Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.

# IEEE Communications Letters

## Filter Results

Displaying Results 1 - 25 of 55

Publication Year: 2016, Page(s):C1 - 627
| PDF (221 KB)
• ### IEEE Communications Society

Publication Year: 2016, Page(s): C2
| PDF (90 KB)
• ### Feedback Fusion for LFNCR in Wireless Broadcasting With Massive Receivers

Publication Year: 2016, Page(s):628 - 631
| | PDF (305 KB) | HTML

This letter proposes a novel feedback mechanism i.e., feedback fusion, for limited feedback based network coding retransmission (LFNCR) scheme in wireless broadcasting with massive receivers. With feedback fusion, each receiver transmits feedback message upon one of the limited number of feedback time slots. When multiple receivers happen to transmit feedback messages in a same time slot, packets ... View full abstract»

• ### An Improved Decoding Algorithm for Generalized RDP Codes

Publication Year: 2016, Page(s):632 - 635
| | PDF (289 KB) | HTML

The generalized RDP codes are identified as the most practical and efficient triple-erasure correcting MDS (maximum-distance separable) codes, since they can encode optimally and support arbitrary code length. However, none of the existing decoding algorithms for these codes is adequate in that their decoding complexity leaves a relatively large room for improvement. In this letter, we present an ... View full abstract»

• ### Nonbinary Protograph-Based LDPC Codes Based on Additive Group of Finite Field

Publication Year: 2016, Page(s):636 - 639
| | PDF (289 KB) | HTML

This letter proposes a flexible construction method of nonbinary protograph-based low-density parity-check codes based on finite field additive group operation from node perspective. First, nonzero element labels of nodes are optimized by minimum distance of corresponding binary image of rows of the parity-check matrix. Then, quasi-girth calculating method is proposed to jointly optimize node perm... View full abstract»

• ### A Generator-Matrix-Based Approach for Adaptively Generating Cut-Inducing Redundant Parity Checks

Publication Year: 2016, Page(s):640 - 643
| | PDF (257 KB) | HTML

A generator matrix (GM)-based approach for adaptively deriving cut-inducing redundant parity checks (RPCs) during the adaptive linear programming decoding algorithm is presented. More precisely speaking, if the decoder gets stuck in a non-integral pseudocodeword, then the resulting RPCs are likely to provide violated forbidden-set inequalities that can separate this non-integral optimal solution f... View full abstract»

• ### On the MDS Condition of Blaum–Bruck–Vardy Codes With Large Number Parity Columns

Publication Year: 2016, Page(s):644 - 647
| | PDF (209 KB) | HTML

Binary maximum distance separable (MDS) array codes are widely used in storage systems. EVENODD code and row-diagonal parity (RDP) code are two well-known binary MDS array codes with two parity columns. The Blaum-Bruck-Vardy (BBV) code is an extension of the double-erasure-correcting EVENODD code. It is known that the BBV code is always MDS for three parity columns, and sufficient conditions for u... View full abstract»

• ### Fast Converging ADMM-Penalized Algorithm for LDPC Decoding

Publication Year: 2016, Page(s):648 - 651
Cited by:  Papers (3)
| | PDF (279 KB) | HTML

The alternate direction method of multipliers (ADMM) approach has been recently considered for LDPC decoding. It has been approved to enhance the error rate performance compared with conventional message passing (MP) techniques in both the waterfall and error floor regions at the cost of a higher computation complexity. In this letter, a formulation of the ADMM decoding algorithm with modified com... View full abstract»

• ### On the Minimum Redundancy of SEC-DAEC-TAEC Binary Linear Block Codes

Publication Year: 2016, Page(s):652 - 655
| | PDF (82 KB) | HTML

The redundancy n - k of an (n, k) binary linear block code capable of single error correction, double adjacent error correction and triple adjacent error correction (SEC-DAECTAEC) is lower bounded by log2(3n - 2). Recently, researchers have tried to find minimum redundancy codes which achieve equality in this lower bound using computer search and failed. In this letter, we prove that su... View full abstract»

• ### Statistical Profile of Hermite–Gaussian Beam in the Presence of Residual Spatial Jitter in FSO Communications

Publication Year: 2016, Page(s):656 - 659
Cited by:  Papers (1)
| | PDF (378 KB) | HTML

