scispace - formally typeset
Search or ask a question
Author

J. Bibb Cain

Bio: J. Bibb Cain is an academic researcher from Harris Corporation. The author has contributed to research in topics: Network topology & Sequential decoding. The author has an hindex of 7, co-authored 12 publications receiving 1259 citations.

Papers
More filters
Book
30 Jun 1981
TL;DR: This paper presents a meta-modelling architecture for Convolutional Code Structure and Viterbi Decoding, and some of the techniques used in this architecture can be applied to Group Codes and Block Codes.
Abstract: 1. Fundamental Concepts of Coding.- 2. Group Codes.- 3. Simple Nonalgebraic Decoding Techniques for Group Codes.- 4. Soft Decision Decoding of Block Codes.- 5. Algebraic Techniques for Multiple Error Correction.- 6. Convolutional Code Structure and Viterbi Decoding.- 7. Other Convolutional Decoding Techniques.- 8. System Applications.- Appendix A. Code Generators for BCH Codes.- Appendix B. Code Generators for Convolutional Codes.- B.1. Viterbi Decoding.- B.2. Table Look-up Decoding.- B.3. Threshold Decoding.- B.4. Sequential Decoding.- References.

1,208 citations

Proceedings ArticleDOI
01 Oct 1987
TL;DR: This paper presents an adaptive routing algorithm for a mid-course, space-based SDI architecture that provides rapid recovery from both predictable and unpredictable outages as well as load balancing.
Abstract: This paper presents an adaptive routing algorithm for a mid-course, space-based SDI architecture. The goals include rapid recovery from both predictable and unpredictable outages as well as load balancing. Robust operation is critical. The routing table update algorithm is distributed, and it produces loop-free routes from periodic topology update information. In addition, multiple routes are found from source to destination nodes. This allows load splitting among these routes to achieve more effective load balancing. A heuristic is used to distribute the load among these routes. The basic algorithm also provides a mechanism to provide path diversity for added survivability. Recovery from failures detected locally occurs immediately through the use of alternate routes and an event-driven failure recovery algorithm. Simulation results are presented to demonstrate the algorithm behavior.

21 citations

Proceedings ArticleDOI
01 Oct 1987
TL;DR: This paper examines the link assignment problem for a mid-course, space-based SDI architecture by implementing heuristics to allow "good" topologies to be found with a reasonable amount of computation.
Abstract: This paper examines the link assignment problem for a mid-course, space-based SDI architecture A network link assignment algorithm is responsible for determining the network connectivity by finding schedules for establishing and disconnecting high bandwidth satellite crosslinks that use directional antennas Our algorithm is designed to recover from predictable link outages as well as massive failures To minimize computational time complexity we are implementing heuristics to allow "good" topologies to be found with a reasonable amount of computation The algorithm is designed to emphasize robustness in stressed environments and therefore, to handle multiple failures In addition, if a massive outage disconnects the network into multiple islands that do not communicate, it always reconnects these islands into a single network when physically possible Initial simulation results are presented and future directions for this research are discussed

16 citations

Book ChapterDOI
01 Jan 1981
TL;DR: The codes and decoding techniques presented in the previous chapters apply only to block codes, where the information sequence is segmented into blocks which are encoded independently.
Abstract: The codes and decoding techniques presented in the previous chapters apply only to block codes. With these codes the information sequence is segmented into blocks which are encoded independently. Thus, the coded sequence becomes a sequence of fixed-length independent code words. This is not done with convolutional codes. Instead, redundant symbols are generated as a function of a span of preceding information symbols. The transmitted sequence is actually a single “semi-infinite” code word.

13 citations

Proceedings ArticleDOI
01 Oct 2007
TL;DR: This paper discusses the combination of a Directional Time Division Multiple Access (DTDMA) scheme implemented in a tactical radio with a directional antenna environment modeled within an OPNET simulated network to increase the throughput for network communications in a wireless environment.
Abstract: This paper discusses the combination of a Directional Time Division Multiple Access (DTDMA) scheme implemented in a tactical radio with a directional antenna environment modeled within an OPNET simulated network to increase the throughput for network communications in a wireless environment. A technique of allowing multiple communiations pairs to transmit simultaneous during a single timeslot is a key component of the High-band Network Waveform (HNW). We have implemented a high-fidelity data link layer and physical layer model of this implementation. Along with the DTDMA and directional antenna techniques, the model allows node communication pairs to dynamically adjust their data rates based on signal quality to provide the maximum throughput efficiency along a data link. This waveform model also allows allocation of link capacity as needed on each link to provide bandwidth on demand (BOD). The discussion covers the expected benefits and the implementation as modeled in OPNET.

