The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The model of revenues in the self-similar traffic, characterized by the presence of long term dependencies in the traffic routes and the presence of a pulsating structure on many time scales that can adequately reflect the characteristics of network traffic. The models calculate the buffer storage network nodes, which are more realistic in terms of self-similar traffic.
This paper considers a problem of anonymous transmission in physical-layer network coding against eavesdropping. The task is to organize data transmission so that an adversary can not determine who communicates with whom. It is achieved by making the messages to be untraceable. Scheme based on lattice coset coding strategy and lattice properties is proposed. The point of the scheme is to change input...
We consider the problem of finding a set S of vertices (code) of the Boolean n-cube having cardinality 2n−k and intersecting with maximum number of k-dimensional faces. We prove that the ratio between the numbers of the k-faces containing codewords and all k-faces is less than 1 − 1+o(1)/√2πk as n → ∞ for sufficiently large k. The solution of the problem in the class of linear codes is found. For...
We introduce a number of mathematical models for the management of an electrical power system in the presence of renewable generation. We also study the impact of power systems of neighbouring countries on the grid.
A specific noiseless multiple-access channel model is studied in this paper. Proofs for lower and upper bounds on the achievable-rate of corresponding codes are given.
The article is devoted to the work of ultra-wideband data transmission systems with pulse position modulation (Time Hopping Spread-Spectrum) in presence of Gaussian noise mixture (Tukey-Huber contamination model). We considered data transmission for the cases of known and unknown parameters of a noise mixture. The optimal decision-making algorithm for known parameters of a distortion is developed...
The minimal Hamming distance between distinct p-ary bent functions of 2n variables is proved to be pn for any prime p. It is shown that the number of p-ary bent functions at the distance pn from the quadratic bent function is equal to pn(pn−1 + 1) ···(p + 1)(p−1) as p > 2.
Following the interest of the global research and industrial community in the concept of Internet of Things, IEEE 802 LAN/MAN standard committee is developing the IEEE 802.11ah amendment that will shift the Wi-Fi technology to the area of Machine-to-Machine communications. One of the most important problems considered by the new amendment is the energy-efficient communication of wireless stations,...
A new analytical method of constructing the inverse matrix to the check matrix of the system of embedded inner codes for the generalized error-locating codes is proposed.
The directed search algorithm, introduced originally for decoding of polar codes with Arikan kernel, is generalized to the case of a Reed-Solomon kernel. The algorithm relies heavily on the knowledge of symbol subchannel error probabilities of the polarizing transformation. A method to approximate these probabilities is suggested. The proposed method results in almost the same complexity and performance...
This article is devoted to a research of channel estimation methods for time domain equalization. For packet wireless data transmission system, an estimation approach based on mismatched filtering of pilot signals is proposed. Through simulations an efficiency of described approach compared with a conventional one is shown.
New constructions of multicomponent codes which have maximum cardinality due to Johnson upper bound are presented. Decoding algorithm is described. An example is given. The main performance is estimated.
In the previous works we have considered decoding coded FSK modulation (similar to Kautz-Singleton codes) transmitted in a channel with strong interference by using a two-sample goodness-of-fit statistics. In this work we consider the applicability of different one-sample goodness-of-fit statistics for the decoding. Using a computer simulation we show that using these statistics may yield lower error...
Pixel intensity prediction is one of significant parts used in most lossless image compression algorithms. A new method based on local adaptation and neighboring blocks data analysis is introduced in this paper. Proposed method belongs to a class of low-complexity methods to be appropriate for realtime compression systems. Description of algorithm is presented as optimization problem solution. Its...
In what follows a channel model that describes a class of communication systems employing a certain nonparametric receiver is considered. In particular a block coded transmission via the channel under consideration and soft-input mismatched decoding are considered. The paper deals with a problem of finding an upper bound on the probability of erroneous decoding. In order to obtain the bound in question...
In this paper an attack on McEliece cryptosystem is considered. In this system the private and public keys are generator matrices of equivalent codes, i.e. they differ by fixed (secret) permutation. At the same time it is known that for every code there are the group of permutations preserving the code. Such code's structure may be used for analysis of McEliece cryptosystem.
We describe generalized running key ciphers and apply them for analysis of two Shannon's methods. In particular, we suggest some estimation of the cipher equivocation and the probability of correct deciphering without key.
The paper studies the accuracy characteristics of radar object angular coordinates estimation fulfilled by the spatially multichannel procedures, which are based upon a ring shaped model of radar signal receiving and differ among themselves by redundancy factor. It is shown in analytical evaluation that the spatial processing structures of minimal and ultimate redundancies are equate by potential...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.