12,398 results
Search Results
2. Multiple input multiple output Dirty paper coding: System design and performance
- Author
-
Dinesh Rajan and Zouhair Al-qudah
- Subjects
Space–time block code ,Noise ,Convolutional code ,Electronic engineering ,Dirty paper coding ,Data_CODINGANDINFORMATIONTHEORY ,Low-density parity-check code ,Antenna diversity ,Algorithm ,Decoding methods ,Coding gain ,Computer Science::Information Theory ,Mathematics - Abstract
In this paper, a practical multiple input multiple output Dirty paper coding (MIMO-DPC) scheme is designed to cancel the effect of additive interference that is known perfectly to the transmitter. The proposed system uses a trio of encoders — a LDPC code, a vector quantizer implemented as a convolutional decoder and an Orthogonal space time block code (STBC) to achieve temporal coding gain, interference cancelation and spatial diversity, respectively. First, we derive the equivalent noise seen by the receiver using an equivalent lattice based dirty paper code. Then the optimal value of the power inflation factor, which is one of the key system parameters used to minimize the equivalent noise seen by the receiver is derived. Furthermore, we analytically prove that the equivalent noise seen by the receiver tends to 0 for large number of receive antennas. Performance results in the case of various number of receiver antennas are presented and show that significant reduction in bit error probabilities can be obtained over a system that uses no interference cancelation.
- Published
- 2012
3. On the achievable rate of the fading dirty paper channel with imperfect CSIT
- Author
-
Mahesh K. Varanasi and Chinmay S. Vaze
- Subjects
FOS: Computer and information sciences ,Covariance matrix ,Information Theory (cs.IT) ,Computer Science - Information Theory ,05 social sciences ,050801 communication & media studies ,020206 networking & telecommunications ,02 engineering and technology ,Positive-definite matrix ,Covariance ,Estimation of covariance matrices ,0508 media and communications ,Signal-to-noise ratio ,Channel state information ,Statistics ,0202 electrical engineering, electronic engineering, information engineering ,Applied mathematics ,Dirty paper coding ,Fading ,Computer Science::Information Theory ,Mathematics - Abstract
The problem of dirty paper coding (DPC) over the (multi-antenna) fading dirty paper channel (FDPC) Y = H(X + S) + Z is considered when there is imperfect knowledge of the channel state information H at the transmitter (CSIT). The case of FDPC with positive definite (p.d.) input covariance matrix was studied by the authors in a recent paper, and here the more general case of positive semi-definite (p.s.d.) input covariance is dealt with. Towards this end, the choice of auxiliary random variable is modified. The algorithms for determination of inflation factor proposed in the p.d. case are then generalized to the case of p.s.d. input covariance. Subsequently, the largest DPC-achievable high-SNR (signal-to-noise ratio) scaling factor over the no-CSIT FDPC with p.s.d. input covariance matrix is derived. This scaling factor is seen to be a non-trivial generalization of the one achieved for the p.d. case. Next, in the limit of low SNR, it is proved that the choice of all-zero inflation factor (thus treating interference as noise) is optimal in the 'ratio' sense, regardless of the covariance matrix used. Further, in the p.d. covariance case, the inflation factor optimal at high SNR is obtained when the number of transmit antennas is greater than the number of receive antennas, with the other case having been already considered in the earlier paper. Finally, the problem of joint optimization of the input covariance matrix and the inflation factor is dealt with, and an iterative numerical algorithm is developed., Presented at the 43rd Annual Conference on Information Sciences and Systems, John Hopkins University, March 2009
- Published
- 2009
4. Dirty paper coding using sign-bit shaping and LDPC codes
- Author
-
Andrew Thangaraj, Srikrishna Bhashyam, and G Shilpa
- Subjects
FOS: Computer and information sciences ,Theoretical computer science ,Information Theory (cs.IT) ,Computer Science - Information Theory ,Variable-length code ,Data_CODINGANDINFORMATIONTHEORY ,Convolutional code ,Dirty paper coding ,Forward error correction ,Low-density parity-check code ,Error detection and correction ,Algorithm ,Decoding methods ,Computer Science::Information Theory ,Mathematics ,Parity bit - Abstract
Dirty paper coding (DPC) refers to methods for pre-subtraction of known interference at the transmitter of a multiuser communication system. There are numerous applications for DPC, including coding for broadcast channels. Recently, lattice-based coding techniques have provided several designs for DPC. In lattice-based DPC, there are two codes - a convolutional code that defines a lattice used for shaping and an error correction code used for channel coding. Several specific designs have been reported in the recent literature using convolutional and graph-based codes for capacity-approaching shaping and coding gains. In most of the reported designs, either the encoder works on a joint trellis of shaping and channel codes or the decoder requires iterations between the shaping and channel decoders. This results in high complexity of implementation. In this work, we present a lattice-based DPC scheme that provides good shaping and coding gains with moderate complexity at both the encoder and the decoder. We use a convolutional code for sign-bit shaping, and a low-density parity check (LDPC) code for channel coding. The crucial idea is the introduction of a one-codeword delay and careful parsing of the bits at the transmitter, which enable an LDPC decoder to be run first at the receiver. This provides gains without the need for iterations between the shaping and channel decoders. Simulation results confirm that at high rates the proposed DPC method performs close to capacity with moderate complexity. As an application of the proposed DPC method, we show a design for superposition coding that provides rates better than time-sharing over a Gaussian broadcast channel., 5 pages, submitted to ISIT 2010
- Published
- 2010
5. Lattice coding for the vector fading paper problem
- Author
-
Pin-Hsun Lin, Hsuan-Jung Su, and Shih-Chun Lin
- Subjects
business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,MIMO ,Codebook ,Data_CODINGANDINFORMATIONTHEORY ,Precoding ,Channel capacity ,Channel state information ,Fading ,Dirty paper coding ,Telecommunications ,business ,Algorithm ,Computer Science::Information Theory ,Mathematics ,Communication channel - Abstract
Dirty paper coding (DPC) is a promising preceding technique for canceling arbitrary interference known only at the transmitter. The interference-free rate is thus achieved. However, this result relies on the perfectly known channel coefficients at the transmitter when being applied to the fading channel. We thus consider the fading paper problem where only the channel statistics information is available at the transmitter. In general, the optimal transmission strategies to achieve the capacity of this channel is still unknown. We confine ourselves to the linear-assignment Gel'fand-Pinsker coding which has been proved to have good, sometimes even optimal, performance in the a variety of fast and slow fading channels. However, lack of structured codebook so far limited the practical applications of this coding. In this paper, we present a lattice-based coding structure for the vector fading paper channel. It can achieve the rate performance of the linear-assignment strategies previously proved by the random Gaussian codebook. Moreover, the lattice codebook has an algebraic structure and is possible to be implemented in practice. The results can be applied to the emerging fields such as fading multiple-input multiple-output (MIMO) Gaussian broadcast channels or fading MIMO cognitive channels.
- Published
- 2007
6. Analysis and Design of Dirty Paper Coding by Transformation of Noise
- Author
-
Sae-Young Chung and Young-Seung Lee
- Subjects
Block code ,Concatenated error correction code ,Data_CODINGANDINFORMATIONTHEORY ,Binary erasure channel ,Linear code ,symbols.namesake ,Additive white Gaussian noise ,Electronic engineering ,symbols ,Dirty paper coding ,Low-density parity-check code ,Algorithm ,Decoding methods ,Computer Science::Information Theory ,Mathematics - Abstract
We design a coding scheme for Costa's dirty paper coding (DPC) (M.H.M. Costa, 1983) using a channel and a shaping code. We show that by transforming the channel noise distribution the DPC channel can be converted into the binary erasure channel (BEC) with binary interference with memory. Furthermore, the messages exchanged during the iterative decoding between the channel and shaping codes become one dimensional under the new model. We analyze the iterative decoding and find good shaping and channel code pairs using some closed-form extrinsic information transfer (EXIT) curves. We verify that our dirty paper codes designed using this method are also good for the original DPC channel with the additive white Gaussian noise (AWGN) and arbitrary interference. Our implementation of DPC uses short block codes such as repetition codes for shaping codes. Although the shaping gains of such codes are not very high, they may provide a better complexity-performance trade-off for simple practical implementations of DPC. Furthermore, we show accurate theoretical analysis is possible for such codes under our channel model.
- Published
- 2007
7. Dirty Paper Coding for the MIMO cognitive radio channel with imperfect CSIT
- Author
-
Chinmay S. Vaze and Mahesh K. Varanasi
- Subjects
FOS: Computer and information sciences ,Mathematical optimization ,Iterative method ,Information Theory (cs.IT) ,Computer Science - Information Theory ,05 social sciences ,Transmitter ,MIMO ,050801 communication & media studies ,020206 networking & telecommunications ,02 engineering and technology ,0508 media and communications ,Cognitive radio ,Signal-to-noise ratio ,Transmission (telecommunications) ,0202 electrical engineering, electronic engineering, information engineering ,Dirty paper coding ,Algorithm ,Computer Science::Information Theory ,Communication channel ,Mathematics - Abstract
