# IEEE Communications Letters

## Filter Results

Displaying Results 1 - 25 of 52

Publication Year: 2015, Page(s):C1 - 1665
| |PDF (108 KB)
• ### IEEE Communications Letters publication information

Publication Year: 2015, Page(s): C2
| |PDF (138 KB)
• ### A New Scheme of High Performance Quasi-Cyclic LDPC Codes With Girth 6

Publication Year: 2015, Page(s):1666 - 1669
Cited by:  Papers (3)
| |PDF (666 KB) | HTML

The letter presents a new technique for constructing regular and irregular quasi-cyclic (QC) low density parity check (LDPC) codes with girth 6. Codes are designed by the combinatorial concept, in which subsets representing circulant matrices are originated from a particular subset. Conducted simulations confirm that implemented codes have low error floor, while they provide good performance in th... View full abstract»

• ### Lowest Density MDS Array Codes of Distance 3

Publication Year: 2015, Page(s):1670 - 1673
Cited by:  Papers (2)
| |PDF (208 KB) | HTML

We present a new family of maximum-distance separable (MDS) array codes of distance 3, called S(ymmetry)-Code, which has the properties of: 1) optimality in encoding, decoding and update; 2) code length of either p or p - 1 with p being an odd prime; 3) requiring less I/O cost than most existing lowest density MDS array codes during single-erasure recovery; and 4) approaching the lower bound in I/... View full abstract»

• ### Anomalous Diffusion in Molecular Communication

Publication Year: 2015, Page(s):1674 - 1677
| |PDF (471 KB) | HTML

We consider anomalous diffusion to model a molecular communication channel. To account for general and practical molecular propagation, we use the fractional diffusion equation and derive the distribution of first passage time in terms of Fox's H-function. We then analyze the bit error rate for timing and amplitude binary modulation schemes in anomalous diffusion. View full abstract»

• ### Approximations for Performance of Energy Detector and $p$-Norm Detector

Publication Year: 2015, Page(s):1678 - 1681
Cited by:  Papers (1)
| |PDF (476 KB) | HTML

Although the approximations based on the central limit theorem (CLT) for the detection probability (Pd) of the energy detector and of its more generalized cousin, the p-norm detector, are accurate for large sample sizes, their accuracy is poor otherwise. A recent work has addressed this problem by developing a cube-of-Gaussian approximation (CGA). However, CGA may not be the only option... View full abstract»

• ### Joint Optimization of Area Spectral Efficiency and Delay Over PPP Interfered Ad-Hoc Networks

Publication Year: 2015, Page(s):1682 - 1685
Cited by:  Papers (2)
| |PDF (260 KB) | HTML

To evaluate the performance of the co-channel transmission based communication, we propose a new metric for area spectral efficiency (ASE) of interference limited ad-hoc network by assuming that the nodes are randomly distributed according to a Poisson point processes (PPP). We introduce a utility function, U = ASE/delay and derive the optimal ALOHA transmission probability p and the SIR threshold... View full abstract»

• ### Non-Orthogonal Multiple Access for Multiple-Antenna Relaying Networks

Publication Year: 2015, Page(s):1686 - 1689
Cited by:  Papers (32)
| |PDF (301 KB) | HTML

In this letter, we design non-orthogonal multiple access (NOMA) for multiple-antenna relaying networks. The receive antennas at the mobile users are assumed to adopt maximal ratio combining (MRC), whereas the transmit antenna that maximizes the instantaneous signal-to-noise ratio (SNR) at the relay is selected. The system outage performance is investigated and closed-form expressions for the exact... View full abstract»

• ### Efficient Two-Write WOM-Codes for Non-Volatile Memories

Publication Year: 2015, Page(s):1690 - 1693
Cited by:  Papers (1)
| |PDF (262 KB) | HTML

A write once memory (WOM) is defined as a class of storage medium, with each storage element known as a cell, that contains information. In the context of a WOM, there is an added constraint whereby the cells can only move irreversibly from a lower state to a higher state. One of the major challenges faced by non-volatile memories (NVM) is the limited number of erasure operations allowed before a ... View full abstract»

• ### Superframe Construction for Wireless Networks With Stochastic Demands

Publication Year: 2015, Page(s):1694 - 1697
Cited by:  Papers (1)
| |PDF (234 KB) | HTML

