# IEEE Communications Letters

## Filter Results

Displaying Results 1 - 25 of 48

Publication Year: 2014, Page(s):C1 - C4
| PDF (105 KB)
• ### IEEE Communications Letters publication information

Publication Year: 2014, Page(s): C2
| PDF (132 KB)
• ### Reliability-Based Iterative Decoding Algorithm for LDPC Codes With Low Variable-Node Degree

Publication Year: 2014, Page(s):2065 - 2068
Cited by:  Papers (1)
| | PDF (493 KB) | HTML

In this letter, a new reliability-based iterative majority-logic decoding (RBI-MLGD) algorithm that computes the extrinsic information of previous iterations of the variable node is proposed. This decoding algorithm is called historical-extrinsic reliability-based iterative decoder (HE-RBID) and improves the bit-error-rate performance of the previous RBI-MLGD. HE-RBID is particularly interesting f... View full abstract»

• ### Correction of Two (or Often More) Vector Symbol Errors With the Outer Structure of a Hamming Single Error Correcting Code

Publication Year: 2014, Page(s):2069 - 2072
Cited by:  Papers (1)
| | PDF (297 KB) | HTML

The case of a concatenated code is considered where the inner code decoder reports multi-bit symbol decisions and can save the soft information used for the decision. Normally, an outer decoder using a Hamming single error correcting code cannot correct more than one error. But by using what is called soft information single error correction (SISEC) where a hypothesis that a particular symbol in s... View full abstract»

• ### On the Construction of Low Error Floor LDPC Codes on Rectangular Lattices

Publication Year: 2014, Page(s):2073 - 2076
| | PDF (533 KB) | HTML

In previous literature, arithmetically constrained slope sequences have been adopted for the construction of girth eight (3, k) LDPC codes on rectangular lattices. This method, however, creates a certain number of small trapping sets, which degrade overall performances. In this letter, an improved construction of a class of (3, k) LDPC codes on rectangular lattices is presented. Relevant constrain... View full abstract»

• ### An Efficient Hybrid Decoder for Block Turbo Codes

Publication Year: 2014, Page(s):2077 - 2080
Cited by:  Papers (1)
| | PDF (297 KB) | HTML

In this letter, an efficient hybrid decoder for block turbo codes (BTCs) is proposed to improve the hybrid BTC decoder developed by Al-Dweik et al. A simple formula for estimating the extrinsic information is first derived. Then the proposed decoder is constructed by modifying the decoder of Al-Dweik et al. using the formula. Simulation results show that the proposed decoder can substantially redu... View full abstract»

• ### A Novel Puncturing Scheme for Polar Codes

Publication Year: 2014, Page(s):2081 - 2084
Cited by:  Papers (16)
| | PDF (895 KB) | HTML

A novel kind of punctured polar codes is proposed in this paper. The codes are constructed by certain constraints on both puncturing patterns and frozen sets such that the values of the punctured bits are known to the decoder. As a result, the initialized log-likelihood ratios of the punctured bits can be set to infinity (or minus infinity), which guarantees a better decoding performance. Furtherm... View full abstract»

• ### Decoding LDPC Codes With Locally Maximum-Likelihood Binary Messages

Publication Year: 2014, Page(s):2085 - 2088
| | PDF (534 KB) | HTML

A new low-complexity message passing algorithm is described for decoding low-density parity-check (LDPC) codes by exchanging binary messages. The algorithm computes the local maximum-likelihood binary message (LMLBM) at each symbol node, given the combination of local channel information and partial syndrome components from adjacent parity check nodes. When channel information is quantized, the lo... View full abstract»

• ### EXIT Chart Analysis of Puncturing for Non-Binary LDPC Codes

Publication Year: 2014, Page(s):2089 - 2092
| | PDF (450 KB) | HTML

This letter presents an EXtrinsic Information Transfer (EXIT) chart tool for the puncturing of non-binary (NB) low-density parity-check (LDPC) codes. With the help of this tool, we study the dependence of the performance of various bitwise and symbolwise puncturing patterns on the degree of a variable node (VN). The grouping algorithm (GA) is a useful technique for the short-length codes to find t... View full abstract»

• ### A Hybrid Decoding Scheme for Short Non-Binary LDPC Codes

Publication Year: 2014, Page(s):2093 - 2096
Cited by:  Papers (8)
| | PDF (549 KB) | HTML

