Journal of Communications and Networks

Issue 1 • March 2008

Filter Results

Displaying Results 1 - 22 of 22
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (315 KB)
    Freely Available from IEEE
  • [Front inside cover]

    Publication Year: 2008, Page(s): c2
    Request permission for commercial reuse | |PDF file iconPDF (296 KB)
    Freely Available from IEEE
  • Multiple Brillouin stokes generation utilizing a linear cavity Erbium-doped fiber laser

    Publication Year: 2008, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (760 KB) | HTML iconHTML

    This paper reports the design of a multiwavelength fiber laser source that utilizes a linear cavity of hybrid Brillouin/Erbium fiber laser (BEFL). The output power, threshold power and free running cavity modes were investigated against the pump powers. The structure exhibited low threshold operation of 4 mW at 2.3 mW injected Brillouin pump power. The optimization of Brillouin pump wavelength, po... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Upper bounds for the performance of turbo-like codes and low density parity check codes

    Publication Year: 2008, Page(s):5 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (682 KB) | HTML iconHTML

    Researchers have investigated many upper bound techniques applicable to error probabilities on the maximum likelihood (ML) decoding performance of turbo-like codes and low density parity check (LDPC) codes in recent years for a long codeword block size. This is because it is trivial for a short codeword block size. Previous research efforts, such as the simple bound technique [20] recently propose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis and improvement of an efficient certificateless signature scheme

    Publication Year: 2008, Page(s):10 - 17
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (693 KB) | HTML iconHTML

    In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced. The advantage of certificate-less public key cryptography successfully eliminates the necessity of certificates in the traditional public key cryptography and simultaneously sol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Many-to-one encryption and authentication scheme and its application

    Publication Year: 2008, Page(s):18 - 27
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (641 KB) | HTML iconHTML

    This paper is to study a subclass of group-oriented cryptographic scheme: Many-to-one encryption and authentication scheme. The many-to-one encryption and authentication scheme is to solve a practical problem, i.e., the scenario that the number of the receivers is very small compared with the number of the senders and a receiver may serve millions of senders. Compared with the traditional methods,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-efficient scheduling with delay constraints in time-varying uplink channels

    Publication Year: 2008, Page(s):28 - 37
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1120 KB) | HTML iconHTML

    In this paper, we investigate the problem of minimizing the average transmission power of users while guaranteeing the average delay constraints in time-varying uplink channels. We design a scheduler that selects a user for transmission and determines the transmission rate of the selected user based on the channel and backlog information of users. Since it requires prohibitively high computation c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy logic based neural network models for load balancing in wireless networks

    Publication Year: 2008, Page(s):38 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1401 KB) | HTML iconHTML

    In this paper, adaptive channel borrowing approach fuzzy neural networks for load balancing (ACB-FNN) is presented to maximized the number of served calls and the depending on asymmetries traffic load problem. In a wireless network, the call's arrival rate, the call duration and the communication overhead between the base station and the mobile switch center are vague and uncertain. A new load bal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative multiple symbol differential detection for turbo coded differential unitary space-time modulation

    Publication Year: 2008, Page(s):44 - 54
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1031 KB) | HTML iconHTML

    In this paper, an iterative multiple symbol differential detection for turbo coded differential unitary space-time modulation using a posteriori probability (APP) demodulator is investigated. Two approaches of different complexity based on linear prediction are presented to utilize the temporal correlation of fading for the APP demodulator. The first approach intends to take account of all possibl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A searching algorithm for minimum bandpass sampling frequency in simultaneous down-conversion of multiple RF signals

    Publication Year: 2008, Page(s):55 - 62
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1491 KB) | HTML iconHTML

    Bandpass sampling (BPS) techniques for the direct down-conversion of RF bandpass signals have become an essential technique for software defined radio (SDR), due to their advantage of minimizing the radio frequency (RF) front-end hardware dependency. This paper proposes an algorithm for finding the minimum BPS frequency for simultaneously down-converting multiple RF signals through full permutatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Suppression of IEEE 802.11a interference in TH-UWB systems using singular value decomposition in wireless multipath channels

    Publication Year: 2008, Page(s):63 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (977 KB) | HTML iconHTML

    Narrow-band interference (NBI) from the coexisting narrow-band services affects the performance of ultra wideband (UWB) systems considerably due to the high power of these narrow-band signals with respect to the UWB signals. Specifically, IEEE 802.11a systems which operate around 5 GHz and overlap the band of UWB signals may interfere with UWB systems significantly. In this paper, we suggest a nov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sub-band spreading technique for adaptive modulation in OFDM systems

    Publication Year: 2008, Page(s):71 - 78
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1259 KB) | HTML iconHTML

    We propose a sub-band spreading technique for adaptive modulation (AM) in orthogonal frequency division multiplexing (OFDM) systems in order to reduce signaling overheads and to average frequency selective fading channels causing different signal-to-noise ratio (SNR) values for subcarriers in each sub-band. The conventional sub-band based AM schemes can also reduce signaling overheads and complexi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient peer assignment for low-latency transmission of scalable coded images

    Publication Year: 2008, Page(s):79 - 88
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1125 KB) | HTML iconHTML

    In this paper, we propose efficient peer assignment algorithms for low-latency transmission of scalable coded images in peer-to-peer networks, in which peers may dynamically join and leave the networks. The objective of our algorithm is to minimize the transmission time of a requested image that is scalable coded. When an image is scalable coded in different bit rates, the bit stream encoded in a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mutual information applied to anomaly detection

    Publication Year: 2008, Page(s):89 - 97
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (802 KB) | HTML iconHTML

    Anomaly detection systems play a significant role in protection mechanism against attacks launched on a network. The greatest challenge in designing systems detecting anomalous exploits is defining what to measure. Effective yet simple, Shannon entropy metrics have been successfully used to detect specific types of malicious traffic in a number of commercially available IDS's. We believe that Reny... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP performance improvement considering ACK loss in ad hoc networks

    Publication Year: 2008, Page(s):98 - 107
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1342 KB) | HTML iconHTML

    In mobile ad hoc networks, packet loss is unavoidable due to MAC contention, link failure or the inherent characteristics of wireless link. Since TCP relies on the timely reception of TCP ACK packets to progress the transmission of the TCP DATA packets, ACK loss obviously affects the performance due to two main problems: (a) Frequent occurrence of spurious retransmissions caused by timeout events ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for papers

    Publication Year: 2008, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (413 KB)
    Freely Available from IEEE
  • Call for papers

    Publication Year: 2008, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (326 KB)
    Freely Available from IEEE
  • Call for papers

    Publication Year: 2008, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (329 KB)
    Freely Available from IEEE
  • Copyright transfer form

    Publication Year: 2008, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2008, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (287 KB)
    Freely Available from IEEE
  • Journal of Communications and Networks (JCN)

    Publication Year: 2008, Page(s): c3
    Request permission for commercial reuse | |PDF file iconPDF (279 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2008, Page(s): c4
    Request permission for commercial reuse | |PDF file iconPDF (315 KB)
    Freely Available from IEEE

Aims & Scope

The Journal of Communications and Networks is published six times per year, and is committed to publishing high-quality papers that advance the state-of-the-art and practical applications of communications and information networks.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Anthony Ephremides
University of Maryland