The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we address the need for motivating applications, such as mission critical industrial control and medical applications, to operate under the Ultra-Reliable Communication (URC) mode in the future 5th Generation (5G) cellular wireless networks, while also under strict Quality of Service (QoS) constraints such as ultra-low latency. Reliability has been shown to improve by using Hybrid Automatic...
The neighbourhood area network (NAN) in smart grid (SG) is responsible for data exchange from smart meters (SMs) to the control center and vice versa. Efficient and reliable communication from a control center to individual SMs is an essential part of enabling a green power supply system. Different packet loss at SMs causes information delay. Network coding (NC) is a promising technique to improve...
A novel scheme is presented for encoding and decoding of Reed-Solomon codes of prime lengths. Encoding is performed on a collection of codewords which are mapped through Galois Fourier transform into a codeword in a low-density parity-check code with a binary parity-check matrix for transmission. Using this matrix, a binary iterative soft-decision decoding algorithm is applied to jointly decode a...
We derive upper and lower bounds on the reliability function for the discrete memoryless broadcast channel with common message and variable-length feedback. We show that the bounds are tight when the broadcast channel is stochastically degraded. We adapt and supplement new ideas to Yamamoto and Itoh's two-phase coding scheme for the direct part and Burnashev's proof technique for the converse part.
We consider the broadcasting of a single Gaussian source over a two-user Gaussian broadcast channel with bandwidth expansion. In addition to the source broadcasting the encoder sends a message reliably to the “higher quality” user. Conditioned on the message rate, we derive an outer bound on the set of attainable mean-squared error distortion pairs at the two users which extends the Reznic-Feder-Zamir...
The principal mission of Multi-Source Multicast (MSM) is to disseminate all messages from all sources in a network to all destinations. MSM is utilized in numerous applications. In many of them, securing the messages disseminated is critical. A common secure model is to consider a network where there is an eavesdropper which is able to observe a subset of the network links, and seek a code which keeps...
This work contains two main contributions concerning the degraded broadcast channel. The first is an analysis of the exact random coding error exponents for both users, and the second is the derivation of universal decoders for both users. These universal decoders are certain variants of the maximum mutual information (MMI) universal decoder, and which achieve the corresponding random coding exponents...
We consider the problem of covert communication over a state-dependent channel, where the transmitter has non-causal knowledge of the channel states. Here, “covert” means that the probability that a warden on the channel can detect the communication must be small. In contrast with traditional models without noncausal channel-state information at the transmitter, we show that covert communication can...
Motivated by applications of biometric identification and content identification systems, we consider the problem of random coding for channels, where each codeword undergoes vector quantization, and where the decoder bases its decision only on the compressed codewords and the channel output, which is in turn, the channel's response to the transmission of an original codeword, before compression....
We define multi-block interleaved codes as codes that allow reading information from either a small sub-block or from a larger full block. The former offers faster access, while the latter provides better reliability. We specify the correction capability of the sub-block code through its gap t from optimal minimum distance, and look to have full-block minimum distance that grows with the parameter...
We study secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We describe a technique to shorten the secure EVENODD scheme in [6], which can optimally tolerate 2 node failures and 2 eavesdropping nodes. The shortening technique allows us to obtain secure EVENODD schemes of arbitrary lengths, which...
This paper studies the communication efficiency of threshold secret sharing schemes. We construct a family of Shamir's schemes with asymptotically optimal decoding bandwidth for arbitrary parameters. We also construct a family of secret sharing schemes with both optimal decoding and optimal repair bandwidth for arbitrary parameters. The construction leads to a family of regenerating codes allowing...
The reliability function of memoryless channels with noiseless feedback and variable-length coding has been found to be a linear function of the average rate in the classic work of Burnashev. In this work we consider unifilar channels with noiseless feedback and study specific transmission schemes, the performance of which provides lower bounds for the channel reliability function. In unifilar channels...
We prove polarization theorems for arbitrary classical-quantum (cq) channels. The input alphabet is endowed with an arbitrary Abelian group operation and an Arikan-style transformation is applied using this operation. It is shown that as the number of polarization steps becomes large, the synthetic cq-channels polarize to deterministic homomorphism channels that project their input to a quotient group...
In this paper, we examine the performance of the decode-and-forward (DF) relaying protocols with finite blocklength (FB). We provide the overall outage probability of three distinct DF relaying protocols, where the channels are assumed to be quasi static Rayleigh fading. More importantly, we derive the closed form expressions of the outage probability in the three relaying scenarios. We illustrate...
Owing to their capacity-achieving performance and low encoding and decoding complexity, polar codes have drawn much research interests recently. Successive cancellation decoding (SCD) and belief propagation decoding (BPD) are two common approaches for decoding polar codes. SCD is sequential in nature while BPD can run in parallel. Thus BPD is more attractive for low latency applications. However BPD...
Distributed Storage Systems (DSS) have seen increasing levels of deployment in data centers and in cloud storage provider networks. They provide efficient and cost-effective ways to store large amounts of data and ensure resilience to failures by using mirroring and coding schemes at the block and file level. While mirroring techniques provide an efficient way to recover lost data, they require excess...
Distributed storage systems (DSSs) are widely employed in data centers and sensing networks to resist storage node failures. Structured redundancy is introduced to DSS by various coding schemes to efficiently account for failures of storage nodes. The allocation of the coded data blocks to storage nodes is another factor that impacts the data reliability. In this paper, we investigate the coding and...
We study potential enhancement of the read access speed in high-performance solid-state drives (SSDs) by coding, given speed variations across the multiple flash interfaces and assuming occasional local memory failures. Our analysis is based on a queuing model that incorporates both read request failures and node failures. It provides a clear picture on the coding-overhead and read-access-time trade-offs...
Intravehicular wireless systems are attracting a lot of research interest during the last years. A future scenario where intravehicular wired systems will be replaced by wireless systems will allow to reduce cabling weight and increase the flexibility. But one of the main requirements of wireless systems is to maintain the same reliability level as the wired ones. A system based on LDM (Layered Division...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.