In this paper, an iterative soft-decision hybrid decoding algorithm for non-binary low-density parity-check (LDPC) codes with short codeword lengths is proposed. The rationale of the approach is to combine the classical belief propagation (BP) iterative LDPC decoding algorithm with the most reliable basis (MRB) decoding algorithm. This allows to achieve significant performance improvements, with a... View full abstract»

• ### Cramer-Rao Bound for SNR Estimation of Hyper-Cubic Signals Over Gaussian Channel

Publication Year: 2014, Page(s):2097 - 2100
Cited by:  Papers (1)
| | PDF (257 KB) | HTML

In this contribution we derive analytical expression for the Cramer-Rao lower bound (CRLB) on the variance of unbiased non-data-aided (NDA) signal to noise ratio (SNR) estimates of the hyper-cubic modulated signals. Underlying channel is assumed to be additive white Gaussian noise (AWGN) channel. Asymptote of the CRLB for higher SNR case is also derived in closed form. It has been shown that in lo... View full abstract»

• ### PLC Performance Analysis Over Rayleigh Fading Channel Under Nakagami- $m$ Additive Noise

Publication Year: 2014, Page(s):2101 - 2104
Cited by:  Papers (19)
| | PDF (330 KB) | HTML

Power line communication (PLC) utilizes power lines for transmission of power as well as data transmission. It is an emerging field of communication for the home area network of smart grid. The performance of a PLC system is significantly affected by the additive and multiplicative power line noises; the additive noises are of two types, namely background noise and impulsive noise. Whereas, the mu... View full abstract»

• ### Demonstration of 60 Gb/s W-Band Optical mm-wave Signal Full-Duplex Transmission Over Fiber-Wireless-Fiber Network

Publication Year: 2014, Page(s):2105 - 2108
Cited by:  Papers (10)
| | PDF (574 KB) | HTML

In this letter, we propose and experimentally demonstrate a W-band (75-110 GHz) full-duplex transmission fiber-wireless-fiber system with the rate up to 60 Gb/s for the first time. Both the uplink and downlink in our proposed system consist of two spans of 80 km single-mode fiber-28 (SMF-28) and a 1-m wireless link. We experimentally demonstrate that our proposed system can simultaneously transmit... View full abstract»

• ### Data Enriched SACK: A Novel Acknowledgement Generation Scheme for Secure SCTP

Publication Year: 2014, Page(s):2109 - 2112
Cited by:  Papers (1)
| | PDF (636 KB) | HTML

The Stream Control Transmission Protocol (SCTP) is inherently vulnerable to optimistic Selective Acknowledgement (SACK) spoofing. We highlight a threat scenario in which this vulnerability is exploited for the generation of sustained and powerful Denial-of-Service attack flood over the Internet. We identify and analyze a fundamental design limitation in SCTP that leads to the above mentioned vulne... View full abstract»

• ### Dynamic Wavelength and Bandwidth Allocation in Flexible TWDM Optical Access Network

Publication Year: 2014, Page(s):2113 - 2116
Cited by:  Papers (8)
| | PDF (680 KB) | HTML

As one of the most promising next generation optical access network (OAN), flexible time and wavelength division multiplexing (TWDM) OAN can increase capacity smoothly and reallocate wavelength and timeslot resource dynamically to cope with variations in traffic pattern. However, the scheduling of both wavelength and timeslot resource becomes a critical problem. In this letter, a dynamic wavelengt... View full abstract»

• ### Optimization of Multicast Traffic in Elastic Optical Networks With Distance-Adaptive Transmission

Publication Year: 2014, Page(s):2117 - 2120
Cited by:  Papers (24)
| | PDF (171 KB) | HTML

In this letter, we propose three new approaches to optimizing multicast traffic in elastic optical networks that implement distance-adaptive transmission. Two of the approaches are based on integer linear programming modeling, whereas the last one is an effective heuristic. We also compare our approaches with reference methods proposed in the literature. The comparison is based on numerical experi... View full abstract»

• ### Self-Similar Traffic End-to-End Delay Minimization Multipath Routing Algorithm

Publication Year: 2014, Page(s):2121 - 2124
Cited by:  Papers (4)
| | PDF (320 KB) | HTML

In this letter, a multipath routing algorithm to reduce end-to-end delay and loss rate is proposed. The proposed multipath routing algorithm, self-similar delay minimization (SDM), estimates network delay of realistic network traffic by analyzing self-similar parameters based on fractional Brownian motion (fBm) traffic models, computes the optimal number of paths for average delay minimization, an... View full abstract»

