首页 > 最新文献

2008 International Symposium on Information Theory and Its Applications最新文献

英文 中文
Finding fountain codes for real-time data by fixed point method 用不动点法求实时数据的喷泉码
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895597
T. Tirronen, J. Virtamo
We study fountain coding-like transfer method over a packet erasure channel for data with real-time requirements, such as streaming video or voice. The proposed method uses a sliding window, which defines the current section of non-expired data. The coding is systematic, with new blocks entering the window being initially sent intact, followed by a possible correction packet. Two different strategies for correction packet sending are studied. In both methods correction packets are generated in fountain-coding like fashion using bitwise XOR-operation for addition of source blocks. The correction packets are constructed so as to maximize the probability of immediately decoding useful data at the receiver's end, based on the sender's belief on the receiver's state. After sending the correction packet this belief is updated. Fixed point iteration is used to find the stationary solution in long streams. The two methods differ in the details how the window is moved and how exactly the correction packets are generated. We study the performance of proposed methods and give theoretical and simulation results for both of the used approaches.
我们研究了一种基于数据包擦除通道的喷泉式编码传输方法,用于具有实时要求的数据,如流视频或语音。该方法使用滑动窗口来定义未过期数据的当前部分。编码是系统的,进入窗口的新块最初被完整地发送,然后是一个可能的更正包。研究了两种不同的纠错报文发送策略。在这两种方法中,校正包都是在喷泉编码中生成的,使用位异或操作来添加源块。基于发送方对接收方状态的信念,构建纠错包,使接收端立即解码有用数据的概率最大化。发送更正包后,此信念被更新。采用不动点迭代法求解长流中的平稳解。这两种方法的不同之处在于如何移动窗口以及如何准确地生成校正包。我们研究了所提出的方法的性能,并给出了两种方法的理论和仿真结果。
{"title":"Finding fountain codes for real-time data by fixed point method","authors":"T. Tirronen, J. Virtamo","doi":"10.1109/ISITA.2008.4895597","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895597","url":null,"abstract":"We study fountain coding-like transfer method over a packet erasure channel for data with real-time requirements, such as streaming video or voice. The proposed method uses a sliding window, which defines the current section of non-expired data. The coding is systematic, with new blocks entering the window being initially sent intact, followed by a possible correction packet. Two different strategies for correction packet sending are studied. In both methods correction packets are generated in fountain-coding like fashion using bitwise XOR-operation for addition of source blocks. The correction packets are constructed so as to maximize the probability of immediately decoding useful data at the receiver's end, based on the sender's belief on the receiver's state. After sending the correction packet this belief is updated. Fixed point iteration is used to find the stationary solution in long streams. The two methods differ in the details how the window is moved and how exactly the correction packets are generated. We study the performance of proposed methods and give theoretical and simulation results for both of the used approaches.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130763362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On the singularity of Laplace-Stieltjes transform of a heavy tailed random variable 重尾随机变量Laplace-Stieltjes变换的奇异性
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895515
K. Nakagawa
In this paper, we give a sufficient condition for a non-negative random variable X being heavy tailed. A light tailed case is studied in. The sufficient condition is an analytic property of Laplace-Stieltjes transform of the probability distribution function of X. The proof is based on the complex Tauberian theorem by Graham-Vaaler.
本文给出了非负随机变量X是重尾的一个充分条件。研究了一种轻尾情况。充分条件是x的概率分布函数的Laplace-Stieltjes变换的一个解析性质,并根据graham - valer的复陶柏利定理进行了证明。
{"title":"On the singularity of Laplace-Stieltjes transform of a heavy tailed random variable","authors":"K. Nakagawa","doi":"10.1109/ISITA.2008.4895515","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895515","url":null,"abstract":"In this paper, we give a sufficient condition for a non-negative random variable X being heavy tailed. A light tailed case is studied in. The sufficient condition is an analytic property of Laplace-Stieltjes transform of the probability distribution function of X. The proof is based on the complex Tauberian theorem by Graham-Vaaler.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130955354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Rate-compatible punctured LDPC codes based on recovery tree 基于恢复树的速率兼容穿孔LDPC码
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895650
Sunghoon Choi, Kwangseok Noh, J. Shin, J. Heo
We consider the challenges of finding good puncturing patterns for rate-compatible LDPC codes over additive white Gaussian noise (AWGN) channel. In previous works, the role of survived check nodes in puncturing patterns was considered with the limitations such as single survived check node assumption and simulation-based verification. In this paper, we analyze the performance according to the role of multiple survived check nodes and multiple dead check nodes. Based on theses analyses, we propose new algorithm to find good puncturing pattern for LDPC codes over additive white Gaussian noise (AWGN) channel.