The link schedule of a wireless network must ensure links receive sufficient transmission opportunities or time slots to meet their offered load. To date, existing link schedulers assume fixed link load. In practice, link load is likely to vary, meaning the computed schedule or superframe will have unnecessary idle times. In this letter, we propose to use stochastic programming (SP) to generate a ... View full abstract»

• ### On Minimizing Energy Consumption of Duty-Cycled Wireless Sensors

Publication Year: 2015, Page(s):1698 - 1701
Cited by:  Papers (2)
| |PDF (486 KB) | HTML

This letter considers an energy consumption minimization problem of duty-cycled wireless sensors which are associated with a central controller, say an access point (AP), in a single-hoped synchronous wireless sensor network (WSN). The cost function we propose consists of the energy consumed during periodic wake-ups for wireless sensors to check a beacon frame from the AP and the one consumed for ... View full abstract»

• ### A Simulation Study of Energy-Efficient Ethernet With Two Modes of Low-Power Operation

Publication Year: 2015, Page(s):1702 - 1705
Cited by:  Papers (4)
| |PDF (192 KB) | HTML

Section 78.1.3 of the IEEE 802.3bj-2014 standard defines two modes of low-power idle (LPI) operation for the physical layers of energy-efficient ethernet (EEE) links that work at a speed of 40 Gb/s and higher: Fast Wake and Deep Sleep. In this letter, it is shown by simulation that combining two modes of low(er)-power operation in EEE links can result in significant savings with a reasonable perfo... View full abstract»

• ### Remote Driver Identification Using Minimal Sensory Data

Publication Year: 2015, Page(s):1706 - 1709
Cited by:  Papers (1)
| |PDF (3083 KB) | HTML

This letter proposes a driver identification algorithm developed for using minimal information transmitted in vehicle-to-vehicle (V2V) environment based on the assumption that each driver has his/her own unique driving behavior characteristics hidden in conventional driving behaviour signals. Performance evaluation using real-world data shows that the proposed algorithm accurately identifies three... View full abstract»

• ### Channel-Aware Medium Access Control in Multichannel Cognitive Radio Networks

Publication Year: 2015, Page(s):1710 - 1713
Cited by:  Papers (5)
| |PDF (669 KB) | HTML

Distributed medium access control (MAC) is important for efficient exploitation of spectrum opportunities in cognitive radio networks. This letter proposes a channel-aware distributed MAC protocol for multichannel cognitive radio networks. The transmitting nodes use channel state information to exploit the available multiuser and multichannel diversity, by contending only under relatively favorabl... View full abstract»

• ### An Enhanced Random Access Scheme With Spatial Group Based Reusable Preamble Allocation in Cellular M2M Networks

Publication Year: 2015, Page(s):1714 - 1717
Cited by:  Papers (13)
| |PDF (1040 KB) | HTML

In the near future, cellular machine-to-machine (M2M) communications are expected to play an important role to realize the Internet of Things (IoT). Due to the exponentially growing number of machine nodes, however, one of challenging issues is to accommodate their random access (RA) requests without severely degrading the performance of human-to-human (H2H) communications. In this letter, we prop... View full abstract»

• ### Delay Minimization for Progressive Construction of Satellite Constellation Network

Publication Year: 2015, Page(s):1718 - 1721
| |PDF (1690 KB) | HTML

During the construction of satellite constellation, communication relay service could be provided by a partially constructed constellation through buffering data and forwarding it at a later time. However, this will introduce extra end-to-end delay during the construction period. We propose a scheme to determine an optimal construction process, which is used to insert satellites into appropriate p... View full abstract»

• ### On the Performance of Multiuser Hybrid Satellite-Terrestrial Relay Networks With Opportunistic Scheduling

Publication Year: 2015, Page(s):1722 - 1725
Cited by:  Papers (13)
| |PDF (296 KB) | HTML

In this letter, we investigate the performance of a multiuser amplify-and-forward (AF) hybrid satellite-terrestrial relay network (HSTRN) with opportunistic scheduling. Specifically, we derive the analytical approximated expression as well as the tight upper and lower bound for the ergodic capacity of the system. Moreover, we present the analytical and asymptotic formulas of the outage probability... View full abstract»

• ### High-Security Chaotic Cognitive Radio System With Subcarrier Shifting

Publication Year: 2015, Page(s):1726 - 1729
Cited by:  Papers (3)
| |PDF (464 KB) | HTML

