# IEEE Communications Letters

## Filter Results

Displaying Results 1 - 25 of 51

Publication Year: 2015, Page(s):C1 - 698
| PDF (109 KB)
• ### IEEE Communications Letters publication information

Publication Year: 2015, Page(s): C2
| PDF (136 KB)
• ### A Random Local Matroid Search Algorithm to Construct Good Rate $1/p$ Systematic Binary Quasi-Cyclic Codes

Publication Year: 2015, Page(s):699 - 702
| | PDF (216 KB) | HTML

In this letter, a random local matroid search algorithm is proposed to construct good rate 1/p systematic QC codes based on the relationship between the generator matrix and the minimum distance when the length of the information vector is k ≥ 15 . More than twenty new QC codes are obtained and their corresponding generator matrices are revealed, which extends previous results. Nine of thes... View full abstract»

• ### Fountain Code Design for the Y-Network

Publication Year: 2015, Page(s):703 - 706
Cited by:  Papers (3)
| | PDF (186 KB) | HTML

This paper describes a novel approach for designing distributed fountain codes based on polynomial factorization. The proposed approach is used for the well known Y-network configuration. The suggested factorization approach is applicable to LT codes and Raptor codes or any other fountain code describable with a degree distribution. Simulation results verify the success of this technique. View full abstract»

• ### An Improved Ordered-Block MMSE Detector for Generalized Spatial Modulation

Publication Year: 2015, Page(s):707 - 710
Cited by:  Papers (9)
| | PDF (626 KB) | HTML

In this letter, an improved ordered-block minimum-mean-squared-error (OB-MMSE) detector for generalized spatial modulation systems is presented. We first propose to use the concentrated distance metric derived from the conditional maximum likelihood estimator as the ordering metric for the OB-MMSE and then design a computationally-efficient algorithm for computing this metric. The improved orderin... View full abstract»

• ### Hamming Distortion Based Secrecy Systems: To Foil the Eavesdropper With Finite Shared Key

Publication Year: 2015, Page(s):711 - 714
| | PDF (220 KB) | HTML

Rate-distortion based secrecy is introduced in communication systems recently, where security is measured by the distortion that an eavesdropper can be forced to attain when reconstructing secret source symbols from an encrypted message. To maximize the distortion, previous works show that at least an unbounded number of secret keys growing with the block length is required for general distortion ... View full abstract»

• ### Rate-Optimal Coding Design in Joint Transfer of Energy and Information

Publication Year: 2015, Page(s):715 - 718
Cited by:  Papers (1)
| | PDF (431 KB) | HTML

In this letter, performance optimization for information transfer in a binary and noiseless one-way information transmission system is investigated from the perspective of information source design (e.g., coding scheme) while considering the amount of energy that can be transferred. We propose a variable-length coding scheme and address two problems to optimize the information rate: (1) to determi... View full abstract»

• ### Exploiting Entire GSSK Antenna Combinations in MIMO Systems

Publication Year: 2015, Page(s):719 - 722
Cited by:  Papers (1)
| | PDF (403 KB) | HTML

We propose to improve the spatial efficiency and lower the symbol error rate (SER) of generalized space shift keying (GSSK) modulation through exploiting the entire antenna combinations. Conventional GSSK modulation bridges the binary sequence to the usually non-power-of-two antenna combinations through fixed one-on-one mapping which very often renders a great proportion of antenna combinations un... View full abstract»

• ### BICMC and TD Comparative Performance Study of 16-APSK Signal Variants for DVB-S2 Systems

Publication Year: 2015, Page(s):723 - 726
| | PDF (757 KB) | HTML

A comparative performance study, in terms of Bit Interleaved Coded Modulation Capacity (BICMC) and Total Degradation (TD), between Amplitude Phase Shift Keying (APSK) signal variants for the 2nd generation Digital Video Broadcasting via Satellite (DVB-S2) system is presented. Motivated by the observation that the presence of more signal points in the outer ring of 16-APSK signals appears to improv... View full abstract»

• ### Reliability and Delay Analysis of Slotted Anycast Multi-Hop Wireless Networks Targeting Dense Traffic IoT Applications

