首页 > 最新文献

2013 13th Canadian Workshop on Information Theory最新文献

英文 中文
Low and high-delay source-channel coding with bandwidth expansion and correlated interference 具有带宽扩展和相关干扰的低延迟和高延迟源信道编码
Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621593
A. Saleh, W. Chan, F. Alajaji
We consider the problem of sending a Gaussian source over an additive white Gaussian noise channel with Gaussian correlated interference known to the transmitter. We study both low-delay and asymptotically high-delay (in the sense of infinite source and coding block lengths) joint source-channel coding schemes based on purely analog and hybrid-digital analog (HDA) schemes with bandwidth expansion, respectively. The achievable (square error) distortion region of these schemes under matched and mismatched noise power is analyzed. The low-delay scheme uses a non-parametric analog mapping that is designed using a joint optimization of the encoder and the decoder. Numerical results show that the non-parametric approach adapts better to the interference than the classical linear scheme. For the high-delay regime, we establish a lower bound on the system's distortion and propose a layered HDA scheme based on Wyner-Ziv and HDA Costa coding. The proposed HDA scheme is shown to perform close to the derived bound and to be resilient under noise mismatch.
我们考虑了在发射器已知高斯相关干扰的加性高斯白噪声信道上发送高斯源的问题。我们分别研究了基于纯模拟和混合数字模拟(HDA)方案的低延迟和渐近高延迟(在无限源和编码块长度的意义上)联合源信道编码方案。分析了这些方案在匹配和不匹配噪声功率下可实现的(平方误差)失真区域。低延迟方案使用非参数模拟映射,该映射是通过编码器和解码器的联合优化设计的。数值结果表明,与传统的线性格式相比,非参数格式具有更好的抗干扰能力。在高延迟状态下,建立了系统失真的下界,提出了基于Wyner-Ziv和HDA Costa编码的分层HDA方案。结果表明,所提出的HDA方案在噪声失配情况下具有较强的弹性,性能接近于推导出的边界。
{"title":"Low and high-delay source-channel coding with bandwidth expansion and correlated interference","authors":"A. Saleh, W. Chan, F. Alajaji","doi":"10.1109/CWIT.2013.6621593","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621593","url":null,"abstract":"We consider the problem of sending a Gaussian source over an additive white Gaussian noise channel with Gaussian correlated interference known to the transmitter. We study both low-delay and asymptotically high-delay (in the sense of infinite source and coding block lengths) joint source-channel coding schemes based on purely analog and hybrid-digital analog (HDA) schemes with bandwidth expansion, respectively. The achievable (square error) distortion region of these schemes under matched and mismatched noise power is analyzed. The low-delay scheme uses a non-parametric analog mapping that is designed using a joint optimization of the encoder and the decoder. Numerical results show that the non-parametric approach adapts better to the interference than the classical linear scheme. For the high-delay regime, we establish a lower bound on the system's distortion and propose a layered HDA scheme based on Wyner-Ziv and HDA Costa coding. The proposed HDA scheme is shown to perform close to the derived bound and to be resilient under noise mismatch.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved systematic fountain codes in AWGN channel 改进了AWGN通道的系统喷泉码
Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621610
Khaled F. Hayajneh, S. Yousefi
Fountain codes are typically defined solely based on the right degree distributions which are Soliton or Soliton-like in most cases. In this paper, we consider Fountain encoders for the Gaussian channel and improve their performance by shaping the resulting left degree distributions away from Poisson. The proposed Fountain encoders achieve lower left degree variance at the same average degree. This in turn improves the growth of the so-called ripple in the BP decoding. The new encoders outperform the traditional ones in terms of overhead, error rate, and decoding complexity.