我们考虑了在加性高斯白噪声(AWGN)信道上为速率兼容的LDPC码找到良好的穿孔模式的挑战。在以往的研究中,幸存的检核节点在穿刺模式中的作用被局限于单个幸存检核节点的假设和基于仿真的验证。本文根据多个幸存校验节点和多个死检节点的作用对其性能进行了分析。在此基础上,我们提出了在加性高斯白噪声(AWGN)信道上寻找LDPC码良好穿刺方向图的新算法。
{"title":"Rate-compatible punctured LDPC codes based on recovery tree","authors":"Sunghoon Choi, Kwangseok Noh, J. Shin, J. Heo","doi":"10.1109/ISITA.2008.4895650","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895650","url":null,"abstract":"We consider the challenges of finding good puncturing patterns for rate-compatible LDPC codes over additive white Gaussian noise (AWGN) channel. In previous works, the role of survived check nodes in puncturing patterns was considered with the limitations such as single survived check node assumption and simulation-based verification. In this paper, we analyze the performance according to the role of multiple survived check nodes and multiple dead check nodes. Based on theses analyses, we propose new algorithm to find good puncturing pattern for LDPC codes over additive white Gaussian noise (AWGN) channel.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134185680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New coding theorems for fixed-length source coding and Shannon's cipher system with a general source 固定长度源编码的新编码定理和具有一般源的香农密码系统
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895418
H. Koga
This paper is concerned with new coding theorems for (a) fixed-length coding of a general source, and (b) coding of Shannon's cipher system with a general source, under the condition that the decoding error probability vanishes as the blocklength goes to infinity. The converse theorems consist of inequalities that include the limit inferior in probability. In addition, the converse theorems are valid for the class of stochastic encoders. The direct theorems are proved under the assumptions that are slightly stronger than the consequences of the converse theorems. We can obtain known coding theorems from the obtained results.
本文研究了(a)一般源的定长编码和(b)一般源的香农密码系统的编码,在解码错误概率随块长度趋于无穷而消失的条件下,新的编码定理。逆定理由不等式组成,这些不等式包含了概率下极限。此外,对随机编码器的性质也证明了逆定理的有效性。正定理是在比反定理的结果稍强一些的假设下证明的。我们可以从得到的结果中得到已知的编码定理。
{"title":"New coding theorems for fixed-length source coding and Shannon's cipher system with a general source","authors":"H. Koga","doi":"10.1109/ISITA.2008.4895418","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895418","url":null,"abstract":"This paper is concerned with new coding theorems for (a) fixed-length coding of a general source, and (b) coding of Shannon's cipher system with a general source, under the condition that the decoding error probability vanishes as the blocklength goes to infinity. The converse theorems consist of inequalities that include the limit inferior in probability. In addition, the converse theorems are valid for the class of stochastic encoders. The direct theorems are proved under the assumptions that are slightly stronger than the consequences of the converse theorems. We can obtain known coding theorems from the obtained results.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133282241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Tuned turbo codes 调谐涡轮码
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895619
C. Koller, A. Graell i Amat, J. Kliewer, F. Vatta, D. J. Costello
As implied by previous studies, there exists a fundamental trade-off between the minimum distance and the iterative decoding convergence behavior of a turbo code. While capacity achieving code ensembles typically are asymptotically bad in the sense that their minimum distance does not grow linearly with block length and they therefore exhibit an error floor at medium to high signal to noise ratios, asymptotically good codes usually converge further away from channel capacity. In this paper we present so-called tuned turbo codes, a family of asymptotically good hybrid concatenated code ensembles, where minimum distance growths and convergence thresholds can be traded-off using a tuning parameter lambda. By decreasing lambda, the asymptotic minimum distance growth rate coefficient is reduced for the sake of improved iterative decoding convergence behavior, and thus the code performance can be tuned to fit the desired application.
