首页 > 最新文献

2008 International Symposium on Information Theory and Its Applications最新文献

英文 中文
Improvement of Referrer SPAM blocking system 推荐人垃圾邮件拦截系统的改进
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895560
Y. Kimura, A. Watanabe, T. Katoh, B. B. Bista, T. Takata
In recent years, the use of Weblog is increasing rapidly and some people are using functions to record referer (URL of the page that the site visitor was viewing immediately before) and create back-links to the URL. Recently, as the main purpose to guide visitors to harmful sites, people are using this function to misinterpret referer information and access a large number of sites indiscriminately causing the problem called referrer spam. To combat the referrer spam, the authors have proposed the referrer spam blocking system using Bayesian filter. However, the proposed system has non-negligible false negative (i.e. undetected spam request) ratio of 12%. In this paper, we improve the previous proposed system by introducing image optical character recognition technique. We implement prototype and evaluate computational cost and filtering performance of the proposed scheme and we attain low false negative ratio with reasonable additional computational cost.
近年来,Weblog的使用正在迅速增加,一些人正在使用功能来记录referer(网站访问者之前立即访问的页面的URL)并创建到该URL的反向链接。最近,人们以引导访问者访问有害网站为主要目的,利用这一功能误读推荐人信息,不加区分地访问大量网站,造成了被称为推荐人垃圾邮件的问题。为了对抗推荐人垃圾邮件,作者提出了一种基于贝叶斯过滤的推荐人垃圾邮件拦截系统。然而,所提出的系统具有不可忽略的假阴性(即未检测到的垃圾邮件请求)比率为12%。在本文中,我们通过引入图像光学字符识别技术来改进先前提出的系统。我们实现了原型并评估了该方案的计算成本和滤波性能,在合理的额外计算成本下获得了较低的假负率。
{"title":"Improvement of Referrer SPAM blocking system","authors":"Y. Kimura, A. Watanabe, T. Katoh, B. B. Bista, T. Takata","doi":"10.1109/ISITA.2008.4895560","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895560","url":null,"abstract":"In recent years, the use of Weblog is increasing rapidly and some people are using functions to record referer (URL of the page that the site visitor was viewing immediately before) and create back-links to the URL. Recently, as the main purpose to guide visitors to harmful sites, people are using this function to misinterpret referer information and access a large number of sites indiscriminately causing the problem called referrer spam. To combat the referrer spam, the authors have proposed the referrer spam blocking system using Bayesian filter. However, the proposed system has non-negligible false negative (i.e. undetected spam request) ratio of 12%. In this paper, we improve the previous proposed system by introducing image optical character recognition technique. We implement prototype and evaluate computational cost and filtering performance of the proposed scheme and we attain low false negative ratio with reasonable additional computational cost.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116985366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-branch switched diversity with adaptive switching thresholds 具有自适应交换阈值的多分支交换分集
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895613
Haewoon Nam, Mohamed-Slim Alouini
This paper investigates a simple analytical approach that yields the optimal switching thresholds for multi-branch switched diversity systems. It also presents a performance optimization based on these optimal thresholds. For multi-branch switched diversity systems, the optimal fixed switching threshold is not only a function of the average channel SNR but also a function of the number of diversity branches. Conventional multi-branch switched diversity systems use a single fixed switching threshold, where computing this optimal threshold is not a simple task when the number of diversity branches is high. We propose a novel multi-branch switched diversity system that is based on a set of adaptive switching thresholds instead of a single fixed switching threshold, where a different switching threshold is used every switching. Thanks to the fact that each switching threshold in the set depends only on the remaining diversity branches, the proposed system allows a simple optimization for these switching thresholds. Furthermore, numerical and simulation results show that the proposed adaptive switched diversity system outperforms the conventional system.
