The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Channel coding is a fundamental building block in any communications system. High performance codes, with low complexity encoding and decoding are a must-have for future wireless systems, with requirements ranging from the operation in highly reliable scenarios, utilizing short information messages and low code rates, to high throughput scenarios, working with long messages, and high code rates. We...
Transmissions over the wiretap channel have been studied for a long time from the information theory standpoint. This has allowed to assess the secrecy performance against eavesdropping while ensuring reliable transmission towards the legitimate receiver. However, most previous studies rely on a number of assumptions which are far from practical wireless communications, like infinite length codewords,...
Recently, the wide deployment of surveillance systems such as driving recorders and sensor networks has highlighted the significance of time-series data, that are, the data indexed by timestamps. This trend has thus driven a rapidly increasing demand of high-performance, cost-effective storage and management systems for time-series data. In a typical use case, the storage system is accessed by range...
This paper studies the problem of reliable resistive-memory readout through the rigorous lens of communication theory. The most dominant reliability issue in resistive memory can be modeled as interference of resistances in parallel to a measured resistance. For this special type of interference we develop detection and coding schemes that are shown to effectively mitigate the effects of sneak-path...
The reliability of digital integrated circuits is becoming the primary design concern in advanced technology nodes. The accelerated transistor aging mechanisms, such as Bias Temperature Instability, reduce the noise margin of memory cells leading to increased failure rate. Traditionally, error correction codes, such as Hamming code, are widely used to detect and correct transient errors in memory...
Cyber-physical systems connect the physical world and the information world by sensors and actuators. These sensors are usually small embedded systems which have many limitations on wireless communication, computing and storage. This paper proposes a lightweight coding method for secure and reliable transmission over a wireless communication links in cyber-physical systems. The reliability of transmission...
We propose a generalized construction for binary polar codes based on mixing multiple kernels of different sizes in order to construct polar codes of block lengths that are not only powers of integers. This results in a multi-kernel polar code with very good performance while the encoding complexity remains low and the decoding follows the same general structure as for the original Arikan polar codes...
This paper simplifies the chase decoding algorithm for TPC codes for a particular modulation scheme (BPSK). Without reducing the decoding performance, the multiplication of the new algorithm is 33% of the original algorithm. The access algorithm of receiving matrix [R] is also optimized, and the access time of receiving matrix [R] is reduced to 3%. Finally, the 800M bps TPC decoder was implemented...
Vehicular Ad hoc Networks (VANETs), a sub group of Mobile Ad hoc Networks (MANETs), are networks that have no fixed infrastructure and instead depend on the vehicles themselves to provide exchange of information. They have potential in enhancing road safety by sharing emergency information to other vehicles in the network. However, because of constant movement of vehicles, presenting a successful...
Reliable storage is central component of data centers that support private or public cloud. Erasure coding has becoming increasingly popular alternative to replication for its capability in substantially cutting disk cost while delivering the same reliability. This paper reports the comprehensive results of using FPGA for accelerating erasure encoding and decoding algorithms. In particular, to accomplish...
In this paper we study the application of Diversity Coding to enable near-instantaneous recovery from link failures in 5G Centralized Radio Access Network (C-RAN) networks. We focus on networks where remote radio heads in a C-RAN are connected to the baseband unit with wireless fronthaul links. In order to avoid retransmissions and rerouting delays due to link failures, we investigate use Diversity...
Software architecting is a knowledge-intensive activity. However, obtaining and evaluating the quality of relevant and reusable knowledge (and ensuring that this knowledge is up-to-date) requires significant effort. In this paper, we explore how online developer communities (e.g., Stack Overflow), traditionally used by developers to solve coding problems, can help solve architectural problems. We...
Achieving information-theoretic security using explicit coding scheme in which unlimited computational power for eavesdropper is assumed, is one of the main topics is security consideration. It is shown that polar codes are capacity achieving codes and have a low complexity in encoding and decoding. It has been proven that polar codes reach to secrecy capacity in the binary-input wiretap channels...
This paper studies the one-sided secrecy of a full-duplex two-way wiretap channel. It is motivated by a practical communication scenario, where two legitimate users communicate with each other in the presence of an external eavesdropper and only one of the users wishes to keep its message confidential from the external eavesdropper for the sake of privacy. As a general result, we establish an achievable...
On — chip communication suffer from bit error especially at highly dense implemented system on chip. Reducing the rate of bit error in On-chip communication is carried out by error detection and correction codes. But it has its own limitation. So reconfigurable multiple code based system is suitable for heterogeneous system design. But selecting correct code for the correct subsystem or for current...
Most architectures are designed to mitigate the usually undesirable phenomenon of device wearout. We take a contrarian view and harness this phenomenon to create hardware security mechanisms that resist attacks by statistically enforcing an upper bound on hardware uses, and consequently attacks. For example, let us assume that a user may log into a smartphone a maximum of 50 times a day for 5 years,...
External radiations create soft errors which are turning into an undeniable critical issue. Customarily, Single Error Correction (SEC) code which can detect and correct 1-bit error per memory word is used to rectify soft errors. As errors turn out to be more common, the SEC methodology becomes inefficient. In this paper, Horizontal-Vertical Parity and Diagonal Hamming (HVPDH) method is proposed for...
Providing a high level of informational reliability and, firstly, noise immunity is the main problem of information channel (IC) synthesis. Quantitatively noise immunity is measured by reception outcome probabilities: probability of correct reception, false reception and protective failure. The most urgent problem of the IC noise immunity improvement is minimization of the false reception probability...
The article discusses the problem of the transmission of reliable monitoring and control signals through communication channels of complex energy supply of industrial objects control systems. Mathematically justified mismatch concept “accuracy of information” with “protected information from the noise in the communication channel.” The principles of the combined code, providing a high level of reliability...
In this paper, a duality between wiretap and state-dependent channels with non-causal channel state information at the transmitter is established. First, a common achievable scheme is described for a certain class of state-dependent and wiretap channels. Further, state-dependent and wiretap channels for which this scheme is capacity (resp. secrecy capacity) achieving are identified. These channels...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.