By Topic

Journal of Communications and Networks

Issue 3 • June 2012

Filter Results

Displaying Results 1 - 21 of 21
  • Spectrum sensing under uncertain channel modeling

    Publication Year: 2012, Page(s):225 - 229
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1964 KB) | HTML iconHTML

    We examine spectrum sensing in a situation of uncertain channel model. In particular, we assume that, besides additive noise, the observed signal contains an interference term whose probability distribution is unknown, and only its range and maximum power are known. We discuss the evaluation of the detector performance and its design in this situation. Although this paper specifically deals with t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New construction method for quaternary aperiodic, periodic, and Z-complementary sequence sets

    Publication Year: 2012, Page(s):230 - 236
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (591 KB) | HTML iconHTML

    Based on the known binary sequence sets and Gray mapping, a new method for constructing quaternary sequence sets is presented and the resulting sequence sets' properties are investigated. As three direct applications of the proposed method, when we choose the binary aperiodic, periodic, and Z-complementary sequence sets as the known binary sequence sets, the resultant quaternary sequence sets are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust approach for channel estimation in power line communication

    Publication Year: 2012, Page(s):237 - 242
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (786 KB) | HTML iconHTML

    One of the major problems for accurate channel estimation in power line communication systems is impulsive noise. Traditional channel estimation algorithms are based on the assumption of Gaussian noise, or the need to locate the positions of impulsive noise. The algorithms may lose optimality when impulsive noise exists in the channel, or if the location estimation of impulsive noise is inaccurate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Communication-theoretic analysis of capture-based networks

    Publication Year: 2012, Page(s):243 - 251
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1159 KB) | HTML iconHTML

    Under the power-based capture model, a transmission is successfully received at the destination, even in the presence of other transmissions and background noise, if the received signal-to-interference-plus-noise ratio exceeds a capture threshold. We evaluate the spectral efficiency of simple multi-user channels by combining the basic capture model with a communication-theoretic model. The result ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive radio based resource allocation in femto-cells

    Publication Year: 2012, Page(s):252 - 256
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (547 KB) | HTML iconHTML

    We consider resource allocation in femto-cell networks to maximize the throughput while minimizing interference to macro-users nearby. This can be achieved by allocating spectrum resource in a cognitive radio way. The proposed resource allocation is performed in two steps; spectrum sensing and resource scheduling. The femto base station detects idle frequency assignments (FAs) free from the occupa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint subcarrier matching and power allocation in OFDM two-way relay systems

    Publication Year: 2012, Page(s):257 - 266
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1376 KB) | HTML iconHTML

    A decode-and-forward two-way relay system benefits from orthogonal frequency division multiplexing (OFDM) and relay transmission. In this paper, we consider a decode-and-forward two-way relay system over OFDM with two strategies: A joint subcarrier matching algorithm and a power allocation algorithm operating with a total power constraint for all subcarriers. The two strategies are studied based o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-hop cooperative transmission using fountain codes over Rayleigh fading channels

    Publication Year: 2012, Page(s):267 - 272
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (803 KB) | HTML iconHTML

    In this paper, we study multi-hop cooperative transmission protocols using fountain codes. The proposed protocols can reduce the end-to-end delay and number of stages compared to those in conventional multi-hop transmission. Various Monte-Carlo simulations are presented to evaluate and compare performance of the protocols over Rayeigh fading channels. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative interstream interference cancellation for MIMO HSPA+ system

    Publication Year: 2012, Page(s):273 - 279
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (859 KB) | HTML iconHTML

    In this paper, we propose an iterative interstream interference cancellation technique for system with frequency selective multiple-input multiple-output (MIMO) channel. Our method is inspired by the fact that the cancellation of the interstream interference can be regarded as a reduction in the magnitude of the interfering channel. We show that, as iteration goes on, the channel experienced by th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed and centralized iterative detection of self-encoded spread spectrum in multi-channel communication

    Publication Year: 2012, Page(s):280 - 285
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB) | HTML iconHTML

    We propose self-encoded spread spectrum with two different iterative detection methods in multi-channel communication. The centralized iterative detection outperforms the iterative detection distributed over multiple channels. The results show that self-encoded spread spectrum with the centralized iterative detection is an excellent candidate for cognitive radio network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PECAN: Peer cache adaptation for peer-to-peer video-on-demand streaming

    Publication Year: 2012, Page(s):286 - 295
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1005 KB) | HTML iconHTML

    To meet the increased demand of video-on-demand (VoD) services, peer-to-peer (P2P) mesh-based multiple video approaches have been recently proposed, where each peer is able to find a video segment interested without resort to the video server. However, they have not considered the constraint of the server's upload bandwidth and the fairness between upload and download amounts at each peer. In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Event-based middleware for healthcare applications

    Publication Year: 2012, Page(s):296 - 309
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1337 KB) | HTML iconHTML

    In existing middleware for body sensor networks, energy limitations, hardware heterogeneity, increases in node temperature, and the absence of software reusability are major problems. In this paper, we propose an event-based grid middleware component that solves these problems using distributed resources in in vivo sensor nodes. In our multi-hop communication, we use a lightweight rendezvous routi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrusion detection scheme using traffic prediction for wireless industrial networks

    Publication Year: 2012, Page(s):310 - 318
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1500 KB) | HTML iconHTML

    Detecting intrusion attacks accurately and rapidly in wireless networks is one of the most challenging security problems. Intrusion attacks of various types can be detected by the change in traffic flow that they induce. Wireless industrial networks based on the wireless networks for industrial automation-process automation (WIA-PA) standard use a superframe to schedule network communications. We ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delivering IPTV service over a virtual network: A study on virtual network topology

    Publication Year: 2012, Page(s):319 - 335
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1664 KB) | HTML iconHTML

    In this study, we design an applicable model enabling internet protocol television (IPTV) service providers to use a virtual network (VN) for IPTV service delivery. The model addresses the guaranteed service delivery, cost effectiveness, flexible control, and scalable network infrastructure limitations of backbone or IP overlay-based content networks. There are two major challenges involved in thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shedding light on the use of AS relationships for path inference

    Publication Year: 2012, Page(s):336 - 345
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1009 KB) | HTML iconHTML

    Autonomous system (AS) business relationships and their inference have been widely studied by network researchers in the past. An important application of inferred AS relationships can be the prediction of AS paths between a source and destination AS within a model. However, besides knowing the topology and inferred AS relationships, AS path prediction within a model needs to be understood in orde... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Advertisement]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (793 KB)
    Freely Available from IEEE
  • Call for papers

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (517 KB)
    Freely Available from IEEE
  • Call for papers

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (284 KB)
    Freely Available from IEEE
  • Table of Contents [Front cover]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Table of Contents [Back cover]

    Publication Year: 2012, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2012, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (257 KB)
    Freely Available from IEEE
  • [Back inside cover]

    Publication Year: 2012, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (252 KB)
    Freely Available from IEEE

Aims & Scope

The Journal of Communications and Networks is published six times per year, and is committed to publishing high-quality papers that advance the state-of-the-art and practical applications of communications and information networks.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Anthony Ephremides
University of Maryland