喷泉码通常仅根据在大多数情况下是孤子或类孤子的正确度分布来定义。在本文中,我们考虑了用于高斯信道的喷泉编码器,并通过使产生的左度分布远离泊松来改善它们的性能。所提出的喷泉编码器在相同的平均度下实现了较低的左度方差。这反过来又改善了BP解码中所谓纹波的增长。新的编码器在开销、错误率和解码复杂性方面优于传统编码器。
{"title":"Improved systematic fountain codes in AWGN channel","authors":"Khaled F. Hayajneh, S. Yousefi","doi":"10.1109/CWIT.2013.6621610","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621610","url":null,"abstract":"Fountain codes are typically defined solely based on the right degree distributions which are Soliton or Soliton-like in most cases. In this paper, we consider Fountain encoders for the Gaussian channel and improve their performance by shaping the resulting left degree distributions away from Poisson. The proposed Fountain encoders achieve lower left degree variance at the same average degree. This in turn improves the growth of the so-called ripple in the BP decoding. The new encoders outperform the traditional ones in terms of overhead, error rate, and decoding complexity.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124233273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Binary faster than Nyquist optical transmission via non-uniform power allocation 通过非均匀功率分配,二进制比奈奎斯特光传输更快
Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621616
Yong Jin Daniel Kim, J. Bajcsy
Recently, faster-than-Nyquist (FTN) signaling (or also sub-Nyquist filtering) has been proposed as a means to increase the spectral efficiency of the next generation long-haul optical fiber transmission systems. In the high spectral efficiency regime, however, the severe intersymbol interference (ISI) inherent to the FTN signaling poses a significant challenge in implementing a practical FTN system. In this work, we propose to use non-uniform power allocation at the optical FTN transmitter and establish its optimality in the achievable capacity. Consequently, we utilize the non-uniform power allocation to design a low-complexity FTN receiver that can operate close to the channel capacity limit. Presented simulation results also illustrate that the proposed optical FTN signaling transceiver with non-uniform power allocation allows supporting very high spectral efficiencies.
近年来,超奈奎斯特(FTN)信号(或亚奈奎斯特滤波)被提出作为提高下一代长途光纤传输系统频谱效率的一种手段。然而,在高频谱效率下,FTN信令固有的严重码间干扰(ISI)对实现实际FTN系统提出了重大挑战。在这项工作中,我们提出在光FTN发射机中使用非均匀功率分配,并在可实现的容量中建立其最优性。因此,我们利用非均匀功率分配来设计一种低复杂度的FTN接收器,该接收器可以接近信道容量限制。仿真结果还表明,采用非均匀功率分配的光FTN信令收发器可以支持非常高的频谱效率。
{"title":"Binary faster than Nyquist optical transmission via non-uniform power allocation","authors":"Yong Jin Daniel Kim, J. Bajcsy","doi":"10.1109/CWIT.2013.6621616","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621616","url":null,"abstract":"Recently, faster-than-Nyquist (FTN) signaling (or also sub-Nyquist filtering) has been proposed as a means to increase the spectral efficiency of the next generation long-haul optical fiber transmission systems. In the high spectral efficiency regime, however, the severe intersymbol interference (ISI) inherent to the FTN signaling poses a significant challenge in implementing a practical FTN system. In this work, we propose to use non-uniform power allocation at the optical FTN transmitter and establish its optimality in the achievable capacity. Consequently, we utilize the non-uniform power allocation to design a low-complexity FTN receiver that can operate close to the channel capacity limit. Presented simulation results also illustrate that the proposed optical FTN signaling transceiver with non-uniform power allocation allows supporting very high spectral efficiencies.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116890834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Turbo code using adaptive puncturing for transform domain Wyner-Ziv video coding 采用自适应穿刺的Turbo码变换域Wyner-Ziv视频编码
Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621595
M. H. Taieb, J. Chouinard, Demin Wang
In most DVC architectures presented in the literature, the puncturing mechanism operates according to a periodic pattern that spreads uniformly the turbo generated parity bits and discards all the systematic bits. These latter are replaced by the receiver side information (SI) during the turbo decoding process. The side information is generated by a block based motion interpolation algorithm that can, furthermore, predict whether or not each block is well interpolated. Thus, instead of uniformly dispersing the parity bits over the whole turbo code trellis, they can be directed to the most corrupted regions. If the side information displays regions that appear to be even more highly corrupted, systematic bits can likewise be guided adaptively towards these regions. In this paper, an adaptive puncturing scheme is proposed. A classification of the corrupted parts of each DCT band of the interpolated frame is performed and then an adaptive puncturing mechanism is employed for a more efficient parity and systematic bits repartition. Simulation results show that the adaptive puncturing scheme can provide as much as 20 % of Wyner-Ziv bitrate reduction: this is reflected by a PSNR vs bit rate performance improvement of up to 1.8 dB.
