IEEE Communications Letters

Issue 4 • April 2018

Sign In

Full text access may be available.

To access full text, please use your member or institutional sign in.

The purchase and pricing options for this item are unavailable. Select items are only available as part of a subscription package. You may try again later or contact us for more information.

Filter Results

Displaying Results 1 - 25 of 56
  • Table of contents

    Publication Year: 2018, Page(s):C1 - 659
    Request permission for commercial reuse | PDF file iconPDF (284 KB)
    Freely Available from IEEE
  • IEEE Communications Society

    Publication Year: 2018, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Improving the Decoding Threshold of Tailbiting Spatially Coupled LDPC Codes by Energy Shaping

    Publication Year: 2018, Page(s):660 - 663
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB) | HTML iconHTML

    We show how the iterative decoding threshold of tailbiting spatially coupled (SC) low-density parity-check (LDPC) code ensembles can be improved over the binary input additive white Gaussian noise channel by allowing the use of different transmission energies for the codeword bits. We refer to the proposed approach as energy shaping. We focus on the special case where the transmis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced Metric Sorting for Successive Cancellation List Decoding of Polar Codes

    Publication Year: 2018, Page(s):664 - 667
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2067 KB) | HTML iconHTML

    This letter focuses on the metric sorting step for successive cancellation list decoders for polar codes, which play an important role in the overall comparison process. We propose three effective pairwise metric sorting (PMS) methods based on general pairwise sorting. We first describe a full-sorted PMS architecture with fewer comparators than state-of-the-art methods. Second, we present a half-s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonbinary WOM Codes With Uninformed Encoder and Decoder

    Publication Year: 2018, Page(s):668 - 671
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    Write-once memory (WOM) is a storage device, where the cells can only be increased when programmed. A WOM code allows the device to be programmed multiple times without decreasing the cell values. This will allow a longer lifetime in, e.g., flash memory, where frequent erasures wear it out. Most WOM codes assume that the previous state is available when encoding a message; however, this is impract... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design of Protograph LDPC Codes as Source Codes in a JSCC System

    Publication Year: 2018, Page(s):672 - 675
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (613 KB) | HTML iconHTML

    Although joint source-channel coding (JSCC) based on double protograph low-density parity-check (LDPC) codes has been shown to be an excellent solution for wireless communication, the protograph LDPC code for source coding needs to be optimized to improve the error-floor performance. In this letter, first, it is found that optimized protograph LDPC codes for channel coding are not optimal for sour... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Window-Interleaved Turbo Codes

    Publication Year: 2018, Page(s):676 - 679
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (475 KB) | HTML iconHTML

    We consider a class of turbo codes with a band structured interleaver, such that the interleaving (and thus deinterleaving) is done within a window. This ensures that the extrinsic information for each symbol is generated from symbols within a window, allowing the processing of large message blocks with a sliding window decoder. This provides flexibility in terms of decoding latency and also makes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Randomized Serially Concatenated LDGM Codes for the Gaussian Wiretap Channel

    Publication Year: 2018, Page(s):680 - 683
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB) | HTML iconHTML

    We study the application of a special class of low-density parity-check codes to the wiretap channel. We construct a randomized coding scheme based on serially concatenated low-density generator matrix codes and their duals extending the approach used for convolutional and turbo codes. Furthermore, we propose an efficient iterative decoder for this scheme utilizing a joint iterative message passin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Index Codes for a New Class of Interlinked Cycle Structure

    Publication Year: 2018, Page(s):684 - 687
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (497 KB) | HTML iconHTML

    The interlinked cycle (IC) structure that generalizes cycles and cliques was defined by Thapa, Ong, and Johnson. Interlinked-cycle-cover (ICC) scheme that leverages IC structures in digraphs to construct scalar linear index codes was proposed. A class of infinitely many digraphs, where the proposed scalar linear codes based on ICC scheme are optimal were characterized by Thapa et. al View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SDN-Assisted Slow HTTP DDoS Attack Defense Method