以往的研究表明,turbo码的最小距离与迭代译码收敛性之间存在着一种基本的权衡。虽然实现代码集成的容量通常是渐近差的,因为它们的最小距离不随块长度线性增长,因此它们在中高信噪比时表现出错误底限,但渐近好的代码通常会在远离信道容量的地方收敛。在本文中,我们提出了所谓的调谐turbo码,这是一类渐近良好的混合串联码集成,其中最小距离增长和收敛阈值可以使用调谐参数lambda进行权衡。通过减小lambda,可以减小渐近最小距离增长率系数,从而提高迭代译码的收敛性,从而调整码的性能以适应期望的应用。
{"title":"Tuned turbo codes","authors":"C. Koller, A. Graell i Amat, J. Kliewer, F. Vatta, D. J. Costello","doi":"10.1109/ISITA.2008.4895619","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895619","url":null,"abstract":"As implied by previous studies, there exists a fundamental trade-off between the minimum distance and the iterative decoding convergence behavior of a turbo code. While capacity achieving code ensembles typically are asymptotically bad in the sense that their minimum distance does not grow linearly with block length and they therefore exhibit an error floor at medium to high signal to noise ratios, asymptotically good codes usually converge further away from channel capacity. In this paper we present so-called tuned turbo codes, a family of asymptotically good hybrid concatenated code ensembles, where minimum distance growths and convergence thresholds can be traded-off using a tuning parameter lambda. By decreasing lambda, the asymptotic minimum distance growth rate coefficient is reduced for the sake of improved iterative decoding convergence behavior, and thus the code performance can be tuned to fit the desired application.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130194901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Capacity of broadcast erasure networks using spatial network coding 使用空间网络编码的广播擦除网络容量
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895512
M. Salmasi, S. Golestani
We study the capacity of a multicast session in point-to-point erasure networks as well as interference-free broadcast erasure networks, under a class of network coding schemes referred to as spatial network coding. In this class of coding, nodes are prohibited from performing coding on successive data units of a link; only combining data units arriving on different incoming links is permitted. We prove that, for both point-to-point and broadcast networks, the capacity of a multicast session is equal to the minimum of the capacities of the constituent unicast sessions. The capacity of a unicast session is equal to the statistical mean of the minimum cut rate of the corresponding random graph, where the notions of graph model and minimum cut rate are extended to apply to broadcast networks.
在一种称为空间网络编码的网络编码方案下,我们研究了点对点擦除网络和无干扰广播擦除网络中组播会话的容量。在这类编码中,禁止节点对链路的连续数据单元执行编码;只允许合并到达不同传入链路上的数据单元。我们证明,对于点对点网络和广播网络,组播会话的容量等于组成单播会话容量的最小值。单播会话的容量等于相应随机图的最小割率的统计平均值,将图模型和最小割率的概念推广到广播网络中。
{"title":"Capacity of broadcast erasure networks using spatial network coding","authors":"M. Salmasi, S. Golestani","doi":"10.1109/ISITA.2008.4895512","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895512","url":null,"abstract":"We study the capacity of a multicast session in point-to-point erasure networks as well as interference-free broadcast erasure networks, under a class of network coding schemes referred to as spatial network coding. In this class of coding, nodes are prohibited from performing coding on successive data units of a link; only combining data units arriving on different incoming links is permitted. We prove that, for both point-to-point and broadcast networks, the capacity of a multicast session is equal to the minimum of the capacities of the constituent unicast sessions. The capacity of a unicast session is equal to the statistical mean of the minimum cut rate of the corresponding random graph, where the notions of graph model and minimum cut rate are extended to apply to broadcast networks.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114156957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance evaluation of effect of nonlinear distortion in SC-FDMA system 非线性失真对SC-FDMA系统性能影响的评价
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895381
S. Suzuki, O. Takyu, Y. Umeda
In up-link wireless access communication, the transmitter needs good linearity but low power efficiency power amplifier. If the nonlinear power amplifier is used for improving the power usage efficiency, the higher peak-to-average power ratio (PAPR) signal suffers from nonlinear distortion. The effect of nonlinear distortion to Single Carrier-Frequency Division Multiple Access (SC-FDMA) has not been evaluated yet. In this paper, the performance of effect of nonlinear distortion to SC-FDMA is evaluated in terms of PAPR, out-of-band radiation and bit error rate with computer simulation, where there are two types of access scheme in SC-FDMA, first one is interleaved frequency division multiple access (IFDMA) and second one is localized frequency division multiple access (LFDMA). From the simulation results, we clarify IFDMA or LFDMA has the higher robustness for nonlinear distortion.