在文献中提出的大多数DVC体系结构中,穿刺机制根据周期性模式操作,该模式均匀地传播turbo生成的奇偶校验位并丢弃所有系统位。在turbo解码过程中,后者被接收端信息(SI)所取代。侧面信息由基于块的运动插值算法生成,该算法可以进一步预测每个块是否被很好地插值。因此,与其将奇偶校验位均匀地分散在整个turbo码网格上,不如将它们定向到损坏最严重的区域。如果侧信息显示的区域似乎是更严重的损坏,系统比特也可以自适应地引导到这些区域。本文提出了一种自适应穿刺方案。首先对插值帧的每个DCT频带的损坏部分进行分类,然后采用自适应穿刺机制进行更有效的奇偶校验和系统的位重划分。仿真结果表明,自适应穿刺方案可以提供多达20%的Wyner-Ziv比特率降低:这反映在PSNR对比特率的性能提高高达1.8 dB。
{"title":"Turbo code using adaptive puncturing for transform domain Wyner-Ziv video coding","authors":"M. H. Taieb, J. Chouinard, Demin Wang","doi":"10.1109/CWIT.2013.6621595","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621595","url":null,"abstract":"In most DVC architectures presented in the literature, the puncturing mechanism operates according to a periodic pattern that spreads uniformly the turbo generated parity bits and discards all the systematic bits. These latter are replaced by the receiver side information (SI) during the turbo decoding process. The side information is generated by a block based motion interpolation algorithm that can, furthermore, predict whether or not each block is well interpolated. Thus, instead of uniformly dispersing the parity bits over the whole turbo code trellis, they can be directed to the most corrupted regions. If the side information displays regions that appear to be even more highly corrupted, systematic bits can likewise be guided adaptively towards these regions. In this paper, an adaptive puncturing scheme is proposed. A classification of the corrupted parts of each DCT band of the interpolated frame is performed and then an adaptive puncturing mechanism is employed for a more efficient parity and systematic bits repartition. Simulation results show that the adaptive puncturing scheme can provide as much as 20 % of Wyner-Ziv bitrate reduction: this is reflected by a PSNR vs bit rate performance improvement of up to 1.8 dB.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116954964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On optimal detection ordering for coded V-BLAST 编码V-BLAST的最优检测排序
Pub Date : 2013-06-18 DOI: 10.1109/cwit.2013.6621587
Alain U. Toboso, S. Loyka, F. Gagnon
Optimum ordering strategies for the coded V-BLAST with capacity achieving temporal codes on each stream are analytically studied in this paper, including optimal power and/or rate allocations among data streams. A compact closed-form solution is obtained for the case of two transmit antennas and necessary optimality conditions are found for the general case. The optimal rate allocation is shown to have a major impact (stronger streams are detected last) while the optimal power allocation does not alter the original Foschini ordering (stronger streams are detected first). A sub-optimal ordering is proposed based on the necessary optimality conditions, which performs very close to the optimal one but has much smaller computational complexity. An SNR gain of ordering is introduced and studied. All the results also apply to a multiple-access channel under successive interference cancelation.
