Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.

# IEEE Transactions on Communications

## Filter Results

Displaying Results 1 - 25 of 38

Publication Year: 2016, Page(s):C1 - C4
| PDF (331 KB)
• ### IEEE Communications Society

Publication Year: 2016, Page(s): C2
| PDF (91 KB)
• ### A Soft Input Decoding Algorithm for Generalized Concatenated Codes

Publication Year: 2016, Page(s):3585 - 3595
Cited by:  Papers (1)
| | PDF (1360 KB) | HTML

This paper proposes a soft input decoding algorithm and a decoder architecture for generalized concatenated (GC) codes. The GC codes are constructed from inner nested binary Bose-Chaudhuri-Hocquenghem (BCH) codes and outer Reed-Solomon codes. In order to enable soft input decoding for the inner BCH block codes, a sequential stack decoding algorithm is used. Ordinary stack decoding of binary block ... View full abstract»

• ### Error Errore Eicitur: A Stochastic Resonance Paradigm for Reliable Storage of Information on Unreliable Media

Publication Year: 2016, Page(s):3596 - 3608
Cited by:  Papers (1)
| | PDF (1866 KB) | HTML

We give an architecture of a storage system consisting of a storage medium made of unreliable memory elements and an error correction circuit made of a combination of noisy and noiseless logic gates that is capable of retaining the stored information with the lower probability of error than a storage system with a correction circuit made completely of noiseless logic gates. Our correction circuit ... View full abstract»

• ### Hierarchical Polar Coding for Achieving Secrecy Over State-Dependent Wiretap Channels Without Any Instantaneous CSI

Publication Year: 2016, Page(s):3609 - 3623
| | PDF (1802 KB) | HTML

This paper presents a polar coding scheme to achieve secrecy in block fading binary symmetric wiretap channels without the knowledge of instantaneous channel state information (CSI) at the transmitter. For this model, a coding scheme that hierarchically utilizes polar codes is presented. In particular, on the polarization of different binary symmetric channels over different fading blocks, each ch... View full abstract»

• ### The Three/Two Gaussian Parametric LDLC Lattice Decoding Algorithm and Its Analysis

Publication Year: 2016, Page(s):3624 - 3633
Cited by:  Papers (1)
| | PDF (1188 KB) | HTML

Low density lattice codes (LDLCs) are high-dimensional lattices with a sparse inverse generator matrix that can be decoded efficiently using iterative decoding. In the iterative LDLC decoder, the messages are Gaussian mixtures, and for any implementation, the Gaussian mixtures must be approximated. This paper describes a parametric LDLC decoding algorithm, where internally at the variable node, in... View full abstract»

• ### Block Markov Superposition Transmission of RUN Codes

Publication Year: 2016, Page(s):3634 - 3643
| | PDF (2486 KB) | HTML

In this paper, we propose a simple procedure to construct (decodable) good codes with any given alphabet (of moderate size) for any given (rational) code rate to achieve any given target error performance (of interest) over additive white Gaussian noise channels. We start with constructing codes over groups for any given code rates. This can be done in an extremely simple way if we ignore the erro... View full abstract»

• ### Low Complex, Narrowband-Interference Robust Synchronization for NC-OFDM Cognitive Radio

Publication Year: 2016, Page(s):3644 - 3654
| | PDF (1690 KB) | HTML

This paper presents a new, low-complexity algorithm for time and frequency synchronization in a non-contiguous-orthogonal frequency division multiplexing (NC-OFDM) radio communication system in the presence of narrowband interference (NBI). This interference scenario is plausible for cognitive radio systems. The computational complexity of the proposed synchronization method is similar to the know... View full abstract»

• ### Optimal Energy-Efficient Joint Resource Allocation for Multi-Hop MIMO-AF Systems

Publication Year: 2016, Page(s):3655 - 3668
| | PDF (1615 KB) | HTML

Energy efficiency is a key enabler for the next generation of communication systems. Equally, resource allocation and cooperative communication are effective techniques for improving the communication system performance. In this paper, we propose an optimal energy-efficient joint resource allocation method for the multi-hop multiple-input-multiple-output (MIMO) amplify-and-forward (AF) system. We ... View full abstract»

