Scheduled System Maintenance
On Saturday, October 21, single article sales and account management will be unavailable until 6 PM ET.

# IEEE Communications Letters

## Filter Results

Displaying Results 1 - 25 of 56

Publication Year: 2016, Page(s):C1 - 1700
| PDF (284 KB)
• ### IEEE Communications Society

Publication Year: 2016, Page(s): C2
| PDF (80 KB)
• ### On the Message Dimensions of Vector Linearly Solvable Networks

Publication Year: 2016, Page(s):1701 - 1704
Cited by:  Papers (1)
| | PDF (242 KB) | HTML

It is known that there exists a network which does not have a scalar linear solution over any finite field but has a vector linear solution when message dimension is 2. It is not known whether this result can be generalized for an arbitrary message dimension. In this letter, we show that there exists a network that admits an m dimensional vector linear solution, where m is a positive integer great... View full abstract»

• ### Nonbinary Quasi-Regular QC-LDPC Codes Derived From Cycle Codes

Publication Year: 2016, Page(s):1705 - 1708
| | PDF (404 KB) | HTML

Nonbinary ultra sparse codes, particularly regular cycle codes, are known to approach Shannon-limit performance as the Galois field GF(q) order is sufficiently large. Good cycle codes can result from a class of algebraically defined graphs called cages. Meanwhile, when smaller q is desirable, the cycle codes are outperformed by quasi-regular codes. In this letter, we propose a code construction me... View full abstract»

• ### Ternary Convolutional Codes for Ternary Phase Shift Keying

Publication Year: 2016, Page(s):1709 - 1712
| | PDF (681 KB) | HTML

In this letter, the construction of ternary convolutional codes (TCCs) for ternary phase shift keying (TPSK) modulation is considered. The tables of non-recursive nonsystematic TCCs with a maximum free distance are given for rates 1/2, 1/3, and 1/4. The conversion from binary data to ternary symbols is investigated. The performance of TCCs with binary to ternary conversion using TPSK is compared w... View full abstract»

• ### Exhaustive Enumeration of Elementary Trapping Sets of an Arbitrary Tanner Graph

Publication Year: 2016, Page(s):1713 - 1716
| | PDF (522 KB) | HTML

An effective branch-and-bound (B&B) algorithm for exhaustively enumerating the elementary trapping sets (ETSs) in an arbitrary given Tanner graph is described. Given a Tanner graph G and a positive integer ν, we introduce a novel 0-1 integer linear programming (ILP) formulation of the NP-hard problem of finding the minimum ω for which there exists an (ω, ν)-ETS in G. Th... View full abstract»

• ### On Selection Combiner Output Quadrivariate Cumulative Distribution Functions in Correlated Nakagami- $m$ and Rayleigh Fading

Publication Year: 2016, Page(s):1717 - 1720
| | PDF (769 KB) | HTML

An integrative overview on selection combiner output quadrivariate cumulative distribution functions (cdfs) in correlated Nakagami-m and Rayleigh fading is given. It is shown that seven-nested-infinite-summation cdfs in the literature can be mathematically simplified to their three-nested-infinite-summation forms. Mathematical links among the existing results are established. Detailed simulation r... View full abstract»

• ### On Gray Labeling for Downlink Non-Orthogonal Multiple Access Without SIC

Publication Year: 2016, Page(s):1721 - 1724
| | PDF (737 KB) | HTML

The impact of labeling a multilevel coding scheme with pulse amplitude modulation constellation in downlink non-orthogonal multiple access (NOMA) systems is studied. Particular interest is paid to the case where the strong user's receiver does not perform successive interference cancellation (SIC) before decoding its desired message. With judiciously chosen parameters, it was shown in a recent wor... View full abstract»

• ### Combined Effect of RF Impairment and CEE on the Performance of Dual-Hop Fixed-Gain AF Relaying

Publication Year: 2016, Page(s):1725 - 1728
| | PDF (521 KB) | HTML

We study the performance of dual-hop fixed-gain (FG) amplify-and-forward (AF) relaying systems in the presence of both radio frequency impairments (RFI) and channel estimation error (CEE). The expression for end-to-end signal-to-noise plus distortion-and-error ratio is derived along with exact analytical expressions of outage probability (OP) over independent but non-identically distributed Nakaga... View full abstract»