本文分析研究了容量在每个流上实现时间码的编码V-BLAST的最优排序策略,包括数据流之间的最优功率和/或速率分配。得到了双发射天线情况下的紧致闭解,并找到了一般情况下的必要最优性条件。最优的速率分配显示有主要的影响(较强的流被检测到最后),而最优的功率分配不改变原来的Foschini排序(较强的流被检测到第一)。基于必要的最优性条件,提出了一种次最优排序,其性能非常接近最优排序,但计算复杂度要小得多。介绍并研究了一种排序信噪比增益。所有结果也适用于连续干扰消除的多址信道。
{"title":"On optimal detection ordering for coded V-BLAST","authors":"Alain U. Toboso, S. Loyka, F. Gagnon","doi":"10.1109/cwit.2013.6621587","DOIUrl":"https://doi.org/10.1109/cwit.2013.6621587","url":null,"abstract":"Optimum ordering strategies for the coded V-BLAST with capacity achieving temporal codes on each stream are analytically studied in this paper, including optimal power and/or rate allocations among data streams. A compact closed-form solution is obtained for the case of two transmit antennas and necessary optimality conditions are found for the general case. The optimal rate allocation is shown to have a major impact (stronger streams are detected last) while the optimal power allocation does not alter the original Foschini ordering (stronger streams are detected first). A sub-optimal ordering is proposed based on the necessary optimality conditions, which performs very close to the optimal one but has much smaller computational complexity. An SNR gain of ordering is introduced and studied. All the results also apply to a multiple-access channel under successive interference cancelation.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128250578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An efficient Soliton-like network coding protocol for the resource-constrained Y-network 一种资源受限的类孤子网络编码协议
Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621613
Andrew Liau, Il Kim, S. Yousefi
Originally designed for point-to-point transmissions, fountain codes are capacity-achieving codes over a binary erasure channel. On the other hand, network coding is an optimal multihop data dissemination protocol whose high decoding complexity makes it too expensive for resource-constrained applications. Soliton-like rateless coding (SLRC) has previously combined network and fountain coding paradigms such that a less complex decoder can be applied. Specifically, the coding done at an intermediate relay node allows a belief propagation decoder to be efficiently applied. We extend the SLRC protocol and propose the Improved Soliton-like Rateless Coding (ISLRC) protocol. In ISLRC, the relay applies intelligent coding and shapes the degree distribution such that performance is better than SLRC. In addition, ISLRCs performance gains are achieved using fewer resources than SLRC while maintaining all the key properties of SLRC. Simulation results show that even under the worst-case scenario of ISLRC, better performance can be achieved compared to SLRC and other existing schemes.
喷泉码最初设计用于点对点传输,是通过二进制擦除信道实现容量的代码。另一方面,网络编码是一种最优的多跳数据传播协议,但其解码复杂度高,对于资源受限的应用来说成本过高。类孤子无速率编码(SLRC)以前结合了网络和喷泉编码范式,这样就可以应用一个不太复杂的解码器。具体来说,在中间中继节点上完成的编码允许有效地应用信念传播解码器。对SLRC协议进行了扩展,提出了改进的类孤子无速率编码(ISLRC)协议。在ISLRC中,继电器采用智能编码,并对度分布进行了整形,使其性能优于SLRC。此外,islrc使用比SLRC更少的资源实现了性能提升,同时保持了SLRC的所有关键特性。仿真结果表明,即使在最坏的情况下,与SLRC和其他现有方案相比,ISLRC也能取得更好的性能。
{"title":"An efficient Soliton-like network coding protocol for the resource-constrained Y-network","authors":"Andrew Liau, Il Kim, S. Yousefi","doi":"10.1109/CWIT.2013.6621613","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621613","url":null,"abstract":"Originally designed for point-to-point transmissions, fountain codes are capacity-achieving codes over a binary erasure channel. On the other hand, network coding is an optimal multihop data dissemination protocol whose high decoding complexity makes it too expensive for resource-constrained applications. Soliton-like rateless coding (SLRC) has previously combined network and fountain coding paradigms such that a less complex decoder can be applied. Specifically, the coding done at an intermediate relay node allows a belief propagation decoder to be efficiently applied. We extend the SLRC protocol and propose the Improved Soliton-like Rateless Coding (ISLRC) protocol. In ISLRC, the relay applies intelligent coding and shapes the degree distribution such that performance is better than SLRC. In addition, ISLRCs performance gains are achieved using fewer resources than SLRC while maintaining all the key properties of SLRC. Simulation results show that even under the worst-case scenario of ISLRC, better performance can be achieved compared to SLRC and other existing schemes.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130299947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the reserved sub-carrier approach to achieving N-continuity for side-lobe reduction in OFDM 在OFDM中实现n -连续性旁瓣消减的保留子载波方法
Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621622
Jesse Haber-Kucharsky, E. Alian, P. Mitran
Orthogonal frequency division multiplexing (OFDM) is a popular modulation scheme used in a variety of applications. One significant problem associated with OFDM is the possibility of large side-lobes in its spectrum. In this paper, we consider the so-called N-continuous method for reducing the side-lobes. We first consider one implementation approach, whereby certain sub-carriers are reserved for the purpose of adjusting the spectrum of an OFDM symbol. We find that significant side-lobe reduction is possible, although at the cost of injecting very large power in the reserved sub-carriers that results in unacceptable spectrum overshoot. In order to achieve reasonable power levels, at least 20% of all sub-carriers must be reserved for weighting. As a solution to the problem of spectrum overshoot, we propose an alternative approach whereby the power of the reserved sub-carriers is constrained. Numerical results show that reasonable power levels are achieved at the cost of significant performance loss in the N-continuous OFDM technique for side-lobe reduction. We thus find that the performance cost of eliminating the spectrum overshoot reduces the side-lobes reduction to less than 5 dB in cases of interest.
