The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Secure data transfer is often achieved by encryption. However, if transmitting across a Binary Symmetric Channel while an eavesdropper listens via a Wiretap Channel, the difference in signal quality can be exploited to improve the inherent transmission secrecy. If this exploitation involves the managed use of erasures, then the secrecy of a code transmitted across the channel can be improved whilst...
Broadcasting Gaussian sources over a Gaussian broadcast channel is a major problem in information theory. Consider the problem of sending a correlated Gaussian source S= (S1, S2 … …. Sm) over a power limited Gaussian broadcast channel. User i (1,2,… m) observes the transmitted signal which is affected by Gaussian noise with power σ2i and desires to estimate Si. This paper aims to analyze the distortion...
This paper considers the problem of variable-length coding over a binary-input channel with noiseless feedback. A deterministic sequential coding scheme is proposed and shown to attain the optimal error exponent for any binary-input channel whose capacity is achieved by the uniform input distribution. The proposed scheme is deterministic and has only one phase of operation, in contrast to all previous...
Four protection schemes based on RS and Raptor code as well as FEC and hybrid FEC-ARQ are analyzed and compared for erasure channels in this paper. RS code is a classic block channel code while Raptor code is a new kind of rateless code, which can produce a potentially infinite stream of packets. FEC and hybrid FEC-ARQ schemes based on RS and Raptor code are described and compared in detail. Then...
We consider data-streaming from an access point to multiple receivers, which is modeled as packet erasure channel. A simple network coding is shown to achieve larger rate region than without network coding, using minimal control information. The performance is characterized exactly using state transition graph. The scheme is then mapped to an information theoretic formulation for broadcast channel...
Distributed video coding (DVC) technology is investigated and payed more and more attentions in wireless video applications because of characteristics of its encoder with low-complexity and decoder with high-complexity. Its coding types can be sorted the key and Wyner-Ziv frames, key frames are with conventional intra-coding mode, Wyner-Ziv frames are coded by an encoder that is composed of quantizer...
Some communication applications, like multimedia, deliver data of different importance classes allowing unequal error protection (UEP) levels. In this paper, a multiple-input multiple-output (MIMO) system using orthogonal frequency division multiplexing (OFDM) is considered with a new UEP bit-loading algorithm based on the non-UEP algorithm by Chow, Cioffi, and Bingham. In the proposed bit-loading...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.