    Publication Year: 2018, Page(s):688 - 691
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (945 KB) | HTML iconHTML

    A Slow HTTP distributed denial of service (DDoS) attack causes a Web server to be unavailable, but it is difficult to detect in a network, because its traffic patterns are similar to those of legitimate clients. In this letter, we propose a network-based Slow HTTP DDoS attack defense method, which is assisted by a software-defined network that can detect and mitigate Slow HTTP DDoS attacks in the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint Pilot and Payload Power Control for Uplink MIMO-NOMA With MRC-SIC Receivers

    Publication Year: 2018, Page(s):692 - 695
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    This letter proposes a joint pilot and payload power allocation (JPA) scheme to mitigate the error propagation problem for uplink multiple-input multiple-output non-orthogonal multiple access systems. A base station equipped with a maximum ratio combining and successive interference cancellation (MRC-SIC) receiver is adopted for multiuser detection. The average signal-to-interference-plus-noise ra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Capacity of Network Error Correction Coding With Random Errors

    Publication Year: 2018, Page(s):696 - 699
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    In this letter, we consider the capacity results of network error correction coding over a general multicast network, where a malicious error occurs on each edge with a fixed probability $p$ at each transmission. A pair of upper and lower bounds on the capacity are given, which are proved to coincide for a unicast network wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of Multicast Source-Routing Based on Bloom Filter

    Publication Year: 2018, Page(s):700 - 703
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (437 KB) | HTML iconHTML

    In multicast source-routing scheme, packet encodes the generated multicast tree at the header, and can be delivered successfully by checking the encoded tree. Traditional multicast source-routing uses a single Bloom filter (BF) to represent the multicast tree, which incurs high false positive rate and inefficient space utilization. In this letter, we propose two multicast source-routing using mult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SCDN: A Novel Software-Driven CDN for Better Content Pricing and Caching

    Publication Year: 2018, Page(s):704 - 707
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (929 KB) | HTML iconHTML

    In conventional content delivery networks (CDNs), where the content providers (CPs) are lack of the topology information, it is difficult for them to determine the content caching and pricing scheme. Furthermore, the small CPs cannot maintain their own cache servers as it is costly. To solve these problems, we propose a novel CDN architecture named software-driven CDN (SCDN) by leveraging the bene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ultra-Reliable Communication in 5G mmWave Networks: A Risk-Sensitive Approach

    Publication Year: 2018, Page(s):708 - 711
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB) | HTML iconHTML

    In this letter, we investigate the problem of providing gigabit wireless access with reliable communication in 5G millimeter-wave (mmWave) massive multiple-input multiple-output networks. In contrast to the classical network design based on average metrics, we propose a distributed risk-sensitive reinforcement learning-based framework to jointly optimize the beamwidth and transmit power, while tak... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Zero-Delay Gaussian Joint Source–Channel Coding for the Interference Channel

    Publication Year: 2018, Page(s):712 - 715
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (650 KB) | HTML iconHTML

    This letter studies zero-delay joint source–channel coding for transmission of correlated Gaussian sources over a Gaussian interference channel. We propose to adopt a delay-free hybrid digital and analog scheme, which is transmitting the superposition of scaled source and its quantized version after applying scalar quantization to the source at each transmitter. At the corresponding receive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonblocking Multirate 2-Stage Networks

    Publication Year: 2018, Page(s):716 - 719
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (570 KB) | HTML iconHTML

    A 2-stage network is the most compact multistage interconnection network (MIN) for interconnecting small switches to form a large one. For larger networks, the switches in each stage can be replaced with 2-stage networks to reduce crosspoint cost. The 2-stage network preserves only conditional nonblockingness, while a multirate 2-stage network preserves nonblockingness. Multirate MINs have been ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deep Learning-Aided SCMA

    Publication Year: 2018, Page(s):720 - 723
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (529 KB) | HTML iconHTML

    Sparse code multiple access (SCMA) is a promising code-based non-orthogonal multiple-access technique that can provide improved spectral efficiency and massive connectivity meeting the requirements of 5G wireless communication systems. We propose a deep learning-aided SCMA (D-SCMA) in which the codebook that minimizes the bit error rate (BER) is adaptively constructed, and a decoding strategy is l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Modulation of PWM-Based Multi-Level Perpendicular Magnetic Recording for Conventional Media

    Publication Year: 2018, Page(s):724 - 727
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (926 KB) | HTML iconHTML

    In this letter, we propose a robust 3-ary modulation for a pulse width modulation (PWM)-based multi-level perpendicular magnetic recording. In the proposed 3-ary modulation, narrow-width pulses are restrained in PWM signal corresponding to resolution of magnetic media. We evaluate a user bit density (UBD) gain in our proposal using a low-density parity-check (LDPC) coded frame error rate performan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rate-Maximized Scheduling in Adaptive OCDMA Systems Using Stochastic Optimization

    Publication Year: 2018, Page(s):728 - 731
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    In this letter, we use stochastic optimization to schedule data transmissions in an adaptive optical code division multiple-access (OCDMA) system to maximize transmission rate. We employ Lyapunov drift theory to formulate a general optimization problem for rate-maximized scheduling in which user codes are adaptively assigned such that time-averaged transmission rate is maximized and important syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linear Precoding for MU-MISO VLC Systems With Noisy Channel State Information

    Publication Year: 2018, Page(s):732 - 735
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (583 KB) | HTML iconHTML

    In this letter, we study a multi-user multiple-input single-output (MU-MISO) visible light communication (VLC) system. The linear precoding for pulse amplitude modulation signal is developed with noisy channel state information (CSI). In this method, the precoding is formulated to achieve user fairness with the constraint of the current range of lighting emitting diodes. The precoding design is go... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved FD-DFE Structure for Downlink VLC Systems Based on SC-FDMA

    Publication Year: 2018, Page(s):736 - 739
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (498 KB) | HTML iconHTML

    Visible light communication (VLC) technology is considered to be an attractive solution for future wireless indoor multimedia communication. To reduce the peak-to-average power ratio, single-carrier frequency division multiple access (SC-FDMA) with time domain asymmetrical clipping is applied for the downlink multi-user VLC system. An improved frequency-domain decision feedback equalizer (FD-DFE) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asymptotic Performance Analysis for Landmark Learning in Indoor Localization

    Publication Year: 2018, Page(s):740 - 743
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (543 KB) | HTML iconHTML

    Landmarks are widely used to assist localization of mobile users in indoor environments. Learning a priori unknown or imprecise landmark positions through users’ localization processes can in turn improve their localization performance. In this letter, we develop an analytical framework for landmark learning in localization, in which the positions of the landmarks are conti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Outage Performance for Non-Orthogonal Multiple Access With Fixed Power Allocation Over Nakagami- ${m}$ Fading Channels

    Publication Year: 2018, Page(s):744 - 747
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB)

    In this letter, we study the outage performance of non-orthogonal multiple access (NOMA) with fixed power allocation over Nakagami- ${m}$ fading channels, where the fading parameters of NOMA users are different. In this scenario, new closed-form expressions are derived for the outage behavior of individual users and the system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tuna: An Efficient and Practical Scheme for Wireless Access Point in 5G Networks Virtualization

    Publication Year: 2018, Page(s):748 - 751
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (735 KB) | HTML iconHTML

    Recently, network function virtualization (NFV) has been widely used in 5G innovation. However, with the implementation of NFV, virtualized wireless access point has suffered a significant performance degradation. In this letter, we propose an efficient packet processing scheme (Tuna) to improve the performance of wireless network virtualization. Specifically, we locate management frame into user ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Communications Letters publishes letters on the frontiers of research within the field of interest of the IEEE Communications Society in a timely manner.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Octavia Dobre
Memorial University, Canada