本文研究了多分支切换分集系统最优切换阈值的一种简单分析方法。它还提出了基于这些最优阈值的性能优化。对于多支路交换分集系统,最优固定交换阈值不仅是平均信道信噪比的函数,而且是分集支路数的函数。传统的多支路交换分集系统使用一个固定的交换阈值,当分集支路数量很大时,计算这个最优阈值并不是一项简单的任务。我们提出了一种新的多分支交换分集系统,该系统基于一组自适应交换阈值,而不是单一的固定交换阈值,其中每次交换使用不同的交换阈值。由于集合中的每个交换阈值仅取决于剩余的分集分支,因此所提出的系统允许对这些交换阈值进行简单的优化。数值和仿真结果表明,所提出的自适应切换分集系统优于传统系统。
{"title":"Multi-branch switched diversity with adaptive switching thresholds","authors":"Haewoon Nam, Mohamed-Slim Alouini","doi":"10.1109/ISITA.2008.4895613","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895613","url":null,"abstract":"This paper investigates a simple analytical approach that yields the optimal switching thresholds for multi-branch switched diversity systems. It also presents a performance optimization based on these optimal thresholds. For multi-branch switched diversity systems, the optimal fixed switching threshold is not only a function of the average channel SNR but also a function of the number of diversity branches. Conventional multi-branch switched diversity systems use a single fixed switching threshold, where computing this optimal threshold is not a simple task when the number of diversity branches is high. We propose a novel multi-branch switched diversity system that is based on a set of adaptive switching thresholds instead of a single fixed switching threshold, where a different switching threshold is used every switching. Thanks to the fact that each switching threshold in the set depends only on the remaining diversity branches, the proposed system allows a simple optimization for these switching thresholds. Furthermore, numerical and simulation results show that the proposed adaptive switched diversity system outperforms the conventional system.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115337660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Impact of dimension on causal equalization of the MIMO two-tap channel 尺寸对MIMO双抽头信道因果均衡的影响
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895583
S. Wahls, H. Boche
We consider equalization of multiple-input multiple-output (MIMO) two-tap channels under a causality constraint. Due to the work of Treil it is well known, that for causal equalizers of N + 1 times N channels the stability norm can grow exponentially fast with N, while it is upper bounded independently of N for the pseudoinverse. In this paper we give a illustrative example for a two-tap channel which exhibits this effect. Monte-Carlo simulations indicate, that this behavior is exemplary for two-tap channels with a strong second tap. Based on further simulations, we observe a rule of thumb on how much antenna diversity is necessary for causal equalization in the general N + K times N case.
在因果关系约束下,研究了多输入多输出(MIMO)双抽头通道的均衡化问题。由于Treil的工作,众所周知,对于N + 1乘以N通道的因果均衡器,稳定范数可以随N呈指数级快速增长,而对于伪逆则是独立于N的上界。在本文中,我们给出了一个显示这种效应的双抽头通道的说明性例子。蒙特卡罗模拟表明,这种行为对于具有强二次抽头的双抽头信道是典型的。基于进一步的模拟,我们观察到在一般N + K乘以N的情况下需要多少天线分集来实现因果均衡的经验法则。
{"title":"Impact of dimension on causal equalization of the MIMO two-tap channel","authors":"S. Wahls, H. Boche","doi":"10.1109/ISITA.2008.4895583","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895583","url":null,"abstract":"We consider equalization of multiple-input multiple-output (MIMO) two-tap channels under a causality constraint. Due to the work of Treil it is well known, that for causal equalizers of N + 1 times N channels the stability norm can grow exponentially fast with N, while it is upper bounded independently of N for the pseudoinverse. In this paper we give a illustrative example for a two-tap channel which exhibits this effect. Monte-Carlo simulations indicate, that this behavior is exemplary for two-tap channels with a strong second tap. Based on further simulations, we observe a rule of thumb on how much antenna diversity is necessary for causal equalization in the general N + K times N case.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116031338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the capacity of flash memories 闪存的容量
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895389
Anxiao Jiang, Jehoshua Bruck
Flash memories are the most widely used type of non-volatile electronic memories. Compared to magnetic recording and optical recording, flash memories have the unique property that their cell levels, which represent data, are programmed using an iterative procedure that monotonically shifts each cell level upward toward its target value. In this paper, we study the capacity of flash memories to store data. We explore the relationship among their capacity, programming precision and programming time. The study is focused on the capacity of single cells, and an optimal programming algorithm is presented.
闪存是应用最广泛的一种非易失性电子存储器。与磁记录和光学记录相比,闪存具有独特的特性,即其代表数据的单元水平是使用迭代过程编程的,该过程单调地将每个单元水平向上移动到其目标值。在本文中,我们研究了闪存存储数据的容量。探讨了它们的容量、编程精度和编程时间之间的关系。针对单细胞容量问题进行了研究,提出了一种最优规划算法。
{"title":"On the capacity of flash memories","authors":"Anxiao Jiang, Jehoshua Bruck","doi":"10.1109/ISITA.2008.4895389","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895389","url":null,"abstract":"Flash memories are the most widely used type of non-volatile electronic memories. Compared to magnetic recording and optical recording, flash memories have the unique property that their cell levels, which represent data, are programmed using an iterative procedure that monotonically shifts each cell level upward toward its target value. In this paper, we study the capacity of flash memories to store data. We explore the relationship among their capacity, programming precision and programming time. The study is focused on the capacity of single cells, and an optimal programming algorithm is presented.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116294301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Double error correctable integer code and its application to QAM 双纠错整数码及其在QAM中的应用
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895475
H. Kostadinov, H. Morita, N. Iijima, N. Manev
A new construction of double error correctable integer codes and their application to QAM scheme are presented. Soft decoding algorithm for multiple error correctable integer code which are suited to any modulation scheme (QAM, PSK, ASK) will be introduced. Comparison of bit error rate (BER) versus signal-to-noise ratio (SNR) between soft and hard decoding using integer coded modulation (ICM) shows us that we can obtain approximately 2 dB coding gain.
提出了一种新的双错误可校正整数码结构及其在QAM方案中的应用。介绍了适用于各种调制方案(QAM、PSK、ASK)的多可纠错整数码软译码算法。使用整数编码调制(ICM)进行软解码和硬解码的误码率(BER)和信噪比(SNR)的比较表明,我们可以获得大约2 dB的编码增益。
{"title":"Double error correctable integer code and its application to QAM","authors":"H. Kostadinov, H. Morita, N. Iijima, N. Manev","doi":"10.1109/ISITA.2008.4895475","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895475","url":null,"abstract":"A new construction of double error correctable integer codes and their application to QAM scheme are presented. Soft decoding algorithm for multiple error correctable integer code which are suited to any modulation scheme (QAM, PSK, ASK) will be introduced. Comparison of bit error rate (BER) versus signal-to-noise ratio (SNR) between soft and hard decoding using integer coded modulation (ICM) shows us that we can obtain approximately 2 dB coding gain.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115647827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A practical key management scheme using the frame-based features for layered access control of H.264/SVC 基于帧的H.264/SVC分层访问控制的一种实用的密钥管理方案
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895406
Su-Wan Park, Dohee Yi, Sanguk Shin
This paper proposes a practical key management scheme using the frame-based feature in order to efficiently manage multi-keys used for layered access control of H.264/SVC. The efficiency of the proposed scheme is summarized in the following three points. 1) It offers implicit authentication in video content encryption/decryption. 2) It provides the security in key transmission through the network, and 3) has the robustness against brute-force attack as using all different NAL unit keys in the video sequence.
为了有效地管理H.264/SVC分层访问控制中使用的多密钥,提出了一种实用的基于帧的密钥管理方案。该方案的有效性可归纳为以下三点。1)在视频内容加/解密中提供隐式认证。2)它提供了通过网络传输密钥的安全性;3)由于在视频序列中使用了所有不同的NAL单元密钥,因此具有抗暴力攻击的鲁棒性。
{"title":"A practical key management scheme using the frame-based features for layered access control of H.264/SVC","authors":"Su-Wan Park, Dohee Yi, Sanguk Shin","doi":"10.1109/ISITA.2008.4895406","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895406","url":null,"abstract":"This paper proposes a practical key management scheme using the frame-based feature in order to efficiently manage multi-keys used for layered access control of H.264/SVC. The efficiency of the proposed scheme is summarized in the following three points. 1) It offers implicit authentication in video content encryption/decryption. 2) It provides the security in key transmission through the network, and 3) has the robustness against brute-force attack as using all different NAL unit keys in the video sequence.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121756044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the number of distinct autocorrelation distributions of M-ary Sidel'nikov sequences M-ary Sidel'nikov序列的不同自相关分布的个数
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895654
Jung-Soo Chung, Young-Sik Kim, Jong-Seon No, Habong Chung
In this paper, we enumerate the number of distinct autocorrelation distributions of M-ary Sidel'nikov sequences of given length, while we change the primitive element for generating the sequence.
本文列举了给定长度的m - y Sidel'nikov序列的不同自相关分布的个数,并改变了生成序列的原元。
{"title":"On the number of distinct autocorrelation distributions of M-ary Sidel'nikov sequences","authors":"Jung-Soo Chung, Young-Sik Kim, Jong-Seon No, Habong Chung","doi":"10.1109/ISITA.2008.4895654","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895654","url":null,"abstract":"In this paper, we enumerate the number of distinct autocorrelation distributions of M-ary Sidel'nikov sequences of given length, while we change the primitive element for generating the sequence.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123928971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modulation codes for reader-tag communication on inductively coupled channels 感应耦合信道上读写器-标签通信的调制码
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895477
A. Barbero, G. Horler, E. Rosnes, O. Ytrehus
In this paper we study and compare methods for representing information for transmission on inductively coupled channels. We introduce combined runlength and power constraints on modulation codes for such channels, calculate the capacities of these new constraints, and propose new codes that meet the constraints.
本文研究并比较了电感耦合信道上传输信息的表示方法。我们对这些信道的调制码引入了综合的运行长度和功率约束,计算了这些新约束的容量,并提出了满足这些约束的新码。
{"title":"Modulation codes for reader-tag communication on inductively coupled channels","authors":"A. Barbero, G. Horler, E. Rosnes, O. Ytrehus","doi":"10.1109/ISITA.2008.4895477","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895477","url":null,"abstract":"In this paper we study and compare methods for representing information for transmission on inductively coupled channels. We introduce combined runlength and power constraints on modulation codes for such channels, calculate the capacities of these new constraints, and propose new codes that meet the constraints.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124210751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Random distributed detection for wireless sensor networks 无线传感器网络的随机分布式检测
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895541
X. Liang, Wei Li, T. Gulliver
Due to the fact that wireless sensor nodes are spatially distributed throughout the area of interest, event detection must be implemented in a distributed way. Unlike related distributed detection schemes, our proposed approach does not need a pre-designated fusion node. This greatly improves network scalability. In this paper, we provide closed-form expressions for the probability of detection error and probability of false alarm. These results are validated by extensive simulation.
由于无线传感器节点在空间上分布在整个感兴趣的区域,因此事件检测必须以分布式的方式实现。与相关的分布式检测方案不同,我们提出的方法不需要预先指定融合节点。这极大地提高了网络的可扩展性。本文给出了检测误差概率和虚警概率的封闭表达式。这些结果通过大量的仿真得到了验证。
{"title":"Random distributed detection for wireless sensor networks","authors":"X. Liang, Wei Li, T. Gulliver","doi":"10.1109/ISITA.2008.4895541","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895541","url":null,"abstract":"Due to the fact that wireless sensor nodes are spatially distributed throughout the area of interest, event detection must be implemented in a distributed way. Unlike related distributed detection schemes, our proposed approach does not need a pre-designated fusion node. This greatly improves network scalability. In this paper, we provide closed-form expressions for the probability of detection error and probability of false alarm. These results are validated by extensive simulation.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124142034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterizing the discrete capacity achieving distribution with peak power constraint at the transition points 描述了在过渡点峰值功率约束下实现离散容量分布的特性
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895581
N. Sharma, S. Shamai
The capacity-achieving input distribution for many channels like the additive white Gaussian noise (AWGN) channels under a peak power constraint is discrete with a finite number of mass points. The number of mass points is itself a variable and figuring it out is part of the optimization problem. We wish to understand the behavior of the optimal input distribution at the transition points where the number of mass points changes. We give a new set of necessary and sufficient conditions at the transition points, which offer new insights into the transition and make the computation of the optimal distribution easier. These conditions can be simplified, at least in the real channel case, by assuming the conjecture that the number of mass points increases monotonically and by at most one as the constraint on the input is relaxed. In particular, we show that for zero mean, unit variance Gaussian noise, the peak amplitude A of 1:671 and 2:786 mark the points where the binary and ternary signaling respectively are no longer optimal.
在峰值功率约束下,像加性高斯白噪声(AWGN)信道这样的许多信道的容量实现输入分布是离散的,具有有限数量的质量点。质量点的数量本身就是一个变量计算出它是优化问题的一部分。我们希望了解在质量点数目变化的过渡点处的最优输入分布的行为。我们给出了一组新的过渡点的充要条件,为过渡问题提供了新的认识,使最优分布的计算更加容易。这些条件可以简化,至少在实信道的情况下,假设质量点的数量随着输入约束的放松而单调增加,最多增加一个。特别是,我们表明,对于零均值,单位方差高斯噪声,峰值振幅A为1:671和2:786标志着二进制和三进制信号分别不再是最优的点。
{"title":"Characterizing the discrete capacity achieving distribution with peak power constraint at the transition points","authors":"N. Sharma, S. Shamai","doi":"10.1109/ISITA.2008.4895581","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895581","url":null,"abstract":"The capacity-achieving input distribution for many channels like the additive white Gaussian noise (AWGN) channels under a peak power constraint is discrete with a finite number of mass points. The number of mass points is itself a variable and figuring it out is part of the optimization problem. We wish to understand the behavior of the optimal input distribution at the transition points where the number of mass points changes. We give a new set of necessary and sufficient conditions at the transition points, which offer new insights into the transition and make the computation of the optimal distribution easier. These conditions can be simplified, at least in the real channel case, by assuming the conjecture that the number of mass points increases monotonically and by at most one as the constraint on the input is relaxed. In particular, we show that for zero mean, unit variance Gaussian noise, the peak amplitude A of 1:671 and 2:786 mark the points where the binary and ternary signaling respectively are no longer optimal.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129641946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2008 International Symposium on Information Theory and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1