The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper modified Conditionally Double Error Correcting Weighted Sum Codes and the probability of their decoding failure in case that two errors in a codeword occur are presented.
Brain-Machine Interfaces (BMIs) have the potential to restore lost sensorimotor functions in people with severe motor disabilities. Several BMI decoding strategies have been suggested to translate activity of motor neurons into control signals that ac-tuate artificial devices. Among these, the class of linear decoders, particularly Wiener filters, is known to perform well for simple tasks, but degrades...
A resilient control system is one that maintains state awareness and an accepted level of operational normalcy in response to unexpected disturbances. There has recently been great interest in event-triggered control for networked systems. It is unclear, however, whether event-triggering is appropriate for resilient control because of the sporadic nature of the feedback. This paper examines the bit-rates...
In an MMSE based turbo equalization system, a soft mapper calculates the symbol mean and variance based on extrinsic Log-Likelihood-Ratios (LLRs) information coming from a Soft-Input Soft-Output (SISO) decoder. In this paper, we investigate the complexity of this module, and in particular, we employ a 3-segment linear approximation approach to calculate the mean and variance of data symbols from LLRs...
Quantum error correction codes are needed to protect quantum systems from interference. An important family of quantum error correction codes are stabilizer codes. Many stabilizer codes in the literature belong to a subclass of stabilizer codes, referred to as CSS codes since they are based on the so-called CSS formalism. CSS codes have received significant attention because the dual-containing condition...
A common approach for introducing security at the physical layer is to rely on the channel variations of the wireless environment. This type of approach is not always suitable for wireless networks where the channel remains static for most of the network lifetime. For these scenarios, a channel independent physical layer security technique is more appropriate which will rely on a secret known to the...
Model-based compressive sensing (CS) for signal-specific applications is of particular interest in the sparse signal approximation. In this paper, we deal with a special class of sparse signals with binary entries. Unlike conventional CS approaches based on l1 minimization, we model the CS process with a bi-partite graph. We design a novel sampling matrix with unique sum property, which can be universally...
One of the most powerful ways to achieve transmission reliability over wireless links is to employ efficient coding techniques. This paper investigates the performance of a transmission over a relay channel where information is protected by two layers of coding. In the first layer, transmission reliability is ensured by fountain coding at the source. The second layer incorporates network coding at...
Spatially-coupled low-density parity-check codes attract much attention due to their capacity-achieving performance and a memory-efficient sliding-window decoding algorithm. On the other hand, the encoder needs to solve large linear equations to terminate the encoding process. In this paper, we propose modified spatially-coupled codes. The modified (dl, dr, L) codes have less rate-loss, i.e., higher...
The Viterbi algorithm is one of the most popular algorithms for decoding convolutional codes. Implementing a high-speed Viterbi decoder is a challenging task due to the recursive iteration of an add-compare-select operation. In this paper, we propose and analyze several optimization techniques to improve the area/performance tradeoffs of high speed Viterbi decoders on Virtex-6 FPGAs. Both Radix-2,...
In this paper, two novel decoding methods are designed for two kinds of rateless codes: binary deterministic rateless (BDRC) codes and LT codes. The traditional decoding algorithms for the two kinds of codes discard the erroneous packets that may only contain few erroneous bits, which will causes the waste of bandwidth. The novel decoding methods adopt the packet combining technology to find the positions...
With the rapid development of Internet of Things and communication technologies, QR code images are widely used in the embedded automatic identification field. However, previous works for the location of QR code have not considered how to extract the vertexes accurately in geometric distorted QR code images. In this paper, utilizing the characteristics of QR code, we propose an effective mathematical...
This thesis proposed 8-bit parallel CRC-32 in order to meet the high throughput of USB3.0. The highest speed of USB3.0 reaches 5G bps. Firstly, we researched the Data Packet structure and the principles of the CRC-32 in the USB3.0 Specification. Secondly, deduced the equation of the 8-bit input data and the CRC-32. Finally, implemented the CRC-32 coding and decoding by the verilog HDL, verified the...
In this paper, we propose an error concealment technique for H.264 coded videos. The algorithm is targeted at compressed videos degraded after packet losses caused by transmission over an unreliable channel. We use a combination of watermarking and half toning (dithering) techniques. At the encoder side, a dithered version of each video frame is embedded into the video using a watermarking technique...
A hybrid decoder (HD) for LDPC codes in the presence of additive white Gaussian noise is proposed. This HD employs a min-sum belief propagation (BP) decoding to correct errors, combined with erasure iterative decoding. Whenever BP decoding fails, its output is modified and artificially created erasures are introduced. The proposed HD employs an overall reduced number of iterations and achieves a similar...
For uplink of Multiuser (MU) Multiple-Input, Multiple-Output (MIMO) system with M receive antennas at base station and one transmit antenna at each user, in this paper, performances of linear decoders, namely Zero-Forcing decoder and Minimal Mean-Square Error (MMSE) decoder, are investigated. Differing from existing results which mainly describe various asymptotic properties, this paper gives analytical...
A secret key agreement setup between three users is considered in which each pair of them wishes to agree on a secret key hidden from the remaining user. The three users observe i.i.d. outputs of correlated sources and there is a noiseless public channel from each user for communication to the others. In this setup, inner and outer bounds of the secret key capacity region is derived. Moreover, some...
In this paper we consider unambiguity of languages as an extension of codes. We introduce a new classification of languages based on a type of unambiguity that is closely related to codes. A necessary and sufficient condition for a language to have finite unambiguous degree is established, and an application of unambiguous languages in the area of cryptography is introduced.
Multiple description coding (MDC) can be applied for multipath communication to reduce the negative affect of packet loss, and it is composed of three processes: encoding, quantizing, and decoding. Encoding and decoding are well researched in MDC, but there are few researches that focus on the quantization process. Therefore, this paper focuses on the quantization process of MDC. The aim of this paper...
Video calling incurs very high power consumption on mobile platforms usually powered by capacity-constrained batteries. To remedy this problem, we develop a cross-layer energy-aware optimization framework to reduce CPU energy consumption for mobile video calls. We explore the texture similarity between neighboring macro blocks during H.264 coding and control the quality-complexity tradeoff with a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.