Publication Year: 2015, Page(s):727 - 730
| | PDF (474 KB) | HTML

Studies on IEEE 802.15.4 MAC in the current literature for anycast multi-hop networks do not capture a node's behaviour accurately. Due to the inaccurate modeling of state-wise behaviour of a node, the optimization of network parameters has not been efficient so far. In this work, we include the state-wise behaviour of a relay node into a 3D Markov model to more accurately investigate the protocol... View full abstract»

• ### Performance of BICM-Based QAM-SIM OWC Over Gamma-Gamma Turbulence Channels

Publication Year: 2015, Page(s):731 - 734
| | PDF (249 KB) | HTML

We derive a series expression for the pair-wise error probability (PEP) of bit interleaved coded modulation (BICM)-based subcarrier intensity modulation (SIM) optical wireless communication (OWC) system employing M2 -ary quadrature amplitude modulation ( M2-QAM) over the Gamma-Gamma turbulence channels. Using this expression, we develop an upper bound (UB) to predict the bit-... View full abstract»

• ### Accurate One-Way Delay Estimation With Reduced Client Trustworthiness

Publication Year: 2015, Page(s):735 - 738
Cited by:  Papers (1)
| | PDF (387 KB) | HTML

The requirement for accurate one-way delay (OWD) estimation led to the recent introduction of an algorithm enabling a server to estimate OWDs between itself and a client by cooperating with two other servers, requiring neither client-clock synchronization nor client trustworthiness in reporting one-way delays. We evaluate the algorithm by deriving the probability distribution of its absolute error... View full abstract»

• ### An Enhanced Handover Scheme to Provide the Robust and Efficient Inter-Beam Mobility

Publication Year: 2015, Page(s):739 - 742
Cited by:  Papers (1)
| | PDF (507 KB) | HTML

This letter proposes an enhanced inter-beam handover (IBH) scheme for millimeter-wave mobile communication systems. The proposed scheme adopts an inter-beam coordinated scheduling to improve the performance of the IBH which can be seriously deteriorated. In addition, the proposed scheme exploits the small-sized low layer messages to reduce the signaling overhead for the IBH by considering the main... View full abstract»

• ### Dynamic Resource Discovery Protocol for Software Defined Networks

Publication Year: 2015, Page(s):743 - 746
| | PDF (359 KB) | HTML

In Software Defined Networking (SDN), the network management is logically centralized but physically distributed among the controllers to improve the scalability compared with a completely centralized model. As an alternative to managing the network state in SDN in a distributed way, this work proposes a distributed protocol called SDN Resource Discovery Protocol (SDN-RDP). This protocol divides a... View full abstract»

• ### Enhanced Timing Advanced Estimation With Symmetric Zadoff-Chu Sequences for Satellite Systems

Publication Year: 2015, Page(s):747 - 750
| | PDF (487 KB) | HTML

Timing advanced estimation with Zadoff-Chu sequences is sensitive to the frequency offset, especially for satellite systems with large Doppler shift and oscillator uncertainties. In this letter, Timing Advanced Estimation with Symmetric Zadoff-Chu sequences (TAE-SZC) is proposed to deal with the integer and fractional frequency offset, respectively. By adopting TAE-SZC, the effect of integer frequ... View full abstract»

• ### Behavioral Modeling of Concurrent Dual-Band Transmitters Based on Radially-Pruned Volterra Model

Publication Year: 2015, Page(s):751 - 754
Cited by:  Papers (6)
| | PDF (388 KB) | HTML

This paper presents a radially-pruned multi-dimensional Volterra model for the modeling and linearization of concurrent dual-band transmitters. The proposed model accounts for the impact of cross-band intermodulation distortions of the dual-band power amplifier (PA) and also the effect of quadrature modulator (QM) imperfections. The performance of the proposed model is validated using a broadband ... View full abstract»

• ### Symbol Timing Estimation for Physical-Layer Network Coding

Publication Year: 2015, Page(s):755 - 758
Cited by:  Papers (3)
| | PDF (728 KB) | HTML

Recently, physical-layer network coding (PNC) has attracted much attention due to its ability to double the throughput in relay-aided communications. However, most research in PNC assumes that the symbol timings of the end nodes are ideally aligned. In fact, they have to be recovered accurately at the relay. In this letter, we present a novel symbol timing error estimator for PNC. It is shown that... View full abstract»

• ### Smoothness Constraint Based Stochastic Optimization for Wireless Scalable Video Streaming