• ### Geometric Routing With Word-Metric Spaces

Publication Year: 2014, Page(s):2125 - 2128
Cited by:  Papers (3)
| | PDF (257 KB) | HTML

As a potential solution to the compact routing problem, geometric routing has been proven to be both simple and heuristically effective. These routing schemes assign some (virtual) coordinates in a metric space to each network vertex through the process called embedding. By forwarding packets to the closest neighbor to the destination, they ensure a completely local process with the routing table ... View full abstract»

• ### Comment on “A Novel Homomorphic MAC Scheme for Authentication in Network Coding”

Publication Year: 2014, Page(s):2129 - 2132
Cited by:  Papers (2)
| | PDF (134 KB) | HTML

Recently, Cheng and Jiang [IEEE Commun. Lett., vol. 15, no. 11, pp. 1228-1230, 2011] proposed a novel homomorphic message authentication code (MAC) scheme, called TraceMac, for authentication in network coding, which is based on the trace function over a finite field, and claimed to achieve a reliable security of 1/ql, where q is the cardinality of the message symbol field Fq, and l &#x... View full abstract»

• ### Performance Analysis of MPSK Phase Detectors for Carrier Synchronization PLLs at Low SNRs

Publication Year: 2014, Page(s):2133 - 2136
Cited by:  Papers (2)
| | PDF (152 KB) | HTML

In this letter, we analyze the performance of a category of phase detectors (PDs) for carrier synchronization phase-locked loops (PLLs) in M-ary phase shift keying (MPSK) receivers working at low signal-to-noise ratios (SNRs). These PDs have the property that their outputs are functions of the inputs' phase only, and thus, their performance is independent of the automatic gain control (AGC) circui... View full abstract»

• ### Delay–Interleaved Cooperative Relay Networks

Publication Year: 2014, Page(s):2137 - 2140
| | PDF (354 KB) | HTML

In this letter, we propose a novel system design for implementing distributed space-time codes (DSTCs) in order to improve the performance of the codes. The proposed method called delay and interleaved cooperative relay networks manages to force transmitted signals to experience different channel fading coefficients as much as possible, which increases the coding gain or even, in some cases, the d... View full abstract»

Publication Year: 2014, Page(s):2141 - 2144
Cited by:  Papers (2)
| | PDF (562 KB) | HTML

Ever since the adoption of the single carrier frequency division multiple access (SC-FDMA) scheme for the uplink in the Long Term Evolution (LTE) standard, there has been much interest in improved receiver algorithms for the same. Successive interference cancelation (SIC) based turbo receivers (Turbo SIC) have been proposed to tackle the multi-stream interference (MSI) for transmission modes such ... View full abstract»

• ### On the Uplink SIR Distributions in Heterogeneous Cellular Networks

Publication Year: 2014, Page(s):2145 - 2148
Cited by:  Papers (13)
| | PDF (560 KB) | HTML

In this paper, the uplink (UL) signal-to-interference ratio (SIR) distributions in a two-tier heterogeneous cellular network (HCN) are analyzed by considering the power control effect and approximating the UL interferer locations as a non-uniform Poisson point process (PPP). Approximated closed-form SIR distributions are provided according to the tier, association rule, power control strategy for ... View full abstract»

• ### Optimization of a Relay-Assisted Link With Buffer State Information at the Source

Publication Year: 2014, Page(s):2149 - 2152
Cited by:  Papers (9)
| | PDF (296 KB) | HTML

This letter proposes a random-access scheme employed by a source in a three-node network composed of a source, a relay, and a destination. The source knows the exact number of packets at the finite buffer of the relay. Based on this knowledge, the source probabilistically accesses the channel. We consider a fixed-rate transmission and study the cases with and without channel outage state informati... View full abstract»

• ### Optimal MIMO Multicast Transceiver Design for Simultaneous Information and Power Transfer

Publication Year: 2014, Page(s):2153 - 2156
Cited by:  Papers (5)
| | PDF (354 KB) | HTML

We consider transceiver design for a MIMO multicast channel for simultaneous wireless information and power transfer. We assume that common information is intended for a subset of users, called information decoders (IDs), and the other users, called energy harvesters (EHs), harvest energy from the received signals. Assuming linear receivers at the IDs, we jointly design the precoder at the source ... View full abstract»

## Aims & Scope

IEEE Communications Letters publishes letters on the frontiers of research within the field of interest of the IEEE Communications Society in a timely manner.

Full Aims & Scope

Editor-in-Chief
Octavia Dobre