正交频分复用(OFDM)是一种广泛应用的调制方案。与OFDM相关的一个重要问题是其频谱中可能存在较大的副瓣。在本文中,我们考虑了所谓的n连续方法来减少旁瓣。我们首先考虑一种实现方法,其中保留某些子载波用于调整OFDM符号的频谱。我们发现显著的旁瓣减小是可能的,尽管代价是在保留的子载波中注入非常大的功率,从而导致不可接受的频谱超调。为了达到合理的功率水平,必须保留至少20%的子载波用于加权。作为频谱超调问题的解决方案,我们提出了一种替代方法,即限制保留子载波的功率。数值结果表明,在n连续OFDM技术中,以显著的性能损失为代价获得了合理的功率水平。因此,我们发现消除频谱超调的性能成本在感兴趣的情况下将旁瓣减小到小于5 dB。
{"title":"On the reserved sub-carrier approach to achieving N-continuity for side-lobe reduction in OFDM","authors":"Jesse Haber-Kucharsky, E. Alian, P. Mitran","doi":"10.1109/CWIT.2013.6621622","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621622","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is a popular modulation scheme used in a variety of applications. One significant problem associated with OFDM is the possibility of large side-lobes in its spectrum. In this paper, we consider the so-called N-continuous method for reducing the side-lobes. We first consider one implementation approach, whereby certain sub-carriers are reserved for the purpose of adjusting the spectrum of an OFDM symbol. We find that significant side-lobe reduction is possible, although at the cost of injecting very large power in the reserved sub-carriers that results in unacceptable spectrum overshoot. In order to achieve reasonable power levels, at least 20% of all sub-carriers must be reserved for weighting. As a solution to the problem of spectrum overshoot, we propose an alternative approach whereby the power of the reserved sub-carriers is constrained. Numerical results show that reasonable power levels are achieved at the cost of significant performance loss in the N-continuous OFDM technique for side-lobe reduction. We thus find that the performance cost of eliminating the spectrum overshoot reduces the side-lobes reduction to less than 5 dB in cases of interest.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126051090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrating prior knowledge in time series alignment: Prior Optimized Time Warping 在时间序列比对中整合先验知识:先验优化时间翘曲
Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621621
Xiaoguang Yan, W. Gage, A. Eckford
In this paper, we propose Prior Optimized Time Warping (POTW) algorithm, which allows user to integrate prior knowledge by marking out pairs of matching sub-sequences from the sequences to be aligned. To relieve users of the task of guaranteeing the full accuracy of the marking, a certainty coefficient reflecting the certainty of the matching can also be specified for each marked pairs. POTW will then look for the best alignment based on the two sequences and the given matching pairs. POTW is an extension of existing align algorithm, and in the absence of prior knowledge, is able to independently find the best alignment of two sequences. We apply our algorithm to walk sequences from CMU motion capture database, as well as UJI pen characters dataset to demonstrate its ability to allow easy and effective integration of prior knowledge.
