The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present two variations on a linear physical-layer security code for the binary erasure wiretap channel, and examine their performance using small blocklength LDPC codes at rates above the secrecy capacity. We consider the maximum-likelihood attack, along with a message-passing attack, and show how the proposed codes enhance security in each case. Unique security metrics are employed...
Iterative receiver combining multiple-input multiple-output (MIMO) detection with channel decoding is an attractive solution to greatly improve the error rate performance of wireless communication systems. However, such iterative process poses significant challenges for efficient receiver design. In this paper, a modification of soft-input soft-output K-Best decoder is proposed to provide high throughput...
The list demapper has been widely implemented in a coded multiple-input multiple-output (MIMO) receiver, where only a part of total signal vectors are examined in the calculation of likelihood ratio for low complexity. Generally, the list is generated either in the original or the lattice-reduced domain. In the latter, thanks to the operation of lattice reduction (LR), a better-conditioned MIMO channel...
In this paper, the design of the LDPC decoder architecture in IEEE 802.11n/ac is proposed. The proposed decoder is used to the partial parallel architecture to provide 2 Gbps throughput at 200 MHz clock frequency. In IEEE 802.11n/ac, 12 parity check metrics is provide to support diverse code rates and block lengths. Therefore the network between nodes is configured to be satisfied parity check metrics...
For spatially multiplexed MIMO systems, conventional detection methods such as MLD and QRD-M requires high computational complexity when the number of antennas or modulation level increases. This paper presents a method for reducing the computational complexity with the aid of parity information sent through one of the transmitted symbols. The method utilizes QR decomposition of the channel matrix...
Forward Error Correction (FEC) consumes excessive computation in a Software Defined Radio (SDR) system. In this work, a high-throughput flexible FEC processor is proposed for the decoding acceleration. The FEC processor enables Turbo/QC-LDPC/Convolutional Code decoding with software-hardware co-reconfigurability. A multi-algorithm unified trellis processing unit is introduced for resource sharing...
We study the achievable bit-error-ratio of a wire-tapping eavesdropper in a MIMO-SDM system as a function of the channel code rate chosen by the legitimate transponder-pair This rate-distortion formulation provides a practically specifiable system security quantification.
This paper deals with MIMO detection for rank 4 3GPP Long-Term-Evolution (LTE) systems. The paper revolves around a previously known detector [1], which we shall refer to as RCSMLD (Reduced-Constellation-Size-Maximum-Likelihood-Detector). However, a direct application of the scheme in [1] to LTE/LTE-A rank 4 test cases results in unsatisfactory performance. The first contribution of the paper is to...
Thanks to the use of lexical and syntactic information, Word Graphs (WG) have shown to provide a competitive Precision-Recall performance, along with fast lookup times, in comparison to other techniques used for Key-Word Spotting (KWS) in handwritten text images. However, a problem of WG approaches is that they assign a null score to any keyword that was not part of the training data, i.e. Out-of-Vocabulary...
Existing scheduling schemes for decoding H.264/AVC multiple streams on multi-core are largely limited by ineffective use of multi-core architecture. Among the reasons are inefficient load balancing, in which common load metrics (e.g. tasks, frames, bytes) are unable to correctly reflect processing load at cores, unscalability of scheduling algorithms for a large scale multi-core, and bottlenecks at...
Fountain codes are gradually being incorporated into broadcast technologies, such as multimedia streaming for 4G mobile communications. In this paper, we investigate the capability of existing fountain-coded schemes to recover a fraction of the source data at an early stage and progressively retrieve the remaining source packets as additional coded packets arrive. To this end, we propose a practical...
Among the long-term goals of the fairly new area of brain decoding is the exploitation of the results for the creation of advanced brain-computer interfaces, which can potentially establish a solid communication channel with people in vegetative state. Recent attempts for large-scale brain decoding form a both powerful and promising foundation towards that goal, since they aim to extract accurate...
Min Sum algorithm simplifies the non-linear check node operation of Belief Propagation algorithm via linear approximation, which greatly reduces the complexity of realization of decoder but degrades the performance as well. The resulting sub-optimality could be tempered via scaling of LLRs, e.g. fixed optimal scaling applied to Min Sum output resulting in the Normalized Min Sum algorithm, and variable...
Long polar codes achieve the capacity of binary-input discrete memoryless channels when decoded with a successive cancelation (SC) algorithm. For polar codes with short or moderate length, the decoding performance of the SC algorithm is inferior, and the cyclic redundancy check (CRC) aided successive cancelation list (SCL) algorithm achieves significantly improved performance. In this paper, we propose...
In this paper, an improved soft in soft out (SISO) iterative decoding scheme for joint source-channel coding is presented. It is realized as the iterative soft decoding of arithmetic code based on sequential decoding to successively prune the decoding tree. Making use of the forecasted forbidden symbols, an error-resistant arithmetic code with an improved a posteriori probability (APP) metric is adopted...
The application of multivariate approaches to neuroimaging data analysis is providing cognitive neuroscientists with a new perspective on the neural substrate of conceptual knowledge. In this paper we show how the combined use of decoding models and of representational similarity analysis (RSA) can enhance our ability to investigate the inter-categorical distinctions as well as the intra-categorical...
In the paper the problem of metric description of processes defined by two-state Markov models is considered. The class of special metrics is presented, the approach of matching the metrics from this class with the Markov models is proposed. In the special case of simple Markov chain the metric matched with Markov chain for large set of its parameters is given. The metric may be used in decision-making...
The novel decoding algorithm for the list decoding of tail-biting convolutional codes is described. The main idea is first to estimate the most reliable state from all state spaces for transmitted codeword by using a Soft Input Soft Output decoder, and then to perform the list Viterbi decoding algorithm from this state around the circular tail-biting trellis. For the LTE standard concatenated coding...
This work investigates the configuration selection in IA-aided UL CoMP systems which pursues the maximal achievable sum rate. The configuration is defined by the number of data streams transmitted in each user. Intuitively, the solution can be found by exhaustively calculating the achievable sum rate for all the possible configurations, and select the configuration leading to the maximal achievable...
In cellular systems, the interference has been the most critical issue that practically limits the performance of overall networks. Furthermore, the distribution of the inter-cell interference (ICI) in conventional cellular networks employing orthogonal frequency-division multiple-access (OFDMA) with quadrature amplitude modulation (QAM) tends to approach a Gaussian distribution, which is known to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.