首页 > 最新文献

2020 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
Recursive Trellis Decoding Techniques of Polar Codes 极坐标码的递归网格译码技术
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174282
P. Trifonov
Recursive trellis decoding of polar codes is considered. Polar codes are shown to have much lower recursive trellis decoding complexity compared to similar Reed-Muller codes. Furthermore, a low-latency decoding algorithm, which combines recursive trellis and successive cancellation decoding methods, is presented.
研究了极坐标码的递归网格译码。与相似的Reed-Muller编码相比,Polar编码具有更低的递归网格解码复杂度。在此基础上,提出了一种结合递归网格和逐次消去解码方法的低延迟解码算法。
{"title":"Recursive Trellis Decoding Techniques of Polar Codes","authors":"P. Trifonov","doi":"10.1109/ISIT44484.2020.9174282","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174282","url":null,"abstract":"Recursive trellis decoding of polar codes is considered. Polar codes are shown to have much lower recursive trellis decoding complexity compared to similar Reed-Muller codes. Furthermore, a low-latency decoding algorithm, which combines recursive trellis and successive cancellation decoding methods, is presented.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114777905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distribution Privacy Under Function Recoverability 函数可恢复性下的分布隐私
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174389
Ajaykrishnan Nageswaran, P. Narayan
A user generates n independent and identically distributed data random variables with a probability mass function that must be guarded from a querier. The querier must recover, with a prescribed accuracy, a given function of the data from each of n independent and identically distributed user-devised query responses. The user chooses the data pmf and the random query responses to maximize distribution privacy as gauged by the divergence between the pmf and the querier's best estimate of it based on the n query responses. A general lower bound is provided for distribution privacy; and, for the case of binaryvalued functions, upper and lower bounds that converge to said bound as n grows. Explicit strategies for the user and querier are identified.
用户生成n个独立且分布相同的数据随机变量,这些变量具有一个概率质量函数,必须对查询器进行保护。查询程序必须以规定的精度从n个独立且相同分布的用户设计的查询响应中的每一个中恢复给定的数据函数。用户选择数据pmf和随机查询响应来最大化分布隐私,这是通过pmf与查询者基于n个查询响应的最佳估计之间的差异来衡量的。给出了分布隐私的一般下界;对于二值函数,随着n的增长,上界和下界收敛于上述边界。确定了用户和查询器的显式策略。
{"title":"Distribution Privacy Under Function Recoverability","authors":"Ajaykrishnan Nageswaran, P. Narayan","doi":"10.1109/ISIT44484.2020.9174389","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174389","url":null,"abstract":"A user generates n independent and identically distributed data random variables with a probability mass function that must be guarded from a querier. The querier must recover, with a prescribed accuracy, a given function of the data from each of n independent and identically distributed user-devised query responses. The user chooses the data pmf and the random query responses to maximize distribution privacy as gauged by the divergence between the pmf and the querier's best estimate of it based on the n query responses. A general lower bound is provided for distribution privacy; and, for the case of binaryvalued functions, upper and lower bounds that converge to said bound as n grows. Explicit strategies for the user and querier are identified.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124632022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Universal Data Compression Scheme based on the AIVF Coding Techniques 基于AIVF编码技术的通用数据压缩方案
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9173982
Hirosuke Yamamoto, Koki Imaeda, Kengo Hashimoto, K. Iwata
In the entropy coding, AIVF (almost instantaneous variable-to-fixed length) codes using multiple parsing trees can attain a better compression rate than the Tunstall code, which attains the best compression rate in the class of VF codes with a single parsing tree. Furthermore, the multiple parsing trees of an AIVF code can be multiplexed into a single parsing tree. In this paper, we propose a new universal data compression code based on the techniques of the AIVF code. The proposed universal code can also be considered as an improvement of the LZW code (Welch code). We explain how the AIVF coding techniques can be applied to universal coding by growing dynamically a single parsing tree, and we evaluate the compression rate of the proposed universal code theoretically and using several corpora.
在熵编码中,使用多个解析树的AIVF(几乎瞬时变到定长)码比使用单个解析树的Tunstall码获得更好的压缩率,后者在该类VF码中获得了最好的压缩率。此外,AIVF代码的多个解析树可以复用为一个解析树。本文在AIVF码技术的基础上,提出了一种新的通用数据压缩码。建议的通用代码也可以被认为是对LZW代码(韦尔奇代码)的改进。我们解释了AIVF编码技术如何通过动态增长单个解析树来应用于通用编码,并从理论上和使用几个语料库评估了所提出的通用编码的压缩率。
{"title":"A Universal Data Compression Scheme based on the AIVF Coding Techniques","authors":"Hirosuke Yamamoto, Koki Imaeda, Kengo Hashimoto, K. Iwata","doi":"10.1109/ISIT44484.2020.9173982","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9173982","url":null,"abstract":"In the entropy coding, AIVF (almost instantaneous variable-to-fixed length) codes using multiple parsing trees can attain a better compression rate than the Tunstall code, which attains the best compression rate in the class of VF codes with a single parsing tree. Furthermore, the multiple parsing trees of an AIVF code can be multiplexed into a single parsing tree. In this paper, we propose a new universal data compression code based on the techniques of the AIVF code. The proposed universal code can also be considered as an improvement of the LZW code (Welch code). We explain how the AIVF coding techniques can be applied to universal coding by growing dynamically a single parsing tree, and we evaluate the compression rate of the proposed universal code theoretically and using several corpora.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124958109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Explicit and Efficient Constructions of Coding Schemes for the Binary Deletion Channel 二值删除信道编码方案的显式高效构造
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9173977
Roni Con, Amir Shpilka
In the binary deletion channel with parameter p (BDCp) every bit is deleted independently with probability p. [1] proved a lower bound of (1−p)/9 on the capacity of the BDCp, yet currently no explicit construction achieves this rate. In this work we give an explicit family of codes of rate (1 −p)/16, for every p. This improves upon the work of Guruswami and Li [2] that gave a construction of rate (1−p)/120. The codes in our family have polynomial time encoding and decoding algorithms.
在参数为p的二进制删除通道(BDCp)中,每一位都以p的概率独立删除。[1]证明了BDCp容量的下界为(1−p)/9,但目前还没有明确的构造达到这个速率。在这项工作中,我们给出了每p的率(1−p)/ 16的显式编码族。这改进了Guruswami和Li[2]的工作,他们给出了率(1−p)/120的构造。我们家族的代码具有多项式时间的编码和解码算法。
{"title":"Explicit and Efficient Constructions of Coding Schemes for the Binary Deletion Channel","authors":"Roni Con, Amir Shpilka","doi":"10.1109/ISIT44484.2020.9173977","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9173977","url":null,"abstract":"In the binary deletion channel with parameter p (BDCp) every bit is deleted independently with probability p. [1] proved a lower bound of (1−p)/9 on the capacity of the BDCp, yet currently no explicit construction achieves this rate. In this work we give an explicit family of codes of rate (1 −p)/16, for every p. This improves upon the work of Guruswami and Li [2] that gave a construction of rate (1−p)/120. The codes in our family have polynomial time encoding and decoding algorithms.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124561540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Capacity Region of the Gaussian Arbitrarily-Varying Broadcast Channel 高斯任意变广播信道的容量区域
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174108
Fatemeh Hosseinigoki, O. Kosut
This paper considers the two-user Gaussian arbitrarily-varying broadcast channel, wherein a power-limited transmitter wishes to send a message to each of two receivers. Each receiver sees a superposition of the transmitter's sequence, Gaussian noise, and a signal from a power-limited malicious jammer. The jammer is assumed to know the code, but is oblivious to real-time transmissions. The exact capacity region of this setting is determined to be the capacity region of the standard Gaussian broadcast channel, but with the noise variance increased by the power of the jammer, as long as the received power of the jammer at each receiver is less than that of the legitimate transmitter. A key aspect of the achievable scheme involves sharing randomness from the transmitter to the receivers by breaking the transmitted sequence into segments, and either transmitting at full power in a segment, or sending zero. By coding over the on/off signal, a small shared randomness can be established without corruption by the jammer, and without interfering with the standard superposition coding strategy for the Gaussian broadcast channel.
本文考虑了两用户高斯任意变化广播信道,其中功率有限的发射机希望向两个接收机中的每一个发送消息。每个接收器都看到发射器序列、高斯噪声和来自功率有限的恶意干扰机的信号的叠加。干扰机被认为知道密码,但对实时传输一无所知。该设置的准确容量区域确定为标准高斯广播信道的容量区域,但噪声方差随干扰机功率的增加而增加,只要每个接收机的干扰机接收功率小于合法发射机的接收功率即可。可实现方案的一个关键方面是通过将传输序列分成段,或者在一段中以全功率发送,或者零发送,从发送端到接收端共享随机性。通过对开/关信号进行编码,可以在不受干扰器破坏的情况下建立一个小的共享随机性,并且不会干扰高斯广播信道的标准叠加编码策略。
{"title":"Capacity Region of the Gaussian Arbitrarily-Varying Broadcast Channel","authors":"Fatemeh Hosseinigoki, O. Kosut","doi":"10.1109/ISIT44484.2020.9174108","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174108","url":null,"abstract":"This paper considers the two-user Gaussian arbitrarily-varying broadcast channel, wherein a power-limited transmitter wishes to send a message to each of two receivers. Each receiver sees a superposition of the transmitter's sequence, Gaussian noise, and a signal from a power-limited malicious jammer. The jammer is assumed to know the code, but is oblivious to real-time transmissions. The exact capacity region of this setting is determined to be the capacity region of the standard Gaussian broadcast channel, but with the noise variance increased by the power of the jammer, as long as the received power of the jammer at each receiver is less than that of the legitimate transmitter. A key aspect of the achievable scheme involves sharing randomness from the transmitter to the receivers by breaking the transmitted sequence into segments, and either transmitting at full power in a segment, or sending zero. By coding over the on/off signal, a small shared randomness can be established without corruption by the jammer, and without interfering with the standard superposition coding strategy for the Gaussian broadcast channel.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125249822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hypergraph-based Coding Schemes for Two Source Coding Problems under Maximal Distortion 两种最大失真源编码问题的超图编码方案
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174396
Sourya Basu, Daewon Seo, L. Varshney
We consider two problems in multiterminal source coding under maximal distortion: distributed coding for computing and successive refinement. In distributed coding for computing, we propose a hypergraph-based coding scheme which matches the sum-rate bound of the Berger-Tung inner bound. Further, this scheme matches the entire Berger-Tung inner region when the sources are independent and it outperforms existing graph-based coding schemes. For successive refinement, we propose a hypergraph-based scheme that attains the entire rate region.
研究了最大失真条件下多端信源编码的两个问题:分布式编码计算和逐次细化。在计算分布式编码中,我们提出了一种基于超图的编码方案,该方案匹配Berger-Tung内界的和率界。此外,当源独立时,该方案匹配整个Berger-Tung内区域,并且优于现有的基于图的编码方案。对于连续改进,我们提出了一个基于超图的方案,以获得整个速率区域。
{"title":"Hypergraph-based Coding Schemes for Two Source Coding Problems under Maximal Distortion","authors":"Sourya Basu, Daewon Seo, L. Varshney","doi":"10.1109/ISIT44484.2020.9174396","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174396","url":null,"abstract":"We consider two problems in multiterminal source coding under maximal distortion: distributed coding for computing and successive refinement. In distributed coding for computing, we propose a hypergraph-based coding scheme which matches the sum-rate bound of the Berger-Tung inner bound. Further, this scheme matches the entire Berger-Tung inner region when the sources are independent and it outperforms existing graph-based coding schemes. For successive refinement, we propose a hypergraph-based scheme that attains the entire rate region.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123332417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
When does Partial Noisy Feedback Enlarge the Capacity of a Gaussian Broadcast Channel? 部分噪声反馈何时增大高斯广播信道的容量?
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174173
Aditya Narayan Ravi, S. R. Pillai, V. Prabhakaran, M. Wigger
Feedback is known to enlarge the capacity region of a Gaussian Broadcast Channel (GBC) with independent noise realizations at the receivers, and an average power constraint at the transmitter. The capacity enlargement may occur even when there is noisy feedback from only one of the two receivers. However, recent results show the existence of a feedback noise threshold, beyond which one-sided feedback from only the stronger receiver is futile in enlarging the capacity region. The current paper presents a tight characterization of the feedback noise threshold, which separates the regimes where feedback from only the stronger receiver enlarges the capacity or leaves it unchanged. The scheme used to prove this result also leads to some interesting observations on noisy feedback from only the weak receiver.
已知反馈可以扩大高斯广播信道(GBC)的容量区域,接收器具有独立的噪声实现,发射器具有平均功率约束。即使只有来自两个接收器中的一个的噪声反馈,也可能发生容量增大。然而,最近的结果表明存在一个反馈噪声阈值,超过这个阈值,仅来自较强的接收器的片面反馈对于扩大容量区域是无效的。目前的论文提出了反馈噪声阈值的一个严格的特征,它区分了只有来自较强的接收器的反馈增大容量或保持容量不变的制度。用于证明这一结果的方案也导致了一些有趣的观察,仅从弱接收器的噪声反馈。
{"title":"When does Partial Noisy Feedback Enlarge the Capacity of a Gaussian Broadcast Channel?","authors":"Aditya Narayan Ravi, S. R. Pillai, V. Prabhakaran, M. Wigger","doi":"10.1109/ISIT44484.2020.9174173","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174173","url":null,"abstract":"Feedback is known to enlarge the capacity region of a Gaussian Broadcast Channel (GBC) with independent noise realizations at the receivers, and an average power constraint at the transmitter. The capacity enlargement may occur even when there is noisy feedback from only one of the two receivers. However, recent results show the existence of a feedback noise threshold, beyond which one-sided feedback from only the stronger receiver is futile in enlarging the capacity region. The current paper presents a tight characterization of the feedback noise threshold, which separates the regimes where feedback from only the stronger receiver enlarges the capacity or leaves it unchanged. The scheme used to prove this result also leads to some interesting observations on noisy feedback from only the weak receiver.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128873818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Poisson channel with binary Markov input and average sojourn time constraint 具有二进制马尔可夫输入和平均停留时间约束的泊松信道
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174360
Mark Sinzger, Maximilian Gehri, H. Koeppl
A minimal model for gene expression, consisting of a switchable promoter together with the resulting messenger RNA, is equivalent to a Poisson channel with a binary Markovian input process. Determining its capacity is an optimization problem with respect to two parameters: the average sojourn times of the promoter’s active (ON) and inactive (OFF) state. An expression for the mutual information is found by exploiting the link with filtering theory. For fixed peak power, three bandwidth-like constraints are imposed by lower-bounding (i) the average sojourn times (ii) the autocorrelation time and (iii) the average time until a transition. OFF-favoring optima are found for all three constraints, as commonly encountered for the Poisson channel. In addition, constraint (i) exhibits a region that favors the ON state, and (iii) shows ON-favoring local optima.
一个最小的基因表达模型,由一个可切换的启动子和由此产生的信使RNA组成,相当于一个具有二进制马尔可夫输入过程的泊松通道。确定其容量是一个关于两个参数的优化问题:启动子的活动(ON)和非活动(OFF)状态的平均逗留时间。利用与过滤理论的联系,找到了互信息的表达式。对于固定的峰值功率,三个类似带宽的约束由下限施加(i)平均逗留时间(ii)自相关时间和(iii)平均时间直到过渡。对于所有三个约束都找到了有利于off的最优值,这与泊松通道中经常遇到的情况一样。此外,约束(i)显示了一个有利于ON状态的区域,约束(iii)显示了一个有利于ON的局部最优。
{"title":"Poisson channel with binary Markov input and average sojourn time constraint","authors":"Mark Sinzger, Maximilian Gehri, H. Koeppl","doi":"10.1109/ISIT44484.2020.9174360","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174360","url":null,"abstract":"A minimal model for gene expression, consisting of a switchable promoter together with the resulting messenger RNA, is equivalent to a Poisson channel with a binary Markovian input process. Determining its capacity is an optimization problem with respect to two parameters: the average sojourn times of the promoter’s active (ON) and inactive (OFF) state. An expression for the mutual information is found by exploiting the link with filtering theory. For fixed peak power, three bandwidth-like constraints are imposed by lower-bounding (i) the average sojourn times (ii) the autocorrelation time and (iii) the average time until a transition. OFF-favoring optima are found for all three constraints, as commonly encountered for the Poisson channel. In addition, constraint (i) exhibits a region that favors the ON state, and (iii) shows ON-favoring local optima.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128755752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Iterative Decoding of Non-Binary Cyclic Codes Using Minimum-Weight Dual Codewords 基于最小权对偶码字的非二进制循环码迭代译码
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174258
Jiongyue Xing, M. Bossert, Sebastian Bitzer, Li Chen
This paper proposes a novel shift-sum decoding scheme for non-binary cyclic codes. Using minimum-weight dual codewords and their cyclic shifts, a reliability measure can be yielded as an indicator for the error position and the error magnitude. Based on this shift-sum decoding concept, a harddecision iterative decoding algorithm is proposed, which can correct errors beyond half of the code’s minimum Hamming distance. By utilizing reliability information from the channel, a soft-decision iterative decoding algorithm is further introduced to improve the decoding performance. These two shift-sum based iterative decoding algorithms are realized with polynomial multiplication and integer (or real number) comparisons, which are hardware-friendly. Simulation results on Reed-Solomon codes and non-binary BCH codes show the decoding potential of the proposed algorithms.