在本文中,我们提出了先验优化时间翘曲(POTW)算法,该算法允许用户通过从要对齐的序列中标记出匹配的子序列对来整合先验知识。为了减轻用户保证标记完全准确的任务,还可以为每个标记对指定反映匹配确定性的确定性系数。然后,POTW将根据两个序列和给定的匹配对寻找最佳对齐。POTW是现有对齐算法的扩展,在没有先验知识的情况下,能够独立地找到两个序列的最佳对齐。我们将该算法应用于来自CMU运动捕捉数据库的行走序列,以及UJI笔字符数据集,以证明其能够轻松有效地集成先验知识。
{"title":"Integrating prior knowledge in time series alignment: Prior Optimized Time Warping","authors":"Xiaoguang Yan, W. Gage, A. Eckford","doi":"10.1109/CWIT.2013.6621621","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621621","url":null,"abstract":"In this paper, we propose Prior Optimized Time Warping (POTW) algorithm, which allows user to integrate prior knowledge by marking out pairs of matching sub-sequences from the sequences to be aligned. To relieve users of the task of guaranteeing the full accuracy of the marking, a certainty coefficient reflecting the certainty of the matching can also be specified for each marked pairs. POTW will then look for the best alignment based on the two sequences and the given matching pairs. POTW is an extension of existing align algorithm, and in the absence of prior knowledge, is able to independently find the best alignment of two sequences. We apply our algorithm to walk sequences from CMU motion capture database, as well as UJI pen characters dataset to demonstrate its ability to allow easy and effective integration of prior knowledge.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115256197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An enhanced cross-layer authentication mechanism for wireless communications based on PER and RSSI 一种基于PER和RSSI的增强无线通信跨层认证机制
Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621590
Peng Hao, Xianbin Wang, A. Refaey
Recently physical layer attributes and statistics have been exploited in securing wireless communications. However, one major obstacle of physical layer security techniques is that not all of these attributes are accessible in practical wireless communication platforms. More precisely, once the hardware of a physical transceiver is implemented, most of the physical layer attributes are not accessible due to the highly integrated circuits. Consequently, it becomes essential to develop implementable security enhancement techniques by utilizing all available attributes and statistics at different layers of wireless communication networks. In this paper, we consider the packet error rate (PER) and the received signal strength indicator (RSSI) in IEEE 802.11 networks to improve the wireless communication security. These two unique user and environment dependent attributes are readily available in most of the currently deployed IEEE 802.11 platforms. To enhance the spoofing attack detection capability, we propose a practical authentication scheme by monitoring and analyzing the PER and RSSI at the same time. The hypothesis testing model for the proposed authentication using PER and RSSI as two testing variables is presented. In addition, a decision rule for authentication, which is able to differentiate between a legitimate transmitter and a potential attacker by combining both attributes together, is developed. To evaluate the feasibility of our proposed scheme, lab experiments have been conducted using an IEEE 802.11g Atheros platform. The proposed authentication technique is validated by the experimental and simulation data. Our final authentication results confirm the improved spoofing detecting capability of the proposed technique over the single-variable based authentication.
最近物理层属性和统计数据被用于保护无线通信。然而,物理层安全技术的一个主要障碍是在实际的无线通信平台中并非所有这些属性都是可访问的。更准确地说,一旦实现了物理收发器的硬件,由于高度集成电路,大多数物理层属性是不可访问的。因此,通过在无线通信网络的不同层利用所有可用的属性和统计数据来开发可实现的安全增强技术变得至关重要。本文考虑了IEEE 802.11网络中的分组错误率(PER)和接收信号强度指标(RSSI)来提高无线通信的安全性。这两个与用户和环境相关的独特属性在大多数当前部署的IEEE 802.11平台中都很容易获得。为了提高欺骗攻击检测能力,我们提出了一种同时监控和分析PER和RSSI的实用认证方案。提出了以PER和RSSI为两个检验变量的假设检验模型。此外,还开发了一种身份验证决策规则,该规则能够通过组合合法发送者和潜在攻击者的属性来区分合法发送者和潜在攻击者。为了评估我们提出的方案的可行性,使用IEEE 802.11g Atheros平台进行了实验室实验。实验和仿真数据验证了该方法的有效性。我们的最终认证结果证实,与基于单变量的认证相比,所提出的技术具有更好的欺骗检测能力。
{"title":"An enhanced cross-layer authentication mechanism for wireless communications based on PER and RSSI","authors":"Peng Hao, Xianbin Wang, A. Refaey","doi":"10.1109/CWIT.2013.6621590","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621590","url":null,"abstract":"Recently physical layer attributes and statistics have been exploited in securing wireless communications. However, one major obstacle of physical layer security techniques is that not all of these attributes are accessible in practical wireless communication platforms. More precisely, once the hardware of a physical transceiver is implemented, most of the physical layer attributes are not accessible due to the highly integrated circuits. Consequently, it becomes essential to develop implementable security enhancement techniques by utilizing all available attributes and statistics at different