The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we present modifications in the sphere decoder initially introduced in [1] and modified in [2] that allow for its implementation in transient operation. By investigating the geometry of the integer problem underlying direct model predictive control (MPC), a new sphere that guarantees feasibility and includes a significant smaller number of candidate solutions is computed. In a first...
With the rapid incensement of personal vehicles, urban traffics congestion is now a prominent problem in many major cities in China. Electronic Toll Collection (ETC) is an efficient solution for traffic jaw problem. This paper introduces an embedded system designed for Dedicated Short Range Communications (DSRC) standard based ETC system of China. In this system, a STM8L151G micro controller was used...
In this paper, the principle of normalized minimum-sum (NMS) polar decoding process is explored. It is demonstrated that with one properly chosen parameters for NMS algorithm, performances approach to that of the sum-product (SP) algorithm can be achieved. As well, the complexity reduction is realized by calculating a linear function instead of nonlinear function. Simulation results for successive...
This paper presents a non-binary finite-stat Markov channel (FSMC) that captures both the soft-decision information and the temporal correlation of a discrete fading channel (DFC) with 2ξ quantization levels. The parameters of the FSMC that approximate the DFC with fixe parameters are found using the Baum-Welch algorithm. An iterative decoding scheme, based on the sum-product algorithm, is also discussed...
Deep neural networks (DNNs) usually demand a large amount of operations for real-time inference. Especially, fully-connected layers contain a large number of weights, thus they usually need many off-chip memory accesses for inference. We propose a weight compression method for deep neural networks, which allows values of +1 or −1 only at predetermined positions of the weights so that decoding using...
Polar codes are a family of error correcting codes that achieves the symmetric capacity of memoryless channels when the code length N tends to infinity. However, moderate code lengths are required in most of wireless digital applications to limit the decoding latency. In some other applications, such as optical communications or quantum key distribution, the latency introduced by very long codes is...
The ADMM based linear programming (LP) technique shows interesting error correction performance when decoding binary LDPC block codes. Nonetheless, it's applicability to decode LDPC convolutional codes (LDPC-CC) has not been yet investigated. In this paper, a first flooding based formulation of the ADMM-LP for decoding LDPC-CCs is described. In addition, reduced complexity decoding schedules to lessen...
Since physical unclonable functions (PUFs) are considered for various security applications such as authentication and key generation, the robustness of PUFs is vital. In prior works, various error correction codes, such as Bose-Chaudhuri-Hocquenghem (BCH) codes, were used to improve the robustness of PUFs. In this paper, we use polar codes, a new family of error correction codes, to improve the robustness...
LDPC codes are a family of error correcting codes used in most modern digital communication standards even in future 3GPP 5G standard. Thanks to their high processing power and their parallelization capabilities, prevailing multi-core and many-core devices facilitate real-time implementations of digital communication systems, which were previously implemented on dedicated hardware targets. Through...
Deep learning recently shows strong competitiveness to improve polar code decoding. However, suffering from prohibitive training and computation complexity, the conventional deep neural network (DNN) is only possible for very short code length. In this paper, the main problems of deep learning in decoding are well solved. We first present the multiple scaled belief propagation (BP) algorithm, aiming...
We consider the problem of robust polynomial regression, where one receives samples that are usually within a small additive error of a target polynomial, but have a chance of being arbitrary adversarial outliers. Previously, it was known how to efficiently estimate the target polynomial only when the outlier probability was subconstant in the degree of the target polynomial. We give an algorithm...
The use of playful interactions, clever metaphors, and wordplay are ways that we make computation more appealing to young people and more accessible and intuitive to everyone. But play is a culturally situated notion, and ways that we embed playfulness into our designs can carry unintended messages that encourage or discourage productive use. The focus of this talk is to introduce the term Value-driven...
In this paper, we propose a model to learn a feature-category latent representation of the data, that is guided by a semi-supervised auxiliary task. The goal of this auxiliary task is to assign labels to unlabeled data and regularize the feature space. Our model is represented by a modified version of a Categorical Variational Autoencoder, i.e., a probabilistic generative model that approximates a...
This paper reports low bit-error-rate (BER) polar codes concatenated low density parity check (LDPC) codes for wireless communication systems. The LDPC code has been validated on the error correction capable to approaching the theoretical value. However, the BER performance of this code is still limited because of the effect of the error floor. Therefore, a concatenated coding scheme based on polar...
Transmission techniques based on channel coding with feedback are proposed in this paper to enhance the security of wireless communications systems at the physical layer. Reliable and secure transmission over an additive noise Gaussian wiretap channel is investigated using Bose-Chaudhuri-Hocquenghem (BCH) and Low-Density Parity-Check (LDPC) channel codes. A hybrid automatic repeat-request (HARQ) protocol...
In this paper, we investigate the cryptanalysis of stream ciphers, and evaluate the enhancement to security that can be gained when the ciphertext is error prone by analyzing specific attack algorithm. The stream ciphers that we investigate here have a keystream generator that is based on linear-feedback shift registers (LFSRs). In particular, we characterize the security of these ciphers when the...
In dynamic manipulation, robots can manipulate objects without grasping by utilizing inertia effect. However, the trajectory planning for dynamic manipulation is a difficult issue due to dynamic constraint. Trajectory deformation considering dynamic constraint after original trajectories are generated is necessary for the issue. To realize such deformation methods, we introduce on sequence-to-sequence...
To satisfy the requirements of complex distributed power electronic system (PES) communication, this paper has proposed a single optic-fiber link data communication protocol based on the Manchester code due to an vacancy in the commonly-adopted protocols, analyzed the encoding and decoding principle of Manchester code, defined the formats of command frame and data frame, calculated the communication...
In this paper, as a basic study for combination of turbo equalizer and 4D-8PSK-TCM (4 Dimensional 8 Phase Shift Keying Trellis Coded Modulation) system, which is recommended for X-band band satellite communication in CCSDS, a system combining 8PSK-TCM system and turbo equalizer has been designed and performance evaluation of the system has been performed. BER performance of 8PSK and 8PSK-TCM systems...
Polar coding is a low-complexity method for communication over noisy classical channels, which is capable of providing highly reliable data transmission. This paper proposes an enhanced polar codec scheme for mission critical applications in train-to-ground wireless communications. Firstly, we develop an enhanced polar coding scheme to support reliable data transmission under time-varying channel...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.