By Topic

IEEE Transactions on Communications

Issue 8 • Date Aug 1995

Filter Results

Displaying Results 1 - 17 of 17
  • Simple algorithms for BCH decoding

    Publication Year: 1995, Page(s):2324 - 2333
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB)

    Proposes some simple algorithms for decoding BCH codes. The authors show that the pruned FFT is an effective method for evaluating syndromes and for finding the roots of error-locator polynomials. They show that a simple variation of the basic Gaussian elimination procedure can be adapted to compute the error-locator polynomial efficiently for codes with small designed distance. Finally, they give... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of the performance of error-correcting codes on a Gilbert channel

    Publication Year: 1995, Page(s):2316 - 2323
    Cited by:  Papers (143)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    Presents a combinatorial analysis to derive a closed-form expression for the number of transmission errors that occur in a block transmitted through a Gilbert channel. This expression simplifies the computations needed to investigate the tradeoffs among the decoding error probability, degree of interleaving, and the error-correction ability of a code. The authors illustrate how a designer may appl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation of exogenous traffic based on link measurements in circuit-switched networks

    Publication Year: 1995, Page(s):2381 - 2390
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    The intensity of exogenous traffic is a critical input to a variety of network functions, including routing, flow control, and capacity planning. Currently, however, the scope of measurements in a large scale, circuit-switched network is quite limited and does not include gathering of the exogenous traffic intensity in real-time. This paper formulates methods of estimating the exogenous traffic in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error probability estimator structures based on analysis of the receiver decision variable

    Publication Year: 1995, Page(s):2311 - 2315
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    The paper presents schemes for rapid on-line error probability estimation of digital communications links. Several estimator structures are proposed based on the assumption of sample independence, including weighted least squares (WLS) and maximum likelihood (ML) forms. The continuous-form ML estimator is shown to lie on the Rao-Cramer bound, making it a most efficient estimator of probability of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Noncoherent demodulation techniques for trellis coded M-DPSK signals

    Publication Year: 1995, Page(s):2370 - 2380
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (992 KB)

    Considers noncoherent decoding of trellis coded M-DPSK transmission, and attempts to unify and contrast the approaches to this problem which have been previously reported. In the second part of the paper, the maximum likelihood block decoders for the AWGN channel are outlined, first assuming that the decoder has no knowledge of the state of the encoder at the beginning of the block, and then assum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simplified approach to optimum diversity combining and equalization in digital data transmission

    Publication Year: 1995, Page(s):2285 - 2288
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    We present simplified derivations of some results given by Balaban and Salt (see ibid., vol.40, no.5, p.885-894 and p.895-907, 1992). We propose an equivalent single channel representation of linear diversity channels. Based on J. Salz's earlier work (1973), we obtain a simple method to derive various forms of optimum diversity combining and equalization in digital data transmission View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance limitation of the leaky bucket algorithm for ATM networks

    Publication Year: 1995, Page(s):2298 - 2300
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    The performance limitation of the “leaky bucket algorithm” is analyzed for usage parameter control and traffic management in asynchronous transfer mode (ATM) networks. Simulation results show that the conventional statistical bandwidth allocation method, which uses “the worst pattern derived from the cell interarrival time moments” permitted by the leaky bucket algorithm, c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance degradation of pseudonoise code lock detector due to radio frequency interference

    Publication Year: 1995, Page(s):2305 - 2310
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    This paper computes the probabilities of detection and false alarm for a pseudonoise (PN) sequence code lock detector when a strong radio frequency interference (RFI) hits the communications link. A soft-limiter, a hard-limiter, and no limiter at the front-end of the receiver are considered. Both continuous wave (CW) type RFI and pulse type RFI are analyzed. It is shown that a soft-limiter or a ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of maximal-ratio diversity systems in a correlated Nakagami-fading environment

    Publication Year: 1995, Page(s):2360 - 2369
    Cited by:  Papers (294)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    The bit error rate (BER) performance of an M-branch maximal-ratio combiner (MRC) for the detection of signals in a correlated Nakagami-fading channel is analyzed. Coherent and incoherent detection of frequency shift-keying (FSK) and phase-shift keying (PSK) signals are considered. It is assumed that the fading parameters in each diversity branch are identical. The effect of correlation is studied ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Micro- and macrodiversity MDPSK on shadowed frequency-selective channels

    Publication Year: 1995, Page(s):2334 - 2343
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    The performance of M-ary differential phase shift keying (MDPSK) on frequency-selective slow Rayleigh fading, lognormal shadowed channels with diversity combining is analyzed for mobile and portable applications. The use of L-branch equal gain postdetection microdiversity combining to mitigate the effects of fading and P-port macrodiversity to alleviate the effects of shadowing are investigated. F... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • KSMINs: knockout switch-based multistage interconnection networks for high-speed packet switching

    Publication Year: 1995, Page(s):2391 - 2398
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    We propose knockout switch-based multistage interconnection networks (KSMINs) for fast packet switching, combining the well-known knockout switch and the concept of multistage interconnection networks. The main objective is to reduce the severe pin requirements of large knockout switches through a phased address filtering. We present an approximate Markov-chain model of KSMINs to study the perform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Undetected faults in protocol testing

    Publication Year: 1995, Page(s):2289 - 2297
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    We investigate ways in which UIO-based conformance testing can fail to catch faults, including single and multiple faults, faults with extra or missing states, and faults at both the test sequence and subsequence levels. Given a particular error and test method, the error is masked if it is not detected by the test method. Many forms of fault masking are possible, and all test methods we have cons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantum communication with three coherent states

    Publication Year: 1995, Page(s):2301 - 2304
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    Quantum communication with a nonsymmetrical set of three states is considered. Some results obtained from numerical computation are presented. A model for quantum detection called “near optimum”, similar to the binary case, is studied. Calculations of error probability in detection schemes subject to information criteria are performed and discussed. Further, comparison of the error pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spectrum efficiency of multilevel modulation schemes in mobile radio communications

    Publication Year: 1995, Page(s):2344 - 2349
    Cited by:  Papers (10)  |  Patents (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    Lee (1989) has produced equations describing spectrum efficiency for modulation schemes operating in cellular environments. The present authors consider the performance of a range of multilevel modulation schemes when these spectrum efficiency equations are applied. They then proceed to adapt these efficiency equations for use in microcells before considering the performance of multilevel modulati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On fast algorithms for TDM switching assignments in terrestrial and satellite networks

    Publication Year: 1995, Page(s):2399 - 2404
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    Bipartite graph and network circulation formulations of the TDM switching assignment problem are compared; a correct proof is given of the existence of a feasible circulation in the network model corresponding to a valid switching assignment. Dividing users into groups, an O(K4) algorithm for solving the assignment problem is described where K is the number of TDM lines, and a bound is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonlinear multi-h phase codes for CPFSK signaling

    Publication Year: 1995, Page(s):2350 - 2359
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB)

    Two novel trellis-coding techniques, called nonlinear multi-h signaling and nonlinear asymmetrical multi-h signaling, which achieve higher constraint length than ordinary multi-h signals, are introduced with CPFSK signals. In contrast to ordinary multi-h signaling where the modulation index is changed at the end of every symbol interval, nonlinear multi-h signals are constructed by changing the mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the selective counting of third-order products

    Publication Year: 1995, Page(s):2405 - 2413
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    A practical and efficient method is presented for the counting of third-order products generated by an arbitrary number of carriers with arbitrary power spectral shapes. In particular, three selective counting procedures (i.e. sorting by position, sorting by position and group, and sorting by position, group, and kind) are introduced in a systemic way, based upon a discrete third-order Volterra mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas