首页 > 最新文献

2012 IEEE Information Theory Workshop最新文献

英文 中文
Gaussian wiretap channel with an amplitude constraint 具有振幅约束的高斯窃听通道
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404643
Omur Ozel, E. Ekrem, S. Ulukus
We consider the Gaussian wiretap channel with an amplitude constraint, i.e., a peak power constraint, on the channel input. We show that the entire rate-equivocation region of the Gaussian wiretap channel with an amplitude constraint is obtained by discrete input distributions with finite support. We prove this result by considering the existing single-letter description of the rate-equivocation region, and showing that discrete distributions with finite support exhaust this region. Our result highlights an important difference between the peak power constraint and the average power constraint cases: Although, in the average power constraint case, both the secrecy capacity and the capacity can be achieved simultaneously, our results show that in the peak power constraint case, in general, there is a tradeoff between the secrecy capacity and the capacity, in the sense that, both may not be achieved simultaneously.
我们考虑具有幅度约束的高斯窃听通道,即通道输入上的峰值功率约束。我们证明了具有振幅约束的高斯窃听信道的整个速率模糊区域是由有限支持的离散输入分布获得的。考虑到现有的速率模糊区域的单字母描述,我们证明了这一结果,并表明具有有限支持的离散分布耗尽了该区域。我们的结果突出了峰值功率约束和平均功率约束情况之间的一个重要区别:尽管在平均功率约束情况下,保密能力和容量可以同时实现,但我们的结果表明,在峰值功率约束情况下,一般来说,保密能力和容量之间存在权衡,即两者可能无法同时实现。
{"title":"Gaussian wiretap channel with an amplitude constraint","authors":"Omur Ozel, E. Ekrem, S. Ulukus","doi":"10.1109/ITW.2012.6404643","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404643","url":null,"abstract":"We consider the Gaussian wiretap channel with an amplitude constraint, i.e., a peak power constraint, on the channel input. We show that the entire rate-equivocation region of the Gaussian wiretap channel with an amplitude constraint is obtained by discrete input distributions with finite support. We prove this result by considering the existing single-letter description of the rate-equivocation region, and showing that discrete distributions with finite support exhaust this region. Our result highlights an important difference between the peak power constraint and the average power constraint cases: Although, in the average power constraint case, both the secrecy capacity and the capacity can be achieved simultaneously, our results show that in the peak power constraint case, in general, there is a tradeoff between the secrecy capacity and the capacity, in the sense that, both may not be achieved simultaneously.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114241721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
On the estimation of entropy for unknown support size 未知支撑尺寸下的熵估计
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404729
Steffen Schober, Ahmed S. Mansour
We consider the problem of estimating the entropy of a distribution P of unknown support size N provided with k independently drawn samples, where we are mainly focused on the low sampling regime where k <; N. By extending a method of Hausser and Strimmer [1], which assumes a known support size, by using the support size estimator of Chao and Lee [2], we obtain a simple estimator that performs equally good as the methods of Nemenman, Shafee, and Bialek [3] and Chao and Chen [4].
我们考虑一个未知支持大小N的分布P的熵估计问题,提供k个独立绘制的样本,其中我们主要关注k <;N.通过扩展Hausser和Strimmer[1]的方法,假设支持大小已知,使用Chao和Lee[2]的支持大小估计量,我们得到了一个简单的估计量,其性能与Nemenman, Shafee, and Bialek[3]和Chao和Chen[4]的方法一样好。
{"title":"On the estimation of entropy for unknown support size","authors":"Steffen Schober, Ahmed S. Mansour","doi":"10.1109/ITW.2012.6404729","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404729","url":null,"abstract":"We consider the problem of estimating the entropy of a distribution P of unknown support size N provided with k independently drawn samples, where we are mainly focused on the low sampling regime where k <; N. By extending a method of Hausser and Strimmer [1], which assumes a known support size, by using the support size estimator of Chao and Lee [2], we obtain a simple estimator that performs equally good as the methods of Nemenman, Shafee, and Bialek [3] and Chao and Chen [4].","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117321594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Equivocations for the simple substitution cipher with erasure-prone ciphertext 带有易擦除密文的简单替换密码的歧义
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404752
Willie K. Harrison, S. McLaughlin
In this paper, we analyze an attack scenario for the simple substitution cipher using the wiretap channel model, where the attacker only has access to error-prone ciphertext at the output of a packet erasure channel (PEC). Each packet is comprised of exactly one symbol of ciphertext, and hence, the attacker's channel could be viewed as a symbol erasure channel. Information-theoretic cryptanalysis provides key and message equivocations for the cipher in general, and then gives the results as functions of the error-free ciphertext equivocations. The findings characterize the increase in equivocation that might be expected if encrypted data were further encoded using wiretap codes that introduce symbol erasures to passive eavesdroppers.
在本文中,我们分析了使用窃听信道模型的简单替代密码的攻击场景,其中攻击者只能访问包擦除信道(PEC)输出处容易出错的密文。每个包只由一个密文符号组成,因此,攻击者的通道可以被视为一个符号擦除通道。信息论密码分析通常为密码提供密钥和消息模糊,然后将结果作为无差错密文模糊的函数给出。研究结果表明,如果使用窃听代码对加密数据进行进一步编码,从而向被动窃听者引入符号擦除,可能会导致含糊其辞的增加。
{"title":"Equivocations for the simple substitution cipher with erasure-prone ciphertext","authors":"Willie K. Harrison, S. McLaughlin","doi":"10.1109/ITW.2012.6404752","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404752","url":null,"abstract":"In this paper, we analyze an attack scenario for the simple substitution cipher using the wiretap channel model, where the attacker only has access to error-prone ciphertext at the output of a packet erasure channel (PEC). Each packet is comprised of exactly one symbol of ciphertext, and hence, the attacker's channel could be viewed as a symbol erasure channel. Information-theoretic cryptanalysis provides key and message equivocations for the cipher in general, and then gives the results as functions of the error-free ciphertext equivocations. The findings characterize the increase in equivocation that might be expected if encrypted data were further encoded using wiretap codes that introduce symbol erasures to passive eavesdroppers.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126448624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bit-fixing codes for multi-level cells 用于多级单元的位固定代码
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404669
Anxiao Jiang, Yue Li, Jehoshua Bruck
Codes that correct limited-magnitude errors for multi-level cell nonvolatile memories, such as flash memories and phase-change memories, have received interest in recent years. This work proposes a new coding scheme that generalizes a known result [2] and works for arbitrary error distributions. In this scheme, every cell's discrete level ℓ is mapped to its binary representation (bm-1, ..., b1,b0), where the m bits belong to m different error-correcting codes. The error ε in a cell is mapped to its binary representation (em-1, ..., e1, e0), and the codes are designed such that every error bit ei only affects the codeword containing the data bit bi. The m codewords are decoded sequentially to correct the bit-errors e0,e1, ..., em-1 in order. The scheme can be generalized to many more numeral systems for cell levels and errors, optimized cell-level labelings, and any number of cell levels. It can be applied not only to storage but also to amplitude-modulation communication systems.
近年来,对多单元非易失性存储器(如快闪存储器和相变存储器)的有限幅度误差进行校正的编码引起了人们的兴趣。这项工作提出了一种新的编码方案,可以泛化已知结果[2],并适用于任意误差分布。在这个方案中,每一个单元的离散级r被映射到它的二进制表示(bm-1,…, b1,b0),其中m位分别属于m个不同的纠错码。单元格中的误差ε被映射到它的二进制表示(em-1,…, e1, e0),并且代码的设计使得每个错误位ei只影响包含数据位bi的码字。m个码字依次解码,以纠正误码e0,e1,…, em-1的顺序。该方案可以推广到许多更多的细胞水平和错误的数字系统,优化的细胞水平标记,和任何数量的细胞水平。它不仅可以应用于存储系统,还可以应用于调幅通信系统。
{"title":"Bit-fixing codes for multi-level cells","authors":"Anxiao Jiang, Yue Li, Jehoshua Bruck","doi":"10.1109/ITW.2012.6404669","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404669","url":null,"abstract":"Codes that correct limited-magnitude errors for multi-level cell nonvolatile memories, such as flash memories and phase-change memories, have received interest in recent years. This work proposes a new coding scheme that generalizes a known result [2] and works for arbitrary error distributions. In this scheme, every cell's discrete level ℓ is mapped to its binary representation (b<sub>m-1</sub>, ..., b<sub>1</sub>,b<sub>0</sub>), where the m bits belong to m different error-correcting codes. The error ε in a cell is mapped to its binary representation (e<sub>m-1</sub>, ..., e<sub>1</sub>, e<sub>0</sub>), and the codes are designed such that every error bit ei only affects the codeword containing the data bit b<sub>i</sub>. The m codewords are decoded sequentially to correct the bit-errors e<sub>0</sub>,e<sub>1</sub>, ..., e<sub>m-1</sub> in order. The scheme can be generalized to many more numeral systems for cell levels and errors, optimized cell-level labelings, and any number of cell levels. It can be applied not only to storage but also to amplitude-modulation communication systems.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128831197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multilevel 2-cell t-write codes 多级2单元t-write代码
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404668
A. Bhatia, Aravind R. Iyengar, P. Siegel
We consider t-write codes for write-once memories with cells that can store multiple levels. Using worst-case sum-rate optimal 2-cell t-write code constructions for the asymptotic case of continuous levels, we derive 2-cell t-write code constructions that give good sum-rates for cells that support q discrete levels. A general encoding scheme for q-level 2-cell t-write codes is provided.