提出了一种新的非二进制循环码的移位和译码方案。利用最小权值双码字及其循环位移,可以得到一个可靠度度量,作为误差位置和误差大小的指示器。基于这种移位和译码的概念,提出了一种硬判决迭代译码算法,该算法可以修正码最小汉明距离一半以上的错误。利用信道的可靠性信息,进一步引入软判决迭代译码算法,提高译码性能。这两种基于移位和的迭代译码算法采用多项式乘法和整数(或实数)比较实现,硬件友好。对Reed-Solomon码和非二进制BCH码的仿真结果表明了所提算法的译码潜力。
{"title":"Iterative Decoding of Non-Binary Cyclic Codes Using Minimum-Weight Dual Codewords","authors":"Jiongyue Xing, M. Bossert, Sebastian Bitzer, Li Chen","doi":"10.1109/ISIT44484.2020.9174258","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174258","url":null,"abstract":"This paper proposes a novel shift-sum decoding scheme for non-binary cyclic codes. Using minimum-weight dual codewords and their cyclic shifts, a reliability measure can be yielded as an indicator for the error position and the error magnitude. Based on this shift-sum decoding concept, a harddecision iterative decoding algorithm is proposed, which can correct errors beyond half of the code’s minimum Hamming distance. By utilizing reliability information from the channel, a soft-decision iterative decoding algorithm is further introduced to improve the decoding performance. These two shift-sum based iterative decoding algorithms are realized with polynomial multiplication and integer (or real number) comparisons, which are hardware-friendly. Simulation results on Reed-Solomon codes and non-binary BCH codes show the decoding potential of the proposed algorithms.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131034096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Delay-Optimal Coding for Secure Transmission over Parallel Burst Erasure Channels with an Eavesdropper 带窃听器的并行突发擦除信道安全传输延迟最优编码
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174235
Anna Frank
For streaming applications, we consider parallel burst erasure channels in the presence of an eavesdropper. The legitimate receiver must perfectly recover each source symbol subject to a decoding delay constraint without the eavesdropper gaining any information from his observation. For a certain class of code parameters, we propose delay-optimal M-link codes that recover multiple bursts of erasures of a limited length, and where the codes provide perfect security even if the eavesdropper can observe a link of his choice. Our codes achieve the maximum secrecy rate for the channel model.
对于流媒体应用,我们考虑在窃听器存在的情况下并行突发擦除信道。合法的接收方必须在解码延迟约束下完全恢复每个源符号,而窃听者不能从他的观察中获得任何信息。对于一类特定的码参数,我们提出了延迟最优的m -链路码,该码可以恢复有限长度的多次擦除,并且即使窃听者可以观察到他所选择的链路,该码也可以提供完美的安全性。我们的代码实现了信道模型的最大保密率。
{"title":"Delay-Optimal Coding for Secure Transmission over Parallel Burst Erasure Channels with an Eavesdropper","authors":"Anna Frank","doi":"10.1109/ISIT44484.2020.9174235","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174235","url":null,"abstract":"For streaming applications, we consider parallel burst erasure channels in the presence of an eavesdropper. The legitimate receiver must perfectly recover each source symbol subject to a decoding delay constraint without the eavesdropper gaining any information from his observation. For a certain class of code parameters, we propose delay-optimal M-link codes that recover multiple bursts of erasures of a limited length, and where the codes provide perfect security even if the eavesdropper can observe a link of his choice. Our codes achieve the maximum secrecy rate for the channel model.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131137381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1