• ### ISI-Aware Modeling and Achievable Rate Analysis of the Diffusion Channel

Publication Year: 2016, Page(s):1729 - 1732
Cited by:  Papers (2)
| | PDF (597 KB) | HTML

Analyzing the achievable rate of molecular communication via diffusion (MCvD) inherits intricacies due to its nature: MCvD channel has memory, and the heavy tail of the signal causes inter-symbol interference (ISI). Therefore, using Shannon's channel capacity formulation for memoryless channel is not appropriate for the MCvD channel. Instead, a more general achievable rate formulation and system m... View full abstract»

• ### Joint Transceiver Beamforming Design for End-to-End Optimization in Full-Duplex MIMO Relay System With Self-Interference

Publication Year: 2016, Page(s):1733 - 1736
| | PDF (574 KB) | HTML

In this letter, a novel transceiver beamforming design is proposed for improving the end-to-end performance of a full-duplex amplify-and-forward relay system. Different from previous schemes based on nulling out residual self-interference (RSI), our proposed schemes can capture a balance between useful signal improvement and RSI suppression for further achievable rate improvement. To solve the non... View full abstract»

• ### On Low-Complexity Soft-Input Soft-Output Decision-Feedback Equalizers

Publication Year: 2016, Page(s):1737 - 1740
| | PDF (375 KB) | HTML

Compared with the soft-input, soft-output linear equalizer, the soft-input, soft-output decision-feedback equalizer (Soft-DFE) is much less investigated. This letter aims to provide a better understanding of the Soft-DFE, achieved via two comparisons: first, the two categories of designs classified by the way of treating the soft input and the soft-decision feedback (SDF), random or deterministic,... View full abstract»

• ### A Novel TLS-Based Antenna Reciprocity Calibration Scheme in TDD MIMO Systems

Publication Year: 2016, Page(s):1741 - 1744
| | PDF (396 KB) | HTML

Antenna calibration is mandatory to exploit channel reciprocity in time-division-duplex multiple-input-multiple-output systems. In this letter, we present in detail an over-the-air total-least-square (TLS)-based reciprocity calibration scheme. It takes place, not only at the base station side, but also with the assistance of the user, such that the overall reciprocity is achieved. The calibration ... View full abstract»

• ### Faster Than Nyquist Transmission With Multiple Turbo-Like Codes

Publication Year: 2016, Page(s):1745 - 1747
Cited by:  Papers (1)
| | PDF (546 KB) | HTML

The performance of turbo-like codes highly depends on their frame size and thus, the bit error rate (BER) performance of turbo-like codes can be improved by increasing the frame size. Unfortunately, increasing the frame size induces some drawbacks such as the increase of transmission and decoding latencies. On the other hand, faster than Nyquist (FTN) transmitter transmits modulated symbols at a r... View full abstract»

• ### Theoretical Analysis of the Power Spectral Density for FFT-FBMC Signals

Publication Year: 2016, Page(s):1748 - 1751
Cited by:  Papers (1)
| | PDF (880 KB) | HTML

Filter-bank multicarrier (FBMC) modulation is appreciated for its spectrum well-localization. However, the drawback of FBMC is the presence of the intrinsic interference that prevents the application of some multiple input multiple output techniques. Recently, fast Fourier transfrom (FFT)-FBMC was proposed to get rid of the intrinsic interference by performing FFT/IFFT (i.e., inverse fast Fourier ... View full abstract»

• ### DRDP: A DDoS-Resilient Data Pricing Mechanism

Publication Year: 2016, Page(s):1752 - 1755
Cited by:  Papers (1)
| | PDF (632 KB) | HTML

The scale of mobile applications, as well as the connecting users is developing with a dramatical speed. In the meantime, a heavy capacity burden has been posed to the Internet Service Provider (ISP). As a promising countermeasure, congestion-dependent pricing mechanisms are thereby proposed. Nevertheless, when facing the threats of extreme traffic oscillation and the Distributed Denial of Service... View full abstract»

• ### Dual-Stream Transceiver Structure With Single Antenna for Phase-Modulated OFDM

Publication Year: 2016, Page(s):1756 - 1759
Cited by:  Papers (1)
| | PDF (746 KB) | HTML

Constant envelope orthogonal frequency-division multiplexing (OFDM) can achieve 0-dB peak-to-average power ratio (PAPR) by transforming the OFDM signal to a constant envelope signal. However, its spectral efficiency is less than half of the OFDM. In this letter, a dual-stream transceiver structure with single antenna is proposed to increase the spectral efficiency. At the transmitter, the structur... View full abstract»