Publication Year: 2015, Page(s):759 - 762
| | PDF (243 KB) | HTML

The randomness of wireless channels, which may cause frequent interruption or fluctuation of video playback, is challenging for wireless video streaming. In this letter, a smoothness constraint based dynamic layer switching strategy is proposed for wireless scalable video streaming over a variable bitrate channel. It aims for optimizing long-term quality of users' experience via maximizing video q... View full abstract»

• ### A New Proof for the DoF Region of the MIMO Networks With No CSIT

Publication Year: 2015, Page(s):763 - 766
| | PDF (117 KB) | HTML

In this paper, a new proof for the degrees of freedom (DoF) region of the K-user multiple-input multiple-output (MIMO) broadcast channel (BC) with no channel state information at the transmitter (CSIT) and perfect channel state information at the receivers (CSIR) is provided. Based on this proof, the capacity region of a certain class of MIMO BC with channel distribution information at the transmi... View full abstract»

• ### Information Centric Sensor Network Management Via Community Structure

Publication Year: 2015, Page(s):767 - 770
Cited by:  Papers (1)
| | PDF (408 KB) | HTML

Self-organizing dense sensor networks are expected to resolve the challenges of spectral efficiency, energy efficiency, and device management. This paper explores the use of information dependence among sensors to form a community structure of sensor data, and uses this structure to develop an information- centric processing methodology to achieve self-organizing dense sensor networks. Moreover, a... View full abstract»

• ### Space-Constrained Massive MIMO: Hitting the Wall of Favorable Propagation

Publication Year: 2015, Page(s):771 - 774
Cited by:  Papers (19)
| | PDF (379 KB) | HTML

The recent development of the massive multiple-input multiple-output (MIMO) paradigm, has been extensively based on the pursuit of favorable propagation: in the asymptotic limit, the channel vectors become nearly orthogonal and inter-user interference tends to zero [1]. In this context, previous studies have considered fixed inter-antenna distance, which implies an increasing array aperture as the... View full abstract»

• ### Pecuniary Efficiency of Distributed Antenna Systems

Publication Year: 2015, Page(s):775 - 778
Cited by:  Papers (3)
| | PDF (570 KB) | HTML

In this letter, the gross expenditure, revenue, and profit of a distributed antenna system (DAS) are modeled and investigated. Using stochastic geometry framework, we evaluate the communications pecuniary efficiency (PE) that is defined as a ratio of average achievable bits per expenditure. In addition, we further investigate the ratio of gross revenue over expenditure, which is the PE in economic... View full abstract»

• ### On the Performance Advantage of Relaying Under the Finite Blocklength Regime

Publication Year: 2015, Page(s):779 - 782
Cited by:  Papers (5)
| | PDF (529 KB) | HTML

We consider a two-phase relaying system with finite blocklengths. We study the performance difference of relaying under the finite blocklength regime as well as under the Shannon capacity regime. Most importantly, we are interested in the conditions that lead to a higher performance of relaying under the finite blocklength regime. We find that these situations are characterized by error probabilit... View full abstract»

• ### Outage Probability of Full-Duplex AF Relaying With Processing Delay and Residual Self-Interference

Publication Year: 2015, Page(s):783 - 786
Cited by:  Papers (8)
| | PDF (537 KB) | HTML

This letter investigates the outage performance in a full-duplex relay (FDR) channel that adopts an amplify-and-forward (AF) protocol. We provide a new closed-form expression for the outage probability that captures the joint effect of residual self-interference (RSI) and a direct link. In addition, when the processing delay of the relay is larger than 1, which is often the case in practice, the p... View full abstract»

• ### Soft-Input Soft-Output Non-Coherent Detection for Differential Space-Time Block Code Systems

Publication Year: 2015, Page(s):787 - 790
Cited by:  Papers (2)
| | PDF (588 KB) | HTML

A soft-input soft-output non-coherent detection algorithm is proposed for multi-antenna systems, where differential space-time block code is employed. The proposed algorithm aims to calculate a posteriori probabilities of the information bits by means of forward and backward message passing of the BCJR approach. The proposed algorithm can exploit the soft information effectively with the aid of th... View full abstract»

## Aims & Scope

IEEE Communications Letters publishes letters on the frontiers of research within the field of interest of the IEEE Communications Society in a timely manner.

Full Aims & Scope

Editor-in-Chief
Octavia Dobre