Notice
There is currently an issue with the citation download feature. Learn more

IEE Proceedings - Communications

Issue 3 • Jun 1994

Filter Results

Displaying Results 1 - 15 of 15
  • Trellis coded Q2PSK signals. 2. Land mobile satellite fading channels

    Publication Year: 1994, Page(s):159 - 167
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (624 KB)

    Utilisation of Q2PSK signals is analysed on the land mobile satellite channel. Trellis codes design criteria for coherent, differentially coherent and noncoherent detection procedures are derived. The implementation model of the transmitter-channel-receiver structure, where block interleaving/deinterleaving is utilised, is presented. New Q2PSK MTCM systems are designed follow... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some digital receivers for the GSM pan-European cellular communication system

    Publication Year: 1994, Page(s):168 - 176
    Cited by:  Papers (7)  |  Patents (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (460 KB)

    The Global System for Mobile Communications (GSM) provides the European Community countries with a common digital mobile radio structure for overland communications. The authors describe some new digital receivers that utilise coherent detection for the GSM system. Of the receivers described, that with the classical Viterbi processor, while notably robust, has high implementation complexity for a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective erasure node algorithm for slot reuse in DQDB

    Publication Year: 1994, Page(s):196 - 202
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (480 KB)

    The distributed queue dual bus (DQDB) protocol, which has been specified by the IEEE 802.6 as the metropolitan area networks (MANs) standard, has an undesirable feature in that already received (i.e. read) busy slots continue to propagate downstream unnecessarily. The use of special nodes, known as erasure nodes, allows conversion of read slots to empty, so that downstream nodes may reuse these sl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of a multicast packet switch with capacity m

    Publication Year: 1994, Page(s):177 - 182
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (380 KB)

    A multicast packet switch provides an efficient transport method which can connect any input port to any subset of output ports. Each input packet of the switch which is copied and destined to a subset of output ports usually experiences contention with other copy packets. So, the offered load to output ports increases as the mean number of copy packets generated by one input packet increases in a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Soft decision decoding techniques for a class of runlength-limited error control codes

    Publication Year: 1994, Page(s):118 - 125
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (456 KB)

    Two soft decision decoding algorithms for a new class of runlength-limited error control codes with maximum runlength constraints 2, 6 and 14 are presented. Software simulation results for illustrative codes of block length 16 and 64 provide a comparison with the general soft decision decoders proposed by Chase (1972) View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of an ATM statistical multiplexer with batch arrivals

    Publication Year: 1994, Page(s):190 - 195
    Cited by:  Papers (2)  |  Patents (6)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (352 KB)

    The authors propose a method for evaluating the impact of bursty traffic sources on the performance of an ATM multiplexer which can handle packetised voice, data and video traffic. The multiplexer is modelled as a single-server queue with batch phase type Markov renewal input. The authors describe an analytical approach to the solutions of such queueing systems with finite capacity using the matri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid threshold soft decision decoding algorithm

    Publication Year: 1994, Page(s):126 - 128
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (196 KB)

    A hybrid threshold soft decision decoding scheme which combines a Chase 2 algorithm with a bit-by-bit decision decoding algorithm is presented. For higher signal-to-noise ratios (SNRs), its behaviour is not inferior to that of the corresponding bit-by-bit decoding algorithm. This scheme can overcome the exponential increase of the test patterns used in the Chase 2 algorithm, as d (the minimum Hamm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trellis coded Q2PSK signals. I. AWGN and nonlinear satellite channels

    Publication Year: 1994, Page(s):151 - 158
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (644 KB)

    Suitable bandwidth efficient coding techniques, to be combined with Q2PSK signals, are derived and analysed on AWGN and nonlinear channels. Five new Q2PSK TCs are presented. First, an expanded Q2PSK signal constellation has been used to design new 4D RI Q2PSK TCs. Partition of the 4D expanded Q 2PSK signal space into 2D subspaces has allowed t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fibre-based local area network with priority access

    Publication Year: 1994, Page(s):203 - 208
    Cited by:  Papers (1)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (468 KB)

    A new-local area network based on a multiaccess unidirectional fibre bus is described. Communication between network stations is by means of objects and can be point-to-point, multicast or broadcast: Each communication object is unique, with an inherent priority embedded in its frame structure. It is impossible for objects of the same priority to attempt media access at the same time, and collisio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms suitable for low complexity implementation of at class of runlength-limited error control codes

    Publication Year: 1994, Page(s):111 - 117
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (352 KB)

    Encoding and decoding procedures which exploit the cyclic-like properties of a class of runlength-limited error control-codes are presented. These algorithms enable simple encoding and decoding circuits consisting of only a few basic circuit elements to be designed. A comparison with conventional syndrome decoding shows that they provide comparable error performance although requiring considerably... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some new rotationally invariant TCM schemes for multidimensional M-PSK

    Publication Year: 1994, Page(s):143 - 150
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (504 KB)

    Trellis codes for multidimensional constellations offer a number of advantages which cannot be obtained with bidimensional constellations. Some new trellis codes for multidimensional M-PSK constellations are presented. They are all completely rotationally invariant. The performance of these codes is discussed and compared with that exhibited by Ungerboeck codes for bidimensional phase modulation w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Private-key encryption based on concatenation of codes

    Publication Year: 1994, Page(s):105 - 110
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (388 KB)

    Public-key algebraic encryption (PUAE) has certain advantages that make it attractive in some applications. Variants of PUAE for private-key algebraic encryption (PRAE); have been proposed subsequently. PRAE is proven to be insecure under chosen plaintext attack. In the paper, some invariants of PRAE are studied, and a private-key cryptosystem based on concatenation of codes is proposed and analys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coded modulation based on rings of integers modulo-q. 2. Convolutional codes

    Publication Year: 1994, Page(s):137 - 142
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (428 KB)

    The authors presents a coded modulation method based on multilevel convolutional codes defined over finite rings of integers. A previously developed theory is applied to multilevel convolutional codes. Some tables of convolutional codes defined over rings of integers modulo-q are obtained. Curves of soft- and hard-decision decoding performance are also shown View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of the knockout switch with input buffers

    Publication Year: 1994, Page(s):183 - 189
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (480 KB)

    Since the asynchronous transfer mode (ATM) has been strongly promoted as the transport structure for broadband integrated services digital networks, a variety of ATM switching architectures have been proposed. The knockout switch, which is one of the well known ATM switches, has a single-stage architecture and adopts an output buffering method. It has excellent traffic performance (cell loss proba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coded modulation based on rings of integers modulo-q. 1. Block codes

    Publication Year: 1994, Page(s):129 - 136
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (524 KB)

    The authors aim to present an alternative multilevel (nonbinary) coding method, based on a ring of integers modulo-q (q is a nonprime integer number) which is suitable for coded modulation schemes. Some new concepts and definitions are introduced in order to build up a theoretical framework which allows a search for good multilevel codes. Such classes of block codes are also presented together wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.