11 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Using log-likelihood algebra, it is shown that any decoder can be used which accepts soft inputs-including a priori values-and delivers soft outputs that can be split into three terms: the soft channel and aPriori inputs, and the extrinsic value.
Abstract: Iterative decoding of two-dimensional systematic convolutional codes has been termed "turbo" (de)coding. Using log-likelihood algebra, we show that any decoder can be used which accepts soft inputs-including a priori values-and delivers soft outputs that can be split into three terms: the soft channel and a priori inputs, and the extrinsic value. The extrinsic value is used as an a priori value for the next iteration. Decoding algorithms in the log-likelihood domain are given not only for convolutional codes but also for any linear binary systematic block code. The iteration is controlled by a stop criterion derived from cross entropy, which results in a minimal number of iterations. Optimal and suboptimal decoders with reduced complexity are presented. Simulation results show that very simple component codes are sufficient, block codes are appropriate for high rates and convolutional codes for lower rates less than 2/3. Any combination of block and convolutional component codes is possible. Several interleaving techniques are described. At a bit error rate (BER) of 10/sup -4/ the performance is slightly above or around the bounds given by the cutoff rate for reasonably simple block/convolutional component codes, interleaver sizes less than 1000 and for three to six iterations.

2,632 citations

Journal ArticleDOI
TL;DR: A generalization of the convex hull of a finite set of points in the plane leads to a family of straight-line graphs, "alpha -shapes," which seem to capture the intuitive notions of "fine shape" and "crude shape" of point sets.
Abstract: A generalization of the convex hull of a finite set of points in the plane is introduced and analyzed. This generalization leads to a family of straight-line graphs, " \alpha -shapes," which seem to capture the intuitive notions of "fine shape" and "crude shape" of point sets. It is shown that a-shapes are subgraphs of the closest point or furthest point Delaunay triangulation. Relying on this result an optimal O(n \log n) algorithm that constructs \alpha -shapes is developed.

1,648 citations

Journal ArticleDOI
TL;DR: A class of nonlinear estimation algorithms is described to estimate the unknown phase of a carrier which is fully modulated by m -ary PSK modulation, and the effect of quantization and finite read-only-memory implementation of the nonlinearity are determined by computer simulation.
Abstract: Burst transmission of digital data and voice has become commonplace, particularly in satellite communication systems employing time-division multiple-access (TI)MA) and packet demand-assignment multiple-access (DAMA) techniques. In TDMA systems particularly, phase estimation on each successive burst is a requirement, while bit timing and carrier frequency can be accurately tracked between bursts. A class of nonlinear estimation algorithms is described to estimate the unknown phase of a carrier which is fully modulated by m -ary PSK modulation. Performance of the method is determined in closed form and compared to the Cramer-Rao lower bound for the variance of the estimation error in the phase of an unmodulated carrier. Results are also obtained when the carrier frequency is imprecisely known. Finally, the effect of quantization and finite read-only-memory (ROM) implementation of the nonlinearity are determined by computer simulation.

1,116 citations

Journal ArticleDOI
G. Ungerboeck1
TL;DR: An introduction into TCM is given, reasons for the development of TCM are reviewed, and examples of simple TCM schemes are discussed.
Abstract: rellis-Coded Modulation (TCM) has evolved over the past decade as a combined coding and modulation technique for digital transmission over band-limited channels. Its main attraction comes from the fact that it allows the achievement of significant coding gains over conventional uncoded multilevel modulation without compromising bandwidth efficiency. T h e first TCM schemes were proposed in 1976 [I]. Following a more detailed publication [2] in 1982, an explosion of research and actual implementations of TCM took place, to the point where today there is a good understanding of the theory and capabilities of TCM methods. In Part 1 of this two-part article, an introduction into TCM is given. T h e reasons for the development of TCM are reviewed, and examples of simple TCM schemes are discussed. Part I1 [I51 provides further insight into code design and performance, and addresses. recent advances in TCM. TCM schemes employ redundant nonbinary modulation in combination with a finite-state encoder which governs the selection of modulation signals to generate coded signal sequences. In the receiver, the noisy signals are decoded by a soft-decision maximum-likelihood sequence decoder. Simple four-state TCM schemes can improve. the robustness of digital transmission against additive noise by 3 dB, compared to conventional , uncoded modulation. With more complex TCM schemes, the coding gain can reach 6 dB or more. These gains are obtained without bandwidth expansion or reduction of the effective information rate as required by traditional error-correction schemes. Shannon's information theory predicted the existence of coded modulation schemes with these characteristics more than three decades ago. T h e development of effective TCM techniques and today's signal-processing technology now allow these ,gains to be obtained in practice. Signal waveforms representing information sequences ~ are most impervious to noise-induced detection errors if they are very different from each other. Mathematically, this translates into therequirement that signal sequences should have large distance in Euclidean signal space. ~ T h e essential new concept of TCM that led to the afore-1 mentioned gains was to use signal-set expansion to I provide redundancy for coding, and to design coding and ' signal-mapping functions jointly so as to maximize ~ directly the \" free distance \" (minimum Euclidean distance) between coded signal sequences. This allowed the construction of modulation codes whose free distance significantly exceeded the minimum distance between uncoded modulation signals, at the same information rate, bandwidth, and signal power. The term \" …

874 citations