Chaotic sequences have been applied to cognitive radio (CR) systems to enhance the system security. However, since the chaotic maps are publicly known, attackers may derive the key parameters of chaotic sequences, then finally retrieve the information. In this paper, we present a new subcarrier-shifting based chaotic cognitive radio (SSCCR) scheme for improving the security mechanism of chaotic co... View full abstract»

• ### Compressed Sensing Assisted Joint Channel Estimation and Detection for DS-CDMA Uplink

Publication Year: 2015, Page(s):1730 - 1733
Cited by:  Papers (3)
| |PDF (427 KB) | HTML

Compressed sensing assisted Joint Channel Estimation and Detection (JCED) for asynchronous Direct-Sequence Code Division Multiple Access (DS-CDMA) system is considered. We present a new dictionary matrix to characterize the sparsity of multiuser signals transmitted over dispersive channels. Using the new dictionary, the amount of non-zero entries in the sparse representation is reduced to 1/Q of t... View full abstract»

• ### Spread-Spectrum Based Ranging of Passive UHF EPC RFID Tags

Publication Year: 2015, Page(s):1734 - 1737
Cited by:  Papers (9)
| |PDF (858 KB) | HTML

This letter introduces a ranging method which can be applied to off-the-shelf backscatter RFID tags, like standardized EPC Gen 2 tags. For this purpose a low power direct sequence spread spectrum (DSSS) sequence is superimposed onto the interrogator's signal during tag to reader communication. The chip rate and sequence length is chosen to fit an entire DSSS sequence into each backscattered bit. D... View full abstract»

• ### Enhanced Throughput of Cognitive Radio Networks by Imperfect Spectrum Prediction

Publication Year: 2015, Page(s):1738 - 1741
Cited by:  Papers (5)
| |PDF (690 KB) | HTML

Spectrum sensing is used to detect spectrum holes and find active primary users while randomly selecting channel for sensing lead to secondary user's low throughput in high traffic cognitive radio networks. Spectrum prediction forecasts future channel states on the basis of historical information. A new frame structure is proposed in this letter for the imperfect spectrum prediction, resulting to ... View full abstract»

• ### Coverage Gain and Device-to-Device User Density: Stochastic Geometry Modeling and Analysis

Publication Year: 2015, Page(s):1742 - 1745
Cited by:  Papers (8)
| |PDF (471 KB) | HTML

Device-to-device (D2D) communication has huge potential for capacity and coverage enhancements for next generation cellular networks. The number of potential nodes for D2D communication is an important parameter that directly impacts the system capacity. In this letter, we derive an analytic expression for average coverage probability of cellular user and corresponding number of potential D2D user... View full abstract»

• ### Joint Source-Relay Design in a MIMO Two-Hop Power-Splitting-Based Relaying Network

Publication Year: 2015, Page(s):1746 - 1749
Cited by:  Papers (6)
| |PDF (394 KB) | HTML

A MIMO two-hop relay network with power-splitting-based relaying is considered. Using a minimum mean-square-error criterion, the joint source-relay optimization problem with transmit power constraint and relay energy harvesting constraint is formulated. In order to address this non-convex problem, an iterative algorithm is proposed which converges to a local optimum. The Lagrangian dual function a... View full abstract»

• ### On the $\alpha$-Stable Distribution of Base Stations in Cellular Networks

Publication Year: 2015, Page(s):1750 - 1753
Cited by:  Papers (12)
| |PDF (1168 KB) | HTML

Cellular networks are now nearly universally deployed and are under ever-growing pressure to increase the volume of data deliverable to consumers. Understanding how base stations (BSs) are spatially deployed could prominently facilitate the performance analyses of cellular networks, as well as the design of efficient networking protocols. In this letter, inspired by the clustering reality of BSs a... View full abstract»

• ### Spatial Modulation in MIMO Limited-Feedback Spectrum-Sharing Systems With Mutual Interference and Channel Estimation Errors

Publication Year: 2015, Page(s):1754 - 1757
Cited by:  Papers (10)
| |PDF (403 KB) | HTML

This letter investigates spatial modulation (SM) in multiple-input multiple-output (MIMO) spectrum-sharing systems in an effort to improve the overall spectral efficiency. Specifically, we study the secondary system performance adopting the SM technique under mutual primary-secondary interferences and channel estimation errors (CEEs). With limited feedback from the primary receiver, a closed-form ... View full abstract»

## Aims & Scope

IEEE Communications Letters publishes letters on the frontiers of research within the field of interest of the IEEE Communications Society in a timely manner.

Full Aims & Scope

Editor-in-Chief
Octavia Dobre