In this letter, the statistics of the beam profile of a free-space optical (FSO) system is studied when the optical beam possesses a Hermite-Gaussian profile and the beam is subject to random pointing jitter. In particular, it is assumed that the received signal is impaired by the residual pointing error cause by the spatial tracking loop responsible for tracking the atmospheric beam wander and pl... View full abstract»

• ### Performance of Passive UHF RFID in Cascaded Correlated Generalized Rician Fading

Publication Year: 2016, Page(s):660 - 663
| | PDF (305 KB) | HTML

Ultra high frequency radio frequency identification (UHF RFID) systems can use passive tags to reflect the signal from the reader's transmitting antenna back to the reader's receiving antenna for information delivery. This gives a cascaded channel that is a product of two fading components. In this work, the probability of detection, defined as the probability that the received power is above the ... View full abstract»

• ### Penalty Function Based Detector for Generalized Space Shift Keying Massive MIMO Systems

Publication Year: 2016, Page(s):664 - 667
| | PDF (233 KB) | HTML

Generalized space shift keying (GSSK) has recently attracted much interest in the study of emerging massive MIMO systems. The maximum likelihood (ML) detection of GSSK can be posed as a 0-1 quadratic program with an equality constraint. The penalty function method is a common way to transform a constrained programming into an unconstrained one. However, determining an ideal penalty factor is not a... View full abstract»

• ### On the Performance of a PLC System Assuming Differential Binary Phase Shift Keying

Publication Year: 2016, Page(s):668 - 671
Cited by:  Papers (2)
| | PDF (254 KB) | HTML

Power line communication (PLC) utilizes power lines for the purpose of electronic data transmission. Differential binary phase shift keying (DBPSK) is a popular modulation scheme proposed in the PLC standards like G3, PRIME, and IEEE P1901.2. This letter provides the performance evaluation of a PLC system assuming DBPSK modulation under the combined effect of Nakagami-m background noise and impuls... View full abstract»

• ### Performance of Wireless Powered Amplify and Forward Relaying Over Nakagami-$m$ Fading Channels With Nonlinear Energy Harvester

Publication Year: 2016, Page(s):672 - 675
Cited by:  Papers (6)
| | PDF (342 KB) | HTML

Performance of wireless powered relay with amplify-and-forward protocol is studied for Nakagami-m fading channels. Different from the existing literature, we consider the nonlinearity of the energy harvester. An analytical expression is derived for the complementary cumulative distribution function (CCDF) of the end-to-end signal-to-noise ratio. Using the CCDF, outage capacity is calculated. View full abstract»

• ### A Low Complexity Scheme for Passive UWB-RFID: Proof of Concept

Publication Year: 2016, Page(s):676 - 679
Cited by:  Papers (1)
| | PDF (293 KB) | HTML

Passive UWB-RFID technology represents an emerging solution capable of guaranteeing extremely low energy consumption and high-accuracy localization at the same time. One of the most critical tasks is the acquisition of the tag code at reader side, which can be complex, time- and resource-consuming when multiple UWB tags are deployed. This letter proposes a simple and effective approach, based on a... View full abstract»

• ### Partial Update Sequential Probabilistic Integer Least Square Inter Carrier Interference Mitigation Algorithm in Mobile OFDM System

Publication Year: 2016, Page(s):680 - 683
| | PDF (328 KB) | HTML

The performance of mobile orthogonal frequency division multiplexing (OFDM) system is affected by the intercarrier interference (ICI). A recently proposed sequential probabilistic integer least squares (SPILS) algorithm remarkably improves the performance of ICI mitigation. The corresponding low complexity Quick SPILS (QSPILS) algorithm is also proposed to reduce the complexity of SPILS algorithm ... View full abstract»

• ### Distributed Online Scheduling and Routing of Multicast-Oriented Tasks for Profit-Driven Cloud Computing

Publication Year: 2016, Page(s):684 - 687
Cited by:  Papers (1)
| | PDF (398 KB) | HTML

It is known that to support a few common applications well, e.g., datacenter (DC) backup, multicast-oriented tasks need to be handled in inter-DC networks. In this letter, we propose an approach to schedule and route multicast-oriented tasks in inter-DC networks with arbitrary topologies. Specifically, we leverage Lyapunov optimization to develop a distributed online approach that can maximize the... View full abstract»