• ### On the Capacity Region of Asymmetric Gaussian Two-Way Line Channel

Publication Year: 2016, Page(s):3669 - 3682
| | PDF (1016 KB) | HTML

Lattice codes are known to outperform random codes for certain networks, especially in the Gaussian two-way relay channels (GTWRCs) where lattice codes are able to exploit their linearity. As an extension of the GTWRC, in this paper, we consider the asymmetric Gaussian two-way line network where two nodes exchange their messages through multiple relays. We first investigate the capacity region of ... View full abstract»

• ### Delay-Limited and Ergodic Capacities of MIMO Channels With Limited Feedback

Publication Year: 2016, Page(s):3683 - 3696
| | PDF (874 KB) | HTML

We consider a fixed data rate slow-fading MIMO channel with a long-term power constraint P at the transmitter. A relevant performance limit is the delay-limited capacity, which is the largest data rate at which the outage probability is zero. It is well known that if both the transmitter and the receiver have full channel state information (CSI) and if either of them has multiple antennas, the del... View full abstract»

• ### Large-Scale MIMO Detection Using MCMC Approach With Blockwise Sampling

Publication Year: 2016, Page(s):3697 - 3707
| | PDF (1972 KB) | HTML

In this paper, a low-complexity approach for the large-scale (underdetermined) multiple-input multiple-output (MIMO) detection is proposed using the Markov chain Monte Carlo (MCMC) algorithm in conjunction with blockwise sampling. Klein's algorithm is employed in each sub-system to draw multidimensional samples for an MCMC detector in iterative detection and decoding (IDD). From analysis, we find ... View full abstract»

• ### Modeling and Analysis of SiNW FET-Based Molecular Communication Receiver

Publication Year: 2016, Page(s):3708 - 3721
| | PDF (2941 KB) | HTML

Molecular communication (MC) is a bio-inspired communication method based on the exchange of molecules for information transfer among nanoscale devices. MC has been extensively studied from various aspects in the literature; however, the physical design of MC transceiving units is largely neglected with the assumption that network nodes are entirely biological devices, e.g., engineered bacteria, w... View full abstract»

• ### Energy-Efficient Resource Allocation for Downlink Non-Orthogonal Multiple Access Network

Publication Year: 2016, Page(s):3722 - 3732
| | PDF (1172 KB) | HTML

Non-orthogonal multiple access (NOMA) is a promising technique for the fifth generation mobile communication due to its high spectral efficiency. By applying superposition coding and successive interference cancellation techniques at the receiver, multiple users can be multiplexed on the same subchannel in NOMA systems. Previous works focus on subchannel assignment and power allocation to achieve ... View full abstract»

• ### Joint Allocation of Spectral and Power Resources for Non-Cooperative Wireless Localization Networks

Publication Year: 2016, Page(s):3733 - 3745
Cited by:  Papers (1)
| | PDF (1234 KB) | HTML

Network localization is a key feature in many wireless services and applications. In typical range-based non-cooperative localization techniques, agents try to perform position estimation through ranging with respect to anchors with known positions. Based on the definition of squared positional error bound, the localization accuracy can be determined by the transmit power, carrier frequency, and s... View full abstract»

• ### Delay-Aware Scheduling and Resource Optimization With Network Function Virtualization

Publication Year: 2016, Page(s):3746 - 3758
Cited by:  Papers (3)
| | PDF (1438 KB) | HTML

To accelerate the implementation of network functions/middle boxes and reduce the deployment cost, recently, the concept of network function virtualization (NFV) has emerged and become a topic of much interest attracting the attention of researchers from both industry and academia. Unlike the traditional implementation of network functions, a software-oriented approach for virtual network function... View full abstract»

• ### On the Two-User Multi-Carrier Joint Channel Selection and Power Control Game

Publication Year: 2016, Page(s):3759 - 3770
Cited by:  Papers (1)
| | PDF (1433 KB) | HTML

In this paper, we propose a hierarchical game approach to model the energy efficiency maximization problem, where transmitters individually choose their channel assignment and power control. We conduct a thorough analysis of the existence, uniqueness, and characterization of the Stackelberg equilibrium. Interestingly, we formally show that a spectrum orthogonalization naturally occurs when users d... View full abstract»

• ### On Monotonicity of the Optimal Transmission Policy in Cross-Layer Adaptive $m$ -QAM Modulation

