By Topic

Selected Areas in Communications, IEEE Journal on

Issue 2 • Date March 1986

Filter Results

Displaying Results 1 - 13 of 13
  • [Front cover and table of contents]

    Publication Year: 1986 , Page(s): 0
    Save to Project icon | Request Permissions | PDF file iconPDF (246 KB)  
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 1986 , Page(s): 0
    Save to Project icon | Request Permissions | PDF file iconPDF (246 KB)  
    Freely Available from IEEE
  • Guest Editorial: Toward Survivable Secure Communications

    Publication Year: 1986 , Page(s): 205 - 206
    Save to Project icon | Request Permissions | PDF file iconPDF (289 KB)  
    Freely Available from IEEE
  • Acquisition of Direct Sequence Signals with Modulation and Jamming

    Publication Year: 1986 , Page(s): 254 - 272
    Cited by:  Papers (15)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1456 KB)  

    The effects of data modulation and/or narrow-band interference on the acquisition time of direct sequence (DS) systems are assessed when particular acquisition schemes are selected. Finally, the results of these analyses are used to propose receivers which mitigate the deleterious effects of the data or jamming. The analyses demonstrate that the I-Q detector, modified for a data modulated carrier,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stochastic Damage Models and Dependence Effects in the Survivability Analysis of Communication Networks

    Publication Year: 1986 , Page(s): 234 - 242
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (808 KB)  

    Stochastic analyses of the Survivability of communication networks often include a simplifying assumption that failures of, or damages to, various components of the network are statistically independent. This assumption can be quite unrealistic and can lead one to conclusions that are grossly in error. Survivability analyses and syntheses of robust networks should incorporate dependencies introduc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A General Theory for Asynchronous Speech Encryption Techniques

    Publication Year: 1986 , Page(s): 280 - 287
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (728 KB)  

    Speech encryption techniques have always been very important for military communications, but most useful techniques require perfect synchronization between the transmitter and the receiver. This not only complicates the implementation, but makes the transmission very sensitive to channel conditions because slight synchronization error might completely break the transmission. Two special technique... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Use of the Longley-Rice and Johnson-Gierhart Tropospheric Radio Propagation Programs:0.02-20 GHz

    Publication Year: 1986 , Page(s): 297 - 307
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1160 KB)  

    The Longley-Rice and Johnson-Gierhart tropospheric propagation programs are particularly useful in predicting propagation losses for paths over irregular terrain commonly encountered in ground-to-ground, air-to-ground, and air-to-air military tactical scenarios. These programs use an empirical database to statistically weigh knife-edge diffraction losses with losses from multipath interference, sm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Connection Survivability in Complex Strategic Communications Networks

    Publication Year: 1986 , Page(s): 243 - 253
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1064 KB)  

    Military communications networks have to retain their connectivity when subject to quite severe damage. The "survivability" of such networks is conveniently defined by the probability of retaining a connection between representative pairs of terminals. Many methods of calculating this parameter analytically, or of estimating it statistically, have been published. However, because of the "combinato... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Overview of the Army/DARPA Distributed Communications and Processing Experiment

    Publication Year: 1986 , Page(s): 207 - 215
    Cited by:  Papers (6)  |  Patents (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1032 KB)  

    Emerging technologies in communications and information processing are having, and will continue to have, a significant effect on the way command and control (C2) is carried out on the battlefield of the future. One of these technologies is a packet-switched, internetwork, computer-communications system. This system concept allows for the interconnection of heterogeneous computers on he... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Search Methods Using Energy Detectors--Maximum Probability of Detection

    Publication Year: 1986 , Page(s): 273 - 279
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (608 KB)  

    The search for weak signals with unknown center frequency using energy detectors is a resource allocation problem. This paper considers good strategies for search when the total search time is fixed. The criterion for optimality considered in this paper is maximum probability of detection for specified false alarm probability. The problem is shown to be one in nonlinear programming which has a sol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Antijam Performance of Fast Frequency-Hopped M-ary NCFSK--An Overview

    Publication Year: 1986 , Page(s): 216 - 233
    Cited by:  Papers (71)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1624 KB)  

    The antijam performance of M -ary noncoherent FSK with fast frequency hopping (one or more hops per symbol) is studied. A summary of terminology, definitions, and an overview of the literature is given. A general analysis method based upon circularly symmetric signal theory is presented. It provides a means for exact analysis of performance for View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transmission Monitoring and Control of Strategic Communication Systems

    Publication Year: 1986 , Page(s): 308 - 312
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (672 KB)  

    This paper discusses a minicomputer-based communication system monitor used by the U.S. Department of Defense to improve the service availability and reduce the operating costs of the new multichannel digital transmission systems. A brief history of the development of the monitor and a general description of the present-generation hardware and software are included. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conversion Between the TCP and ISO Transport Protocols as a Method of Achieving Interoperability Between Data Communications Systems

    Publication Year: 1986 , Page(s): 288 - 296
    Cited by:  Papers (35)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (920 KB)  

    A solution to the lack of interoperability between the U.S. Department of Defense (DoD) data communications standards and the NATO standards based on the International Organization for Standardization concept for open systems interconnection is presented. The solution is based on conversion between a common subset of the US DoD Transmission Control Protocol and the ISO Class 4 Transport Protocol a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Journal on Selected Areas in Communications focuses on all telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Muriel Médard
MIT