• ### Low-Complexity LLR Calculation for Gray-Coded PAM Modulation

Publication Year: 2016, Page(s):688 - 691
| | PDF (313 KB) | HTML

Higher-order modulation schemes are employed to improve the spectral efficiency in modern communication systems. However, the conventional Max-Log-MAP symbol-to-bit demapper suffers from a large computational burden. To cope with this problem, this letter proposes a novel log-likelihood ratio computation algorithm for Gray-coded higher-order pulse-amplitude modulation (PAM). The proposed method re... View full abstract»

• ### An Effective Frame Breaking Policy for Dynamic Framed Slotted Aloha in RFID

Publication Year: 2016, Page(s):692 - 695
Cited by:  Papers (2)
| | PDF (1259 KB) | HTML

The tag collision problem is considered as one of the critical issues in RFID system. To further improve the identification efficiency of an UHF RFID system, a frame breaking policy is proposed with dynamic framed slotted aloha algorithm. Specifically, the reader makes effective use of idle, successful, and collision statistics during the early observation phase to recursively determine the optima... View full abstract»

• ### Dispersion-Adaptive First–Last Fit Spectrum Allocation Scheme for Elastic Optical Networks

Publication Year: 2016, Page(s):696 - 699
Cited by:  Papers (5)
| | PDF (869 KB) | HTML

The quality-of-transmission (QoT) degradation due to the dispersion effect in longer lightpaths is higher than that of shorter lightpaths in a dispersion uncompensated network. To overcome this shortcoming, this letter proposes a dispersion-adaptive first-last fit spectrum allocation scheme for elastic optical networks to decrease the call blocking in the network. The proposed scheme assigns longe... View full abstract»

• ### A Novel DoS and DDoS Attacks Detection Algorithm Using ARIMA Time Series Model and Chaotic System in Computer Networks

Publication Year: 2016, Page(s):700 - 703
Cited by:  Papers (1)
| | PDF (435 KB) | HTML

This letter deals with the problem of detecting DoS and DDoS attacks. First of all, two features including number of packets and number of source IP addresses are extracted from network traffics as detection metrics in every minute. Hence, a time series based on the number of packets is built and normalized using a Box-Cox transformation. An ARIMA model is also employed to predict the number of pa... View full abstract»

• ### Bits Learning: User-Adjustable Privacy Versus Accuracy in Internet Traffic Classification

Publication Year: 2016, Page(s):704 - 707
| | PDF (1385 KB) | HTML

During the past decade, a great number of machine learning (ML)-based methods have been studied for accurate traffic classification. Flow features such as the discretizations of the first five packet sizes (PS) and flow ports (FP) are considered the best discriminators for per-flow classification. For the first time, this letter proposes to treat the first n-bits of a flow (BitFlow) as features an... View full abstract»

• ### LAAEM: A Method to Enhance LDoS Attack

Publication Year: 2016, Page(s):708 - 711
Cited by:  Papers (2)
| | PDF (600 KB) | HTML

Based on LDoS, we propose bots multiplexing in multitargets attack scenario, and then present the LDoS attack ability enhancing method. In simulation, the method shows good performance and adaptability, it can enhance attack ability effectively under variety of correlated parameters. With this method, the attacker may use a small botnet to cause very great harm, which only large botnet can cause b... View full abstract»

• ### Adaptive Mode Selection in D2D Communications Considering the Bursty Traffic Model

Publication Year: 2016, Page(s):712 - 715
Cited by:  Papers (4)
| | PDF (562 KB) | HTML

This letter proposes a new mode selection scheme to improve the overall packet rates for device-to-device (D2D) communications systems in the bursty traffic model. We consider three types of D2D modes, i.e., dedicated mode, cellular mode, and reuse mode. In the full-buffer traffic model, if all the uplink (UL) channels are occupied by cellular users, the dedicated and cellular modes are not availa... View full abstract»

• ### OFDMA-Based DF Secure Cooperative Communication With Untrusted Users

Publication Year: 2016, Page(s):716 - 719
| | PDF (237 KB) | HTML

In this letter, we consider resource allocation for OFDMA-based secure cooperative communication by employing a trusted decode and forward (DF) relay among the untrusted users. We formulate two optimization problems, namely, (1) sum rate maximization subject to individual power constraints on source and relay, and (2) sum power minimization subject to a fairness constraint in terms of per-user min... View full abstract»

## Aims & Scope

IEEE Communications Letters publishes letters on the frontiers of research within the field of interest of the IEEE Communications Society in a timely manner.

Full Aims & Scope

Editor-in-Chief
Octavia Dobre