• ### Joint Optimization of Resource Allocation for Elastic Optical Intra-Datacenter Network

Publication Year: 2016, Page(s):1760 - 1763
Cited by:  Papers (1)
| | PDF (538 KB) | HTML

The ever-increasing demand for cloud services is posing serious challenges to the scalability of the computing, storing, and networking infrastructure deployed inside the datacenters. To address these challenges, we formulate the integer linear program (ILP) model to minimize the spectrum and the switch port usage by exploiting transparent multi-hop connection capability in elastic optical interco... View full abstract»

• ### Sample and Fetch-Based Large Flow Detection Mechanism in Software Defined Networks

Publication Year: 2016, Page(s):1764 - 1767
| | PDF (799 KB) | HTML

Detecting large flows in a software-defined network accurately is important for many applications. However, due to the constraints of measurement resources such as TCAMs, the existing solutions often suffer from feasibility and accuracy issues. In this letter, by combining the advantages of sampling and flow counting, we propose FlowMon, a sample and fetch-based two-stage large flow detection mech... View full abstract»

• ### Seamless Handover in Software-Defined Satellite Networking

Publication Year: 2016, Page(s):1768 - 1771
Cited by:  Papers (1)
| | PDF (1272 KB) | HTML

Satellites have largely been designed as application-specific and isolated for the past decades. Though with certain benefits, it might lead to resource under utilization and limited satellite applications. As an emerging networking technology, software-defined networking has recently been introduced into satellite networks. In this letter, we propose a software-defined satellite networking (SDSN)... View full abstract»

• ### Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks

Publication Year: 2016, Page(s):1772 - 1775
Cited by:  Papers (2)
| | PDF (742 KB) | HTML

In mobile social networks, to guarantee the security and privacy in the friend discovery process, we propose a hierarchical multi-authority and attribute-based encryption (ABE) friend discovery scheme based on ciphertext-policy (CP)-ABE. It employs character attribute subsets to achieve flexible fine-grained access control, which solves the problem of single-point failure and performance bottlenec... View full abstract»

• ### Eavesdropper Localization in Random Walk Channels

Publication Year: 2016, Page(s):1776 - 1779
| | PDF (3141 KB) | HTML

Eavesdroppers are notoriously difficult to detect and locate in traditional wireless communication systems, especially if they are silent. We show that in molecular communications, where information molecules undergo random walk (RW) propagation, eavesdropper detection and localization are possible if the eavesdropper is an absorbing receiver. This is due to the fact that the RW process has a fini... View full abstract»

• ### Solutions to Generalized Integrals Involving the Generalized Marcum ${Q}$ -Function With Application to Energy Detection

Publication Year: 2016, Page(s):1780 - 1783
| | PDF (474 KB) | HTML

We investigate analytic solutions for three generalized integrals involving arbitrary powers, generalized Marcum Q-function, and exponential functions, which are more general than the existing integrals and have been extensively employed in the performance evaluations in various areas of wireless communications, especially in cognitive radios. Closed-form solutions for the general integrals in ter... View full abstract»

• ### An Iterative Dictionary Learning-Based Algorithm for DOA Estimation

Publication Year: 2016, Page(s):1784 - 1787
| | PDF (379 KB) | HTML

This letter proposes a dictionary learning algorithm for solving the grid mismatch problem in direction of arrival (DOA) estimation from both the array sensor data and from the sign of the array sensor data. Discretization of the grid in the sparsity-based DOA estimation algorithms is a problem, which leads to a bias error. To compensate this bias error, a dictionary learning technique is suggeste... View full abstract»

• ### Distributed Transmit Beamforming Algorithms for Unsynchronized OFDM Systems With Timing Offset

Publication Year: 2016, Page(s):1788 - 1791
| | PDF (761 KB) | HTML

Transmit beamforming is a promising technique to enhance the coverage and signal quality for the edge user. However, the synchronization between the collaborative transmission points (TPs) is crucial for the beamforming, e.g., the timing offset (TO) and the different travel distances between TPs limit the achievable gain. In this letter, we design and implement the distributed beamforming by consi... View full abstract»

## Aims & Scope

IEEE Communications Letters publishes letters on the frontiers of research within the field of interest of the IEEE Communications Society in a timely manner.

Full Aims & Scope

Editor-in-Chief
Octavia Dobre