a random access algorithm based on game theory for cognitive radio networks with random number of secondary users is investigated. The scenario examines a noncooperative game in which all the players are unaware of the total number of devices participating (population uncertainty). We proposed a scheme where failed attempts to transmit (collisions) are penalized and, consequently, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Enhanced Channel Estimation Method for Millimeter Wave Systems with Massive Antenna Arrays

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (310 KB)  

    In this paper, we focus on the efficient channel estimation problem for millimeter wave (MMW) systems with massive antenna arrays and RF constraints, aiming at achieving a fast and high resolution angle-of-arrival/angle-of-departure (AoA/AoD) estimation.We first propose a presentation of antenna array with virtual elements (AAVE) by appending additional virtual antenna elements into the original a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LP decoding excess over symmetric channels

    Publication Year: 2015 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (265 KB)  

    We consider the problem of Linear Programming (LP) decoding of binary linear codes. The LP excess lemma was introduced by Bazzi et al. (IEEE Trans. Inf. Th., 2014) as a technique to trade crossover probability for “LP excess” over the Binary Symmetric Channel. We generalize the LP excess lemma to discrete, binary-input, Memoryless, Symmetric and LLR-Bounded (MSB) channels. As an appl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Communications Letters  is aimed at satisfying the need for rapid dissemination of information, offering a vehicle for authors to expose their results to be used in future developments. This ensures early recognition of work. 

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
George K. Karagiannidis
Aristotle University of Thessaloniki
Greece