layers of wireless communication networks. In this paper, we consider the packet error rate (PER) and the received signal strength indicator (RSSI) in IEEE 802.11 networks to improve the wireless communication security. These two unique user and environment dependent attributes are readily available in most of the currently deployed IEEE 802.11 platforms. To enhance the spoofing attack detection capability, we propose a practical authentication scheme by monitoring and analyzing the PER and RSSI at the same time. The hypothesis testing model for the proposed authentication using PER and RSSI as two testing variables is presented. In addition, a decision rule for authentication, which is able to differentiate between a legitimate transmitter and a potential attacker by combining both attributes together, is developed. To evaluate the feasibility of our proposed scheme, lab experiments have been conducted using an IEEE 802.11g Atheros platform. The proposed authentication technique is validated by the experimental and simulation data. Our final authentication results confirm the improved spoofing detecting capability of the proposed technique over the single-variable based authentication.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131115290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Approximate bounds for limited backhaul uplink multicell processing with single-user compression 单用户压缩下有限回程上行多小区处理的近似边界
Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621603
Yuhan Zhou, Wei Yu
This paper studies single-user compression for the uplink multi-cell processing (MCP) model where multiple base-stations are connected to a central processor via noiseless backhaul links with a sum capacity constraint. The proposed scheme is based on the virtual multiple-access channel (V-MAC) architecture, where the base-stations quantize the received signals and send the quantized bits to the central processor, and at the decoder side the central processor first recovers the quantized signals then decodes the user messages in a successive manner. This paper focuses on the use of single-user compression in the V-MAC architecture, which is significantly simpler to implement than Wyner-Ziv compression. The main result of this paper is that single-user compression can achieve the sum capacity of the MCP model to within a constant gap under two specific scenarios. First, we define a diagonally dominant channel criterion and show the constant-gap result for the case when the covariance matrix of the received signals across the base-stations is κ-strictly diagonally dominant for some constant κ > 1. Second, we show that the constant-gap result holds for a special class of Wyner channel models in the weak interference regime.
本文研究了上行多单元处理(MCP)模型的单用户压缩,其中多个基站通过具有和容量约束的无噪声回程链路连接到中央处理器。该方案基于虚拟多址信道(virtual multi -access channel, V-MAC)架构,基站对接收到的信号进行量化,并将量化后的比特发送给中央处理器,在解码器端,中央处理器首先对量化后的信号进行恢复,然后对用户报文进行逐次解码。本文关注的是单用户压缩在V-MAC架构中的使用,它比Wyner-Ziv压缩更容易实现。本文的主要结果是,在两种特定场景下,单用户压缩可以实现MCP模型的容量总和在一个恒定的间隙内。首先,我们定义了一个对角占优的信道准则,并给出了在某些常数κ > 1的情况下,跨基站接收信号的协方差矩阵是κ-严格对角占优的情况下的常间隙结果。其次,我们证明了在弱干扰条件下一类特殊的Wyner信道模型的常隙结果是成立的。
{"title":"Approximate bounds for limited backhaul uplink multicell processing with single-user compression","authors":"Yuhan Zhou, Wei Yu","doi":"10.1109/CWIT.2013.6621603","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621603","url":null,"abstract":"This paper studies single-user compression for the uplink multi-cell processing (MCP) model where multiple base-stations are connected to a central processor via noiseless backhaul links with a sum capacity constraint. The proposed scheme is based on the virtual multiple-access channel (V-MAC) architecture, where the base-stations quantize the received signals and send the quantized bits to the central processor, and at the decoder side the central processor first recovers the quantized signals then decodes the user messages in a successive manner. This paper focuses on the use of single-user compression in the V-MAC architecture, which is significantly simpler to implement than Wyner-Ziv compression. The main result of this paper is that single-user compression can achieve the sum capacity of the MCP model to within a constant gap under two specific scenarios. First, we define a diagonally dominant channel criterion and show the constant-gap result for the case when the covariance matrix of the received signals across the base-stations is κ-strictly diagonally dominant for some constant κ > 1. Second, we show that the constant-gap result holds for a special class of Wyner channel models in the weak interference regime.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134361712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2013 13th Canadian Workshop on Information Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1