The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider subspace codes obtained by lifting L-interleaved [n, k] Gabidulin codes. When used in networks with random linear coding, these codes are able to correct with high probability γ packet insertions and δ packet deletions provided that γ/L + δ ≤ n − k. We propose to use these subspace codes in the so called fountain mode. In this case we do not need to correct deletions and are able to correct...
This paper studies the maximum secrecy rate for a semi-deterministic wiretap channel, in which the channel between the transmitter and the legitimate receiver is deterministic, while that between the transmitter and the eavesdropper is a discrete memoryless channel. For a given decoding error probability and information leakage (measured by the total variation distance), the optimal second-order secrecy...
We study the state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes all other instances of CSI availability as special cases, and calls for an efficient utilization of the state sequence both for reliability and security purposes. A lower bound on the secrecy-capacity, that improves upon the previously best known result by Chen...
Path metric sorting unit of successive cancellation list (SCL) decoders for polar codes is the main concern in this paper. After reviewing existing sorting units in SCL decoders, we propose 2 new sorting schemes namely quick select (QS) based selection algorithm and simplified bitonic sorter (SBT), which exploit the special data dependency of path metrics in log-likelihood ratio based SCL decoding...
Space-time trellis codes (STTCs) combine channel coding and multiple-input multiple-output (MIMO) techniques to provide coding and diversity gains for wireless communication systems. The decoding complexity is extremely high because of the high density of branch metric calculations. Thus, this study presents a state-purging mechanism based on the T-algorithm to reduce the computational complexity...
Hybrid architectures are generally composed of a cyber cloud with additional support of edge caching. By utilizing the benefits associated with cloud computing and caching, powerful enhanced interference management techniques can be readily utilized — that among others — also results in low-latency transmission. In this paper, we study the impact of cloud and edge processing on the latency for a heterogenous...
In this paper, we consider the design of multi-resolution non-coherent multiple-input multiple-output (MIMO) systems that enable Unequal Error Protection (UEP). A method for designing multi-layer non-coherent Grassmannian constellations is introduced. Specifically, the proposed method yields multi-layer constellations that are amenable to a natural set partitioning strategy. The resulting subsets...
State-of-the-art LTE Turbo-Code decoder architectures support throughputs of several Gbps by employing parallelism on different architectural levels. However, a very high flexibility with respect to code block sizes and code rates must also be retained. Sophisticated techniques are used to maintain communications performance at high code rates which are critical. In this paper, we propose new techniques...
This paper presents a low-complexity approach for calculating soft decision metrics of polar coded quadrature amplitude modulation (QAM) system. A simple and general bit log likelihood ratio (LLR) expression is provided for Gray coded QAM signals. The characteristics of Gray code mapping such as symmetries and repeated formats of the bit assignment in a symbol among bit groups, are exploited effectively...
Combined (soft-hard) method for decoding block turbo-product codes is proposed in the paper. The method allows leveraging advantages of soft input data usage with the speed of hard-decoding procedure. The main peculiarity of the method is rule-based decoding stage. The proposed approach simplifies calculation procedure and reaches better correction ability than hard-decision decoder. Mathematical...
To achieve high data rates, reliable data rate transmission and near capacity performance for future wireless communication systems iterative processing has been widely considered. However, such an efficient receiver design has been made significant challenge. In this paper, multiple-input multiple output (MIMO) detection with channel decoding techniques has been investigated for achieve reliable...
With the completion of the IARPA Babel program, it is possible to systematically analyze the performance of speech recognition systems across a wide variety of languages. We select 16 languages from the dataset and compare performance using a deep neural network-based acoustic model. The focus is on keyword spotting using the actual term-weighted value (ATWV) metric. We demonstrate that ATWV is keyword...
Suppose Alice and Bob share a secret key, of which Eve is initially oblivious. Clearly, Alice and Bob can use this key to ensure that any particular plain-message sent is both authentic and secure. This paper investigates how many plain-messages can be sent per bit of secret key, while still ensuring both secrecy and authentication. In particular the secrecy tolerance relates to the min-entropy of...
This paper proposes a coding scheme that derives a multiple-rate code from existing channel codes defined over the composite field and the ground field, where code length is fixed. Formally, from codes C1(k, 1), C2 (k, 2),…, Ck(k, k) defined over GF(q) together with the code C(n,k) over GF(qn), the proposed scheme derives a multiple-rate code with fixed code length. The primary benefit of the proposed...
Symbol-pair read channels output overlapping pairs of symbols in storage applications. Pair distance and pair error are used in the channels. In this paper, we discuss the error-trapping decoding for cyclic codes over symbol-pair read channels. By putting some restrictions on the correctable pair error patterns, we discuss a new error-trapping decoding algorithm over the channels and show a circuitry...
A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a program that protects websites from bots by generating and grading assessments that humans can pass but current computer programs cannot. CAPTCHAs provide security from bots in applications such as preventing comment spam in blogs, protecting website registrations etc. Recent breakthroughs in Artificial Intelligence...
Error Correcting Output Coding (ECOC) is a multi-class classification technique in which multiple binary classifiers are trained according to a preset code matrix such that each one learns a separate dichotomy of the classes. While ECOC is one of the best solutions for multi-class problems, one issue which makes it suboptimal is that the training of the base classifiers is done independently of the...
Polar codes under cyclic redundancy check-aided successive cancellation list (CA-SCL) decoding can outperform the turbo codes and the LDPC codes at the cost of high complexity and decoding delay. In order to reduce the decoding complexity, in this paper we propose a hybrid parity-check and CRC aided SCL decoding scheme for polar codes. Simulation results under the binary input additive white Gaussian...
Due to their lack of assessment mechanisms of link quality in VANET environments, routing protocols do not deal efficiently with highly volatile links. One way to fill this gap would be to anticipate links breakages with new route computation. Currently available link quality indicators are not sufficiently responsive to consider forecasting. In this paper we present a novel predictive link quality...
Caching of popular multimedia content at small-cell base stations (BSs) is a promising solution to reduce the traffic load of macro-BSs without relying on a high-speed backhaul architecture. While most prior work analyzed the effect of smallcell caching, or femto-caching, under the assumption of negligible interference between macro-BS and small-cell BS, this paper contributes to a more recent line...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.