Publication Year: 2016, Page(s):3771 - 3785
| | PDF (1843 KB) | HTML

This paper considers a cross-layer adaptive modulation system that is modeled as a Markov decision process. We study how to utilize the monotonicity of the optimal transmission policy to relieve the computational complexity of dynamic programming (DP). In this system, a scheduler controls the bit rate of the m-quadrature amplitude modulation in order to minimize the long-term losses incurred by th... View full abstract»

• ### Performance Analysis of Diffusion-Based Molecular Communications With Memory

Publication Year: 2016, Page(s):3786 - 3793
| | PDF (1158 KB) | HTML

In this paper, the comprehensive delay and performance analyses of the M-ary molecular communications with memory are presented. By taking into account any level of channel memory, the type-based and concentration-based modulation schemes are introduced and analyzed. In the type-based modulation, information symbols are encoded through different molecule types. In the concentration-based modulatio... View full abstract»

• ### Adaptive Multi-Homing Resource Allocation for Time-Varying Heterogeneous Wireless Networks Without Timescale Separation

Publication Year: 2016, Page(s):3794 - 3807
| | PDF (1408 KB) | HTML

In this paper, we design an adaptive multi-homing resource allocation algorithm for time-varying heterogeneous wireless networks (HetNet), where the algorithm iteration timescale is the same to the network state acquisition timescale. First, the network utility maximization is characterized by a stochastic optimization model. Second, the multi-homing resource allocation (MHRA) algorithm is develop... View full abstract»

• ### Diphase: Characterizing Packet Delay in Multi-Source Energy Harvesting Systems

Publication Year: 2016, Page(s):3808 - 3819
| | PDF (1751 KB) | HTML

We consider multi-source energy harvesting communication systems, where the energy harvested from two independent processes is used for the transmission of the data packets. The data packets arrive randomly and wait in a queue for accumulation of sufficient energy and for service completion of previously arrived packets. Thus, the data queue dynamics are influenced jointly by the energy arrival pr... View full abstract»

• ### Bandlimited Optical Intensity Modulation Under Average and Peak Power Constraints

Publication Year: 2016, Page(s):3820 - 3830
| | PDF (1134 KB) | HTML

Bandlimited optical intensity channels, arising in applications such as visible light communications, require that all signals satisfy a bandwidth constraint as well as average, peak, and non-negativity amplitude constraints. In this paper, a 2-D signal space for bandlimited optical intensity channels is presented. A novel feature of this model is that the non-negativity and peak constraints are r... View full abstract»

• ### On Secrecy Performance of MISO SWIPT Systems With TAS and Imperfect CSI

Publication Year: 2016, Page(s):3831 - 3843
Cited by:  Papers (7)
| | PDF (2002 KB) | HTML

In this paper, a multiple-input single-output (MISO) simultaneous wireless information and power transfer (SWIPT) system, including one base station (BS) equipped with multiple antennas, one desired single-antenna information receiver (IR), and N (N > 1) single-antenna energy-harvesting receivers (ERs) is considered. Assuming that the information signal to the desired IR may be eavesdropped by ... View full abstract»

• ### BER-Based Physical Layer Security With Finite Codelength: Combining Strong Converse and Error Amplification

Publication Year: 2016, Page(s):3844 - 3857
| | PDF (1260 KB) | HTML

A bit-error-rate (BER)-based physical layer security approach is proposed for the finite blocklengths. For secure communication in the sense of high BER, the information-theoretic strong converse is combined with cryptographic error amplification achieved by the substitution permutation networks based on the confusion and diffusion. For the discrete memoryless channels (DMCs), an analytical framew... View full abstract»

• ### Secrecy Performance of Wirelessly Powered Wiretap Channels

Publication Year: 2016, Page(s):3858 - 3871
Cited by:  Papers (2)
| | PDF (1593 KB) | HTML

This paper considers a wirelessly powered wiretap channel, where an energy constrained multi-antenna information source, powered by a dedicated power beacon, communicates with a legitimate user in the presence of a passive eavesdropper. Based on a simple time-switching protocol, where power transfer and information transmission are separated in time, we investigate two popular multi-antenna transm... View full abstract»

## Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

Full Aims & Scope

## Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas