首页 > 最新文献

2022 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
Third-order Analysis of Channel Coding in the Moderate Deviations Regime 中等偏差区信道编码的三阶分析
Pub Date : 2022-06-26 DOI: 10.48550/arXiv.2203.01418
Recep Can Yavas, V. Kostina, M. Effros
The channel coding problem in the moderate deviations regime is studied; here, the error probability sub-exponentially decays to zero, and the rate approaches the capacity slower than $O(1/sqrt n )$. The main result refines Altuğ and Wagner’s moderate deviations result by deriving lower and upper bounds on the third-order term in the asymptotic expansion of the maximum achievable message set size. The third-order term of the expansion employs a new quantity called the channel skewness. For the binary symmetric channel and most practically important (n,ϵ) pairs, including n ∈ [100, 500] and ϵ ∈ [10−10,10−1], an approximation up to the channel skewness is the most accurate among several expansions in the literature.
研究了中等偏差条件下的信道编码问题;在这里,错误概率呈次指数衰减到零,并且接近容量的速度低于$O(1/sqrt n)$。主要结果通过在最大可实现的消息集大小的渐近展开中推导出三阶项的下界和上界,改进了altuerdogan和Wagner的中等偏差结果。展开的三阶项采用了一个称为通道偏度的新量。对于二元对称信道和最实际重要的(n, λ)对,包括n∈[100,500]和λ∈[10−10,10−1],信道偏度的近似是文献中几种展开中最准确的。
{"title":"Third-order Analysis of Channel Coding in the Moderate Deviations Regime","authors":"Recep Can Yavas, V. Kostina, M. Effros","doi":"10.48550/arXiv.2203.01418","DOIUrl":"https://doi.org/10.48550/arXiv.2203.01418","url":null,"abstract":"The channel coding problem in the moderate deviations regime is studied; here, the error probability sub-exponentially decays to zero, and the rate approaches the capacity slower than $O(1/sqrt n )$. The main result refines Altuğ and Wagner’s moderate deviations result by deriving lower and upper bounds on the third-order term in the asymptotic expansion of the maximum achievable message set size. The third-order term of the expansion employs a new quantity called the channel skewness. For the binary symmetric channel and most practically important (n,ϵ) pairs, including n ∈ [100, 500] and ϵ ∈ [10−10,10−1], an approximation up to the channel skewness is the most accurate among several expansions in the literature.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133403448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying Reliable Machines for Distributed Matrix-Vector Multiplication 分布式矩阵向量乘法的可靠机器识别
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834447
Sarthak Jain, Martina Cardone, S. Mohajer
This paper considers a distributed computing framework, where the task of T matrix-vector products is distributed among n worker machines. External adversaries have access to a subset ℒ (the cardinality of which is |ℒ|) of these machines, and can maliciously perturb the result of each of their computations with probability α. To correctly recover each matrixvector product, the master has to identify a set (of a fixed cardinality) of ‘unattacked’ worker machines. Towards this end, this work proposes four schemes that aim at performing such an identification. These schemes are analyzed and compared under different regimes of (|ℒ|,α) for the two cases when |ℒ| is (1) known or (2) unknown at the master.
本文考虑了一个分布式计算框架,其中T矩阵-向量积的任务分布在n个工作机器上。外部攻击者可以访问这些机器的一个子集(其基数为| ̄ ̄),并且可以恶意地以概率α干扰它们的每个计算结果。为了正确恢复每个矩阵向量积,主机必须识别一组(固定基数)“未受攻击”的工作机器。为此,本工作提出了四种方案,旨在执行这种识别。在不同的(| ̄,α)域下,对主点| ̄为(1)已知或(2)未知的两种情况进行了分析和比较。
{"title":"Identifying Reliable Machines for Distributed Matrix-Vector Multiplication","authors":"Sarthak Jain, Martina Cardone, S. Mohajer","doi":"10.1109/ISIT50566.2022.9834447","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834447","url":null,"abstract":"This paper considers a distributed computing framework, where the task of T matrix-vector products is distributed among n worker machines. External adversaries have access to a subset ℒ (the cardinality of which is |ℒ|) of these machines, and can maliciously perturb the result of each of their computations with probability α. To correctly recover each matrixvector product, the master has to identify a set (of a fixed cardinality) of ‘unattacked’ worker machines. Towards this end, this work proposes four schemes that aim at performing such an identification. These schemes are analyzed and compared under different regimes of (|ℒ|,α) for the two cases when |ℒ| is (1) known or (2) unknown at the master.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122814263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ternary Message Passing Decoding of RS-SPC Product Codes RS-SPC产品码的三进制消息传递译码
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834619
Mingyang Zhu, Ming Jiang, Chunming Zhao
This paper presents a ternary message passing (TMP) decoding algorithm for product codes constructed from binary image Reed-Solomon (RS) codes and single-parity-check (SPC) codes. All exchanged messages among component decoders in TMP decoding take value from a ternary alphabet {–1, 0, +1}, which gives a potential for designing fast decoders. In particular, intersymbol interference (ISI) channels are considered due to their applications in many high-speed systems. Moreover, we propose the density evolution (DE) analysis for RS-SPC product codes over AWGN and ISI channels. The DE analyses and simulation results show RS-SPC product codes under TMP decoding performs well in various channels.
提出了一种由二值图像RS码和单奇偶校验码构成的产品码的三元消息传递(TMP)译码算法。在TMP解码中,所有组件解码器之间交换的消息都从三元字母表{- 1,0,+1}中获取值,这为设计快速解码器提供了可能。特别是码间干扰(ISI)信道,由于其在许多高速系统中的应用而被考虑。此外,我们提出了在AWGN和ISI信道上RS-SPC产品码的密度演化分析。DE分析和仿真结果表明,TMP译码下的RS-SPC产品码在各种信道下都具有良好的性能。
{"title":"Ternary Message Passing Decoding of RS-SPC Product Codes","authors":"Mingyang Zhu, Ming Jiang, Chunming Zhao","doi":"10.1109/ISIT50566.2022.9834619","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834619","url":null,"abstract":"This paper presents a ternary message passing (TMP) decoding algorithm for product codes constructed from binary image Reed-Solomon (RS) codes and single-parity-check (SPC) codes. All exchanged messages among component decoders in TMP decoding take value from a ternary alphabet {–1, 0, +1}, which gives a potential for designing fast decoders. In particular, intersymbol interference (ISI) channels are considered due to their applications in many high-speed systems. Moreover, we propose the density evolution (DE) analysis for RS-SPC product codes over AWGN and ISI channels. The DE analyses and simulation results show RS-SPC product codes under TMP decoding performs well in various channels.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"42 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114022872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bounding quantum capacities via partial orders and complementarity 通过偏序和互补性约束量子容量
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834698
C. Hirche, Felix Leditzky
Quantum capacities are fundamental quantities that are notoriously hard to compute and can exhibit surprising properties such as superadditivity. Thus a vast amount of literature is devoted to finding close and computable bounds on these capacities. We add a new viewpoint by giving operationally motivated bounds on several capacities, including the quantum capacity and private capacity of a channel and the one-way distillable entanglement and private key of a bipartite state. Our bounds themselves are generally given by certain capacities of the complementary channel or state. As a tool to obtain these bounds we discuss partial orders on quantum channels, such as the less noisy and the more capable order. Our bounds help to further understand the interplay between different capacities and give operational limitations on superadditivity properties and the difference between capacities. They can also be used as a new approach towards numerically bounding capacities, as discussed with some examples.
量子容量是出了名的难以计算的基本量,并且可以表现出惊人的特性,比如超可加性。因此,大量的文献致力于寻找这些能力的密切和可计算的界限。我们通过对信道的量子容量和私有容量以及双部态的单向可蒸馏纠缠和私钥等容量给出操作激励边界,增加了一个新的观点。我们的边界本身通常是由互补通道或状态的某些容量给出的。作为一种获得这些边界的工具,我们讨论了量子信道上的偏阶,例如噪声较小的阶和能力较强的阶。我们的界有助于进一步理解不同容量之间的相互作用,并给出超可加性性质的运算限制和容量之间的差异。它们也可以用作实现数值边界能力的新方法,如一些示例所讨论的那样。
{"title":"Bounding quantum capacities via partial orders and complementarity","authors":"C. Hirche, Felix Leditzky","doi":"10.1109/ISIT50566.2022.9834698","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834698","url":null,"abstract":"Quantum capacities are fundamental quantities that are notoriously hard to compute and can exhibit surprising properties such as superadditivity. Thus a vast amount of literature is devoted to finding close and computable bounds on these capacities. We add a new viewpoint by giving operationally motivated bounds on several capacities, including the quantum capacity and private capacity of a channel and the one-way distillable entanglement and private key of a bipartite state. Our bounds themselves are generally given by certain capacities of the complementary channel or state. As a tool to obtain these bounds we discuss partial orders on quantum channels, such as the less noisy and the more capable order. Our bounds help to further understand the interplay between different capacities and give operational limitations on superadditivity properties and the difference between capacities. They can also be used as a new approach towards numerically bounding capacities, as discussed with some examples.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121101396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Constrained Obfuscation to Thwart Pattern Matching Attacks 约束混淆阻止模式匹配攻击
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834792
S. Enayati, D. Goeckel, A. Houmansadr, H. Pishro-Nik
Recently, we have proposed a model-free privacy-preserving mechanism (PPM) against attacks that compromise user privacy by matching patterns in data sequences to those that are unique to a given user [1]. Because the PPM is model-free, there are no requirements on the statistical model for the data, which is desirable when the model is not perfectly known. However, the proposed PPM did not enforce any constraints on the value to which a data point might be obfuscated, hence allowing an unlikely pattern that would make it easy for the adversary to detect which values have been obfuscated. In this paper, we consider a constrained PPM that enforces a continuity constraint so as to avoid abrupt jumps in the obfuscated data. To design such, we employ a graph-based analytical framework and the concept of consecutive patterns. At each point, the obfuscated data should be chosen strictly from that point’s neighbors. Unfortunately, this might undesirably increase the noise level employed in data obfuscation and hence unacceptably reduce utility. We propose a new obfuscation algorithm, namely the obfuscation-return algorithm, and characterize its privacy guarantees under continuity and noise level constraints.
最近,我们提出了一种无模型隐私保护机制(PPM),通过将数据序列中的模式与给定用户的唯一模式相匹配,来防止损害用户隐私的攻击[1]。因为PPM是无模型的,所以对数据的统计模型没有要求,当模型不是完全已知时,这是理想的。然而,建议的PPM没有对数据点可能被混淆的值实施任何约束,因此允许一种不太可能的模式,使攻击者很容易检测到哪些值被混淆了。在本文中,我们考虑了一个约束的PPM,它强制执行连续性约束,以避免混淆数据中的突然跳跃。为了设计这样,我们采用了基于图形的分析框架和连续模式的概念。在每个点上,应该严格地从该点的邻近点中选择混淆的数据。不幸的是,这可能会增加在数据混淆中使用的噪声水平,从而降低了不可接受的效用。我们提出了一种新的混淆算法,即混淆-返回算法,并对其在连续性和噪声水平约束下的隐私保证进行了表征。
{"title":"Constrained Obfuscation to Thwart Pattern Matching Attacks","authors":"S. Enayati, D. Goeckel, A. Houmansadr, H. Pishro-Nik","doi":"10.1109/ISIT50566.2022.9834792","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834792","url":null,"abstract":"Recently, we have proposed a model-free privacy-preserving mechanism (PPM) against attacks that compromise user privacy by matching patterns in data sequences to those that are unique to a given user [1]. Because the PPM is model-free, there are no requirements on the statistical model for the data, which is desirable when the model is not perfectly known. However, the proposed PPM did not enforce any constraints on the value to which a data point might be obfuscated, hence allowing an unlikely pattern that would make it easy for the adversary to detect which values have been obfuscated. In this paper, we consider a constrained PPM that enforces a continuity constraint so as to avoid abrupt jumps in the obfuscated data. To design such, we employ a graph-based analytical framework and the concept of consecutive patterns. At each point, the obfuscated data should be chosen strictly from that point’s neighbors. Unfortunately, this might undesirably increase the noise level employed in data obfuscation and hence unacceptably reduce utility. We propose a new obfuscation algorithm, namely the obfuscation-return algorithm, and characterize its privacy guarantees under continuity and noise level constraints.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116170823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved semidefinite programming bounds for binary codes by split distance enumerations 用分割距离枚举改进二进制码的半定规划界
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834515
Pin-Chieh Tseng, C. Lai, Wei-Hsuan Yu
We study the maximum size of a binary code A(n, d) with code length n and minimum distance d. Schrijver studied the Terwilliger algebra of the Hamming scheme and proposed a semidefinite program to upper bound A(n, d). We derive additional semidefinite constraints based on a split Terwilliger algebra so that Schrijver’s semidefinite programming bounds on A(n, d) can be improved. In particular, we show that A(18, 4) ≤ 6551 and A(19, 4) 13087.
我们研究了码长为n,距离为d的二进制码a (n, d)的最大尺寸。Schrijver研究了Hamming格式的Terwilliger代数,并提出了a (n, d)上界的半定规划。我们基于分裂Terwilliger代数推导了额外的半定约束,从而改进了Schrijver在a (n, d)上的半定规划界。特别地,我们证明了A(18,4)≤6551和A(19,4) 13087。
{"title":"Improved semidefinite programming bounds for binary codes by split distance enumerations","authors":"Pin-Chieh Tseng, C. Lai, Wei-Hsuan Yu","doi":"10.1109/ISIT50566.2022.9834515","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834515","url":null,"abstract":"We study the maximum size of a binary code A(n, d) with code length n and minimum distance d. Schrijver studied the Terwilliger algebra of the Hamming scheme and proposed a semidefinite program to upper bound A(n, d). We derive additional semidefinite constraints based on a split Terwilliger algebra so that Schrijver’s semidefinite programming bounds on A(n, d) can be improved. In particular, we show that A(18, 4) ≤ 6551 and A(19, 4) 13087.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114643549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Group-Theoretic Wideband Radar Waveform Design 群理论宽带雷达波形设计
Pub Date : 2022-06-26 DOI: 10.48550/arXiv.2207.00959
K. Mishra, Samuel Pinilla, A. Pezeshki, A. Calderbank
We investigate the theory of affine groups in the context of designing radar waveforms that obey the desired wideband ambiguity function (WAF). The WAF is obtained by correlating the signal with its time-dilated, Doppler-shifted, and delayed replicas. We consider the WAF definition as a coefficient function of the unitary representation of the group a • x + b. This is essentially an algebraic problem applied to the radar waveform design. Prior works on this subject largely analyzed narrow-band ambiguity functions. Here, we show that when the underlying wideband signal of interest is a pulse or pulse train, a tight frame can be built to design that waveform. Specifically, we design the radar signals by minimizing the ratio of bounding constants of the frame in order to obtain lower sidelobes in the WAF. This minimization is performed by building a codebook based on difference sets in order to achieve the Welch bound. We show that the tight frame so obtained is connected with the wavelet transform that defines the WAF.
我们在设计符合宽带模糊函数(WAF)的雷达波形的背景下研究了仿射群理论。WAF是通过将信号与其时间扩张、多普勒位移和延迟副本相关联而获得的。我们认为WAF定义是群a•x + b的酉表示的系数函数。这本质上是一个应用于雷达波形设计的代数问题。先前在这方面的工作主要是分析窄带模糊函数。在这里,我们展示了当感兴趣的底层宽带信号是一个脉冲或脉冲序列时,可以构建一个紧密的框架来设计该波形。具体来说,我们通过最小化帧的边界常数的比率来设计雷达信号,以在WAF中获得较低的副瓣。这种最小化是通过建立一个基于差分集的码本来实现的,以实现韦尔奇界。我们证明了这样得到的紧框架与定义WAF的小波变换有关。
{"title":"Group-Theoretic Wideband Radar Waveform Design","authors":"K. Mishra, Samuel Pinilla, A. Pezeshki, A. Calderbank","doi":"10.48550/arXiv.2207.00959","DOIUrl":"https://doi.org/10.48550/arXiv.2207.00959","url":null,"abstract":"We investigate the theory of affine groups in the context of designing radar waveforms that obey the desired wideband ambiguity function (WAF). The WAF is obtained by correlating the signal with its time-dilated, Doppler-shifted, and delayed replicas. We consider the WAF definition as a coefficient function of the unitary representation of the group a • x + b. This is essentially an algebraic problem applied to the radar waveform design. Prior works on this subject largely analyzed narrow-band ambiguity functions. Here, we show that when the underlying wideband signal of interest is a pulse or pulse train, a tight frame can be built to design that waveform. Specifically, we design the radar signals by minimizing the ratio of bounding constants of the frame in order to obtain lower sidelobes in the WAF. This minimization is performed by building a codebook based on difference sets in order to achieve the Welch bound. We show that the tight frame so obtained is connected with the wavelet transform that defines the WAF.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114729974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Rate-Energy Optimal Probabilistic Shaping Using Linear Codes 使用线性码的率-能量最优概率整形
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834402
Maxim Goukhshtein, S. Draper, J. Mitra
Probabilistic shaping methods induce a desired nonuniform distribution on the transmitted symbols in order to realize a favorable trade-off between the communication rate and average transmission energy. In this work, we study a probabilistic shaping architecture wherein the central component is a binary linear code, employed as a lossy source code. The rate-distortion performance of the linear code directly determines the realized shaping rate-energy performance. We use this connection to establish the rate-energy optimality of the investigated shaping architecture. Although the primary focus of this paper is on shaping for two-symbol alphabets, extensions to non-binary alphabets will be briefly discussed.
概率整形方法在传输符号上诱导出理想的非均匀分布,以实现通信速率和平均传输能量之间的良好权衡。在这项工作中,我们研究了一个概率整形架构,其中中心组件是一个二进制线性代码,用作有损源代码。线性码的率失真性能直接决定了实现的整形率能量性能。我们使用这种联系来建立所研究的成形结构的速率-能量最优性。虽然本文的主要焦点是在塑造双符号字母,扩展到非二进制字母将简要讨论。
{"title":"Rate-Energy Optimal Probabilistic Shaping Using Linear Codes","authors":"Maxim Goukhshtein, S. Draper, J. Mitra","doi":"10.1109/ISIT50566.2022.9834402","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834402","url":null,"abstract":"Probabilistic shaping methods induce a desired nonuniform distribution on the transmitted symbols in order to realize a favorable trade-off between the communication rate and average transmission energy. In this work, we study a probabilistic shaping architecture wherein the central component is a binary linear code, employed as a lossy source code. The rate-distortion performance of the linear code directly determines the realized shaping rate-energy performance. We use this connection to establish the rate-energy optimality of the investigated shaping architecture. Although the primary focus of this paper is on shaping for two-symbol alphabets, extensions to non-binary alphabets will be briefly discussed.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115327467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint Coding for Discrete Sources and Finite-State Noiseless Channels 离散源和有限状态无噪声信道的联合编码
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834437
K. Iwata, Hirosuke Yamamoto
We propose a joint coding scheme using multiple code tables to efficiently transmit a sequence of messages of a discrete memoryless source (DMS) through a finite-state noiseless channel with unequal costs of code letters, which includes a noiseless (d, k)-constrained channel as a particular case. This paper presents a methodology for code design based on two methods. The first method, integer programming, is used to optimize a prefix-free code at each channel state when codeword costs are unequal and vary with each state. The second method is an iterative optimization that minimizes the average cost of the joint coding scheme using multiple code tables. The proposed coding scheme achieves the optimal average cost in the class of joint coding schemes using multiple code tables of prefix-free codes for a given pair of DMS and finite-state channel.
我们提出了一种使用多个码表的联合编码方案,通过具有不等码字母代价的有限状态无噪声信道有效地传输离散无记忆源(DMS)的消息序列,其中包括作为特殊情况的无噪声(d, k)约束信道。本文提出了一种基于两种方法的代码设计方法。第一种方法是整数规划,用于在码字代价不相等且随状态变化的情况下,对每个信道状态下的无前缀码进行优化。第二种方法是迭代优化,使用多个码表最小化联合编码方案的平均成本。对于给定的DMS对和有限状态信道,所提出的编码方案在使用多个无前缀码表的联合编码方案中实现了最优的平均开销。
{"title":"Joint Coding for Discrete Sources and Finite-State Noiseless Channels","authors":"K. Iwata, Hirosuke Yamamoto","doi":"10.1109/ISIT50566.2022.9834437","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834437","url":null,"abstract":"We propose a joint coding scheme using multiple code tables to efficiently transmit a sequence of messages of a discrete memoryless source (DMS) through a finite-state noiseless channel with unequal costs of code letters, which includes a noiseless (d, k)-constrained channel as a particular case. This paper presents a methodology for code design based on two methods. The first method, integer programming, is used to optimize a prefix-free code at each channel state when codeword costs are unequal and vary with each state. The second method is an iterative optimization that minimizes the average cost of the joint coding scheme using multiple code tables. The proposed coding scheme achieves the optimal average cost in the class of joint coding schemes using multiple code tables of prefix-free codes for a given pair of DMS and finite-state channel.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121482838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Average Coverage Probability for Base-Station-to-UAV Communications Over 6G Multiple Access Wireless Networks 6G多址无线网络上基站到无人机通信的平均覆盖概率
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834607
Xi Zhang, Qixuan Zhu, H. Poor
While the fifth generation (5G) of wireless networks is currently being rolled out, wireless networks still need further development to meet the requirements of dramatically increasing numbers of users and new applications and the resulting traffic expected in the coming decade and beyond. The sixth generation (6G) of wireless networks is envisioned to respond to this by providing services with massive access, ultra-reliability, low latency, intelligence, and security while maximizing the spectral/energy/cost efficiency. Unmanned aerial vehicles (UAVs) have attracted considerable research attention due to their mobility and ability to line-of-sight (LoS) coverage in areas that suffer from low channel quality. However, how to characterize a UAV’s coverage area is a challenging problem and has not been thoroughly studied. To address this issue, in this paper we investigate the coverage performance of base station (BS) to UAV communications with a number of interfering mobile users. We first establish a Nakagami-m fading channel model for BS-toUAV wireless communications. Then, we derive a closed-form expression for the UAV’s average coverage probability under the scenario of interfering mobile users. Finally, numerical results confirm our derived analytical results and evaluate the UAV’s performance under different scenarios that anticipate 6G wireless networking models.
虽然第五代(5G)无线网络目前正在推出,但无线网络仍需要进一步发展,以满足未来十年乃至更长时间内急剧增加的用户数量和新应用以及由此产生的流量的需求。预计第六代(6G)无线网络将通过提供大规模访问、超可靠性、低延迟、智能和安全的服务来应对这一问题,同时最大限度地提高频谱/能源/成本效率。无人驾驶飞行器(uav)由于其机动性和在低信道质量区域的视距(LoS)覆盖能力而引起了广泛的研究关注。然而,如何对无人机的覆盖区域进行表征是一个具有挑战性的问题,目前还没有得到深入的研究。为了解决这一问题,在本文中,我们研究了基站(BS)对无人机通信的覆盖性能与一些干扰移动用户。首先建立了BS-toUAV无线通信的Nakagami-m衰落信道模型。然后,导出了移动用户干扰情况下无人机平均覆盖概率的封闭表达式。最后,数值结果验证了我们的推导分析结果,并评估了无人机在不同场景下的性能,预测了6G无线网络模型。
{"title":"Average Coverage Probability for Base-Station-to-UAV Communications Over 6G Multiple Access Wireless Networks","authors":"Xi Zhang, Qixuan Zhu, H. Poor","doi":"10.1109/ISIT50566.2022.9834607","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834607","url":null,"abstract":"While the fifth generation (5G) of wireless networks is currently being rolled out, wireless networks still need further development to meet the requirements of dramatically increasing numbers of users and new applications and the resulting traffic expected in the coming decade and beyond. The sixth generation (6G) of wireless networks is envisioned to respond to this by providing services with massive access, ultra-reliability, low latency, intelligence, and security while maximizing the spectral/energy/cost efficiency. Unmanned aerial vehicles (UAVs) have attracted considerable research attention due to their mobility and ability to line-of-sight (LoS) coverage in areas that suffer from low channel quality. However, how to characterize a UAV’s coverage area is a challenging problem and has not been thoroughly studied. To address this issue, in this paper we investigate the coverage performance of base station (BS) to UAV communications with a number of interfering mobile users. We first establish a Nakagami-m fading channel model for BS-toUAV wireless communications. Then, we derive a closed-form expression for the UAV’s average coverage probability under the scenario of interfering mobile users. Finally, numerical results confirm our derived analytical results and evaluate the UAV’s performance under different scenarios that anticipate 6G wireless networking models.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123286979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1