我们将t-write代码用于一次性写入存储器,这些存储器具有可存储多个级别的单元格。对于连续水平的渐近情况,我们使用最坏情况和速率最优2-cell t-write代码结构,我们推导出2-cell t-write代码结构,为支持q个离散水平的细胞提供良好的和速率。给出了q级2单元t-write码的通用编码方案。
{"title":"Multilevel 2-cell t-write codes","authors":"A. Bhatia, Aravind R. Iyengar, P. Siegel","doi":"10.1109/ITW.2012.6404668","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404668","url":null,"abstract":"We consider t-write codes for write-once memories with cells that can store multiple levels. Using worst-case sum-rate optimal 2-cell t-write code constructions for the asymptotic case of continuous levels, we derive 2-cell t-write code constructions that give good sum-rates for cells that support q discrete levels. A general encoding scheme for q-level 2-cell t-write codes is provided.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128858641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
MIDO space-time codes from associative and nonassociative cyclic algebras 结合与非结合循环代数的MIDO空时码
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404655
A. Steele, S. Pumplün, F. Oggier
Nonassociative division algebras have been recently proposed as an alternative way to design fully-diverse space-time codes. In particular, nonassociative cyclic algebras provide division algebras more easily than their associative counter-part. In this paper, we propose a few space-time code constructions coming from both associative and nonassociative cyclic algebras of degree 4, suitable for 4 transmit and 2 receive antennas, which furthermore exhibit good fast-decodability.
非关联除法代数最近被提出作为设计完全不同的空时编码的一种替代方法。特别是,非结合循环代数比其结合循环代数更容易提供除法代数。本文提出了几种适用于4个发射天线和2个接收天线的4次结合和非结合循环代数的空时码结构,并且具有良好的快速可译码性。
{"title":"MIDO space-time codes from associative and nonassociative cyclic algebras","authors":"A. Steele, S. Pumplün, F. Oggier","doi":"10.1109/ITW.2012.6404655","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404655","url":null,"abstract":"Nonassociative division algebras have been recently proposed as an alternative way to design fully-diverse space-time codes. In particular, nonassociative cyclic algebras provide division algebras more easily than their associative counter-part. In this paper, we propose a few space-time code constructions coming from both associative and nonassociative cyclic algebras of degree 4, suitable for 4 transmit and 2 receive antennas, which furthermore exhibit good fast-decodability.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124148982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Lattice coding for multiple access channels with common message and additive interference 具有公共消息和加性干扰的多址信道的点阵编码
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404705
Mohammad Farzad Pourbabaee, M. Emadi, Arash Gholami Davoodi, M. Aref
In this paper, lattice based coding is used over two-user Gaussian state-dependent multiple access channel with common message for two channel models. First, it is assumed that the additive channel interference is noncausally known at both encoders. Exploiting a lattice encoding and decoding scheme, the effect of the interference is completely removed and the capacity region is achieved. Then, the multiple access channel with two additive interferences is considered in the case, where each interference is known noncausally to the associated transmitter. A pure lattice based encoding and decoding structure is proposed and an inner bound on the capacity region is derived which is valid for the entire range of channel signal to noise ratio and powers of interferences.
本文将基于点阵的编码应用于两用户高斯状态相关的多址信道中,并对两信道模型进行了公共消息处理。首先,假定在两个编码器上加性信道干扰是非因果已知的。利用点阵编码和解码方案,完全消除了干扰的影响,实现了容量区域。然后,考虑具有两个加性干扰的多址信道,其中每个干扰对相关发射机是非因果已知的。提出了一种基于纯晶格的编码和解码结构,并推导了在整个信道信噪比和干扰功率范围内有效的容量区域的内界。
{"title":"Lattice coding for multiple access channels with common message and additive interference","authors":"Mohammad Farzad Pourbabaee, M. Emadi, Arash Gholami Davoodi, M. Aref","doi":"10.1109/ITW.2012.6404705","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404705","url":null,"abstract":"In this paper, lattice based coding is used over two-user Gaussian state-dependent multiple access channel with common message for two channel models. First, it is assumed that the additive channel interference is noncausally known at both encoders. Exploiting a lattice encoding and decoding scheme, the effect of the interference is completely removed and the capacity region is achieved. Then, the multiple access channel with two additive interferences is considered in the case, where each interference is known noncausally to the associated transmitter. A pure lattice based encoding and decoding structure is proposed and an inner bound on the capacity region is derived which is valid for the entire range of channel signal to noise ratio and powers of interferences.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132747324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Coherence-based probabilistic recovery guarantees for sparsely corrupted signals 基于相干的稀疏损坏信号概率恢复保证
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404681
A. Bracher, G. Pope, Christoph Studer
In this paper, we present novel probabilistic recovery guarantees for sparse signals subject to sparse interference, covering varying degrees of knowledge of the signal and interference support. Our results assume that the sparsifying dictionaries are characterized by coherence parameters and we require randomness only in the signal and/or interference. The obtained recovery guarantees show that one can recover sparsely corrupted signals with overwhelming probability, even if the sparsity of both the signal and interference scale (near) linearly with the number of measurements.
在本文中,我们提出了一种新的受稀疏干扰的稀疏信号的概率恢复保证,涵盖了不同程度的信号知识和干扰支持。我们的结果假设稀疏字典是由相干参数表征的,我们只需要信号和/或干扰中的随机性。得到的恢复保证表明,即使信号和干扰的稀疏度与测量次数呈线性关系,也可以以压倒性的概率恢复稀疏损坏的信号。
{"title":"Coherence-based probabilistic recovery guarantees for sparsely corrupted signals","authors":"A. Bracher, G. Pope, Christoph Studer","doi":"10.1109/ITW.2012.6404681","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404681","url":null,"abstract":"In this paper, we present novel probabilistic recovery guarantees for sparse signals subject to sparse interference, covering varying degrees of knowledge of the signal and interference support. Our results assume that the sparsifying dictionaries are characterized by coherence parameters and we require randomness only in the signal and/or interference. The obtained recovery guarantees show that one can recover sparsely corrupted signals with overwhelming probability, even if the sparsity of both the signal and interference scale (near) linearly with the number of measurements.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134620674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Source coding with conditionally less noisy side information 有条件的少噪声侧信息的源编码
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404737
R. Timo, T. Oechtering, M. Wigger
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity.
我们考虑了一个具有一个发射器,两个接收器和侧信息的无损多终端源编码问题。这个问题的可达到的速率区域还没有被很好地理解。在本文中,我们描述了当一个接收器的侧信息有条件地比另一个接收器的侧信息噪声小时的速率区域,给定另一个接收器的期望源。条件低噪声定义包括降级的边信息和普通消息作为特例,其动机是低噪声广播信道的概念。本文的主要贡献是利用可伸缩恒等式和Csiszár和恒等式提出了一个新的逆定理。
{"title":"Source coding with conditionally less noisy side information","authors":"R. Timo, T. Oechtering, M. Wigger","doi":"10.1109/ITW.2012.6404737","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404737","url":null,"abstract":"We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszár sum identity.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123863582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Golay meets Hadamard: Golay-paired Hadamard matrices for fast compressed sensing Golay满足Hadamard:用于快速压缩感知的Golay配对Hadamard矩阵
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404755
Lu Gan, Kezhi Li, Cong Ling
This paper introduces Golay-paired Hadamard matrices for fast compressed sensing of sparse signals in the time or spectral domain. These sampling operators feature low-memory requirement, hardware-friendly implementation and fast computation in reconstruction. We show that they require a nearly optimal number of measurements for faithful reconstruction of a sparse signal in the time or frequency domain. Simulation results demonstrate that the proposed sensing matrices offer a reconstruction performance similar to that of fully random matrices.
本文介绍了在时域和谱域对稀疏信号进行快速压缩感知的golay配对Hadamard矩阵。这些采样算子具有内存要求低、实现硬件友好、重构计算速度快等特点。我们表明,它们需要几乎最优的测量数量来在时间或频域忠实地重建稀疏信号。仿真结果表明,所提出的传感矩阵具有与全随机矩阵相似的重构性能。
{"title":"Golay meets Hadamard: Golay-paired Hadamard matrices for fast compressed sensing","authors":"Lu Gan, Kezhi Li, Cong Ling","doi":"10.1109/ITW.2012.6404755","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404755","url":null,"abstract":"This paper introduces Golay-paired Hadamard matrices for fast compressed sensing of sparse signals in the time or spectral domain. These sampling operators feature low-memory requirement, hardware-friendly implementation and fast computation in reconstruction. We show that they require a nearly optimal number of measurements for faithful reconstruction of a sparse signal in the time or frequency domain. Simulation results demonstrate that the proposed sensing matrices offer a reconstruction performance similar to that of fully random matrices.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124535331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2012 IEEE Information Theory Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1