在上行链路无线接入通信中,发射机需要线性度好但功率效率低的功率放大器。如果采用非线性功率放大器来提高功率利用率,则较高的峰均功率比(PAPR)信号会受到非线性失真的影响。非线性失真对单载波频分多址(SC-FDMA)的影响尚未得到评价。本文通过计算机仿真,从PAPR、带外辐射和误码率三个方面评价了非线性失真对SC-FDMA的影响性能,其中SC-FDMA有两种接入方案,一种是交错频分多址(IFDMA),另一种是局部频分多址(LFDMA)。仿真结果表明,IFDMA或LFDMA对非线性失真具有更高的鲁棒性。
{"title":"Performance evaluation of effect of nonlinear distortion in SC-FDMA system","authors":"S. Suzuki, O. Takyu, Y. Umeda","doi":"10.1109/ISITA.2008.4895381","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895381","url":null,"abstract":"In up-link wireless access communication, the transmitter needs good linearity but low power efficiency power amplifier. If the nonlinear power amplifier is used for improving the power usage efficiency, the higher peak-to-average power ratio (PAPR) signal suffers from nonlinear distortion. The effect of nonlinear distortion to Single Carrier-Frequency Division Multiple Access (SC-FDMA) has not been evaluated yet. In this paper, the performance of effect of nonlinear distortion to SC-FDMA is evaluated in terms of PAPR, out-of-band radiation and bit error rate with computer simulation, where there are two types of access scheme in SC-FDMA, first one is interleaved frequency division multiple access (IFDMA) and second one is localized frequency division multiple access (LFDMA). From the simulation results, we clarify IFDMA or LFDMA has the higher robustness for nonlinear distortion.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115089424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reliability and efficiency of flexibly decodable distributed coding strategies 灵活可解码分布式编码策略的可靠性和效率
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895661
A. Josan, D. Neuhoff
Distributed lossless coding of correlated sources offers the potential for sizable reductions in coding rates in comparison to independent coding. However, it is more sensitive to encoder failures as the loss of one encoder may cause the decoding of many sources to fail. Strategies for increasing the reliability of lossless distributed coding were first considered by Marco and Neuhoff. This paper introduces and analyzes several new strategies based on flexible decoding, in contrast to the rigid decoding strategies considered previously. The new flexible schemes are found to offer significant gains over the prior rigid schemes.
与独立编码相比,相关源的分布式无损编码提供了编码率大幅降低的潜力。然而,它对编码器故障更敏感,因为一个编码器的丢失可能导致许多源的解码失败。提高无损分布式编码可靠性的策略首先是由Marco和Neuhoff提出的。本文介绍并分析了几种基于柔性译码的新策略,与以往所考虑的刚性译码策略进行了对比。发现新的灵活方案比以前的刚性方案提供了显著的收益。
{"title":"Reliability and efficiency of flexibly decodable distributed coding strategies","authors":"A. Josan, D. Neuhoff","doi":"10.1109/ISITA.2008.4895661","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895661","url":null,"abstract":"Distributed lossless coding of correlated sources offers the potential for sizable reductions in coding rates in comparison to independent coding. However, it is more sensitive to encoder failures as the loss of one encoder may cause the decoding of many sources to fail. Strategies for increasing the reliability of lossless distributed coding were first considered by Marco and Neuhoff. This paper introduces and analyzes several new strategies based on flexible decoding, in contrast to the rigid decoding strategies considered previously. The new flexible schemes are found to offer significant gains over the prior rigid schemes.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128420329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secret communication with feedback 带反馈的秘密通信
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895417
Deniz Gündüz, D. Brown, H. Poor
Secure communication with feedback is studied. An achievability scheme in which the backward channel is used to generate a shared secret key is proposed. The scenario of binary symmetric forward and backward channels is considered, and a combination of the proposed scheme and Maurer's coding scheme is shown to achieve improved secrecy rates. The scenario of a Gaussian channel with perfect output feedback is also analyzed and the Schalkwijk-Kailath coding scheme is shown to achieve the secrecy capacity for this channel.
研究了带反馈的安全通信。提出了一种利用反向信道生成共享密钥的可实现方案。考虑了二进制对称正向和反向信道的情况,并将该方案与Maurer编码方案相结合,实现了更高的保密率。分析了具有完美输出反馈的高斯信道的情况,给出了实现该信道保密能力的Schalkwijk-Kailath编码方案。
{"title":"Secret communication with feedback","authors":"Deniz Gündüz, D. Brown, H. Poor","doi":"10.1109/ISITA.2008.4895417","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895417","url":null,"abstract":"Secure communication with feedback is studied. An achievability scheme in which the backward channel is used to generate a shared secret key is proposed. The scenario of binary symmetric forward and backward channels is considered, and a combination of the proposed scheme and Maurer's coding scheme is shown to achieve improved secrecy rates. The scenario of a Gaussian channel with perfect output feedback is also analyzed and the Schalkwijk-Kailath coding scheme is shown to achieve the secrecy capacity for this channel.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134442247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
A robust cooperative relaying strategy for wireless networks using semidefinite constraints and worst-case performance optimization 基于半确定约束和最坏情况性能优化的无线网络鲁棒协同中继策略
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895491
R. Krishna, K. Cumanan, V. Sharma, S. Lambotharan
A robust signal forwarding technique for wireless sensor and mesh networks using semidefinite constraints is proposed. The scheme considers a multiple source destination scenario where a set of relays assists forwarding signals from sources to destinations. In our work we consider a realistic environment where actual channel state information (CSI) available to the relays are in error. We propose to optimize the relay transceiver within a worst-case performance optimization framework using semidefinite constraints. Simulations demonstrate that in the presence of imperfect CSI, the proposed scheme outperforms a non-robust scheme.
提出了一种基于半确定约束的无线传感器和网状网络鲁棒信号转发技术。该方案考虑了多源目的场景,其中一组中继协助将信号从源转发到目的。在我们的工作中,我们考虑一个现实的环境,其中继电器可用的实际信道状态信息(CSI)是错误的。我们建议在使用半确定约束的最坏情况性能优化框架内优化中继收发器。仿真结果表明,在不完善的CSI存在下,该方案优于非鲁棒方案。
{"title":"A robust cooperative relaying strategy for wireless networks using semidefinite constraints and worst-case performance optimization","authors":"R. Krishna, K. Cumanan, V. Sharma, S. Lambotharan","doi":"10.1109/ISITA.2008.4895491","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895491","url":null,"abstract":"A robust signal forwarding technique for wireless sensor and mesh networks using semidefinite constraints is proposed. The scheme considers a multiple source destination scenario where a set of relays assists forwarding signals from sources to destinations. In our work we consider a realistic environment where actual channel state information (CSI) available to the relays are in error. We propose to optimize the relay transceiver within a worst-case performance optimization framework using semidefinite constraints. Simulations demonstrate that in the presence of imperfect CSI, the proposed scheme outperforms a non-robust scheme.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"72 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134544148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2008 International Symposium on Information Theory and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1