A Dirty Paper Coding (DPC) based transmission scheme for the Gaussian multiple-input multiple-output (MIMO) cognitive radio channel (CRC) is studied when there is imperfect and perfect channel knowledge at the transmitters (CSIT) and the receivers, respectively. In particular, the problem of optimizing the sum-rate of the MIMO CRC over the transmit covariance matrices is dealt with. Such an optimization, under the DPC-based transmission strategy, needs to be performed jointly with an optimization over the inflation factor. To this end, first the problem of determination of inflation factor over the MIMO channel $Y=H_1 X + H_2 S + Z$ with imperfect CSIT is investigated. For this problem, two iterative algorithms, which generalize the corresponding algorithms proposed for the channel $Y=H(X+S)+Z$, are developed. Later, the necessary conditions for maximizing the sum-rate of the MIMO CRC over the transmit covariances for a given choice of inflation factor are derived. Using these necessary conditions and the algorithms for the determination of the inflation factor, an iterative, numerical algorithm for the joint optimization is proposed. Some interesting observations are made from the numerical results obtained from the algorithm. Furthermore, the high-SNR sum-rate scaling factor achievable over the CRC with imperfect CSIT is obtained., To be presented at ISIT 2009, Seoul, S. Korea
- Published
- 2009
8. Peak To Average Power Ratio Reduction for Multicarrier Systems Using Dirty Paper Coding
- Author
-
Pin-Hsun Lin, Hsuan-Jung Su, Hsuan-Tien Liu, and Shih-Chun Lin
- Subjects
Orthogonal frequency-division multiplexing ,business.industry ,Real-time computing ,Power (physics) ,Constraint (information theory) ,Reduction (complexity) ,Signal-to-noise ratio ,Transmission (telecommunications) ,Encoding (memory) ,Power ratio ,Bit error rate ,Dirty paper coding ,Electrical and Electronic Engineering ,Telecommunications ,business ,Algorithm ,Mathematics - Abstract
In this paper, we improve the peak to average power ratio (PAPR) reduction scheme for multicarrier systems proposed by Collings and Clarkson by applying dirty paper coding with peak power constraint. We compare the bit error rate (BER) performance among conventional orthogonal frequency division multiplexing (OFDM), Collings and Clarkson’s method, and our proposed scheme with bit loading. From simulation we find that when channel coding is considered, Collings and Clarkson’s method is the worst independent of the number of bits loaded. The proposed method performs the best when the number of bits is large and hence is suitable for high speed transmission.
- Published
- 2006
9. Structured Dirty Paper Coding with Known Interference Structure at Receiver
- Author
-
Sumit Roy, Hui Liu, and Bin Liu
- Subjects
Modulation ,Transmitter ,Electronic engineering ,Dirty paper coding ,Binary code ,Interference (wave propagation) ,Algorithm ,Precoding ,Electromagnetic interference ,Phase-shift keying ,Mathematics - Abstract
The Tomlinson-Harashima precoding is well known for dirty paper coding implementation. Despite its simplicity, THP suffers from a significant performance loss in the low SNR region due to modulo operations. In this paper, we propose new dirty paper precoding scheme by taking advantage of the known modulation structure of interference (e.g., BPSK and QPSK signals). The new method, termed structured DPC (SDPC), outperforms the regular THP with modest changes to the transmitter and receiver. For BPSK and QPSK cases investigated, the SDPC only suffers power loss, which is up to 1.25 dB compared with non-interference case, while the regular THP-based scalar dirty paper coding has a typical 4-5 dB capacity loss in the same low SNR regions
- Published
- 2006
10. About the Performance of Practical Dirty Paper Coding Schemes in Gaussian MIMO Broadcast Channels
- Author
-
Julien Dumont, G. R. Mohammad-Khani, and Samson Lasaulce
- Subjects
symbols.namesake ,Single antenna interference cancellation ,Gaussian ,MIMO ,Bit error rate ,Electronic engineering ,symbols ,Dirty paper coding ,Version vector ,Encoder ,Decoding methods ,Mathematics - Abstract
This paper describes a way of implementing DPC in a Gaussian MIMO broadcast channel. The outer encoder is based on a vector TCQ designed to possess certain "good properties". Simpler schemes such as the Tomlinson Harashima or Scalar Costa's scheme are also considered by a way of comparison. The inner encoder is implemented through a vector version of the ZF-DPC and the MMSE-DPC. The BER performance of the DPC schemes is evaluated and compared to that of conventional interference cancellers (pre-ZF, pre-MMSE). From simulation results the choices of the inner encoder, the outer encoder (THS/SCS/TCQ) and the interference cancellation technique (conventional or DPC) are discussed.
- Published
- 2006
11. On the dirty paper channel with fast fading dirt
- Author
-
Shlomo Shamai and Stefano Rini
- Subjects
business.industry ,Topology ,Precoding ,Channel capacity ,symbols.namesake ,Additive white Gaussian noise ,Fading distribution ,Channel state information ,Rician fading ,symbols ,Fading ,Telecommunications ,business ,Computer Science::Information Theory ,Mathematics ,Rayleigh fading - Abstract
Costa's “writing on dirty paper” result establishes that full state pre-cancellation can be attained in the Gel'fand-Pinsker problem with additive state and additive white Gaussian noise. This result holds under the assumptions that full channel knowledge is available at both the transmitter and the receiver. In this work we consider the scenario in which the state is multiplied by an ergodic fading process which is not known at the encoder. We study both the case in which the receiver has knowledge of the fading and the case in which it does not: for both models we derive inner and outer bounds to capacity and determine the distance between the two bounds when possible. For the channel without fading knowledge at either the transmitter or the receiver, the gap between inner and outer bounds is finite for a class of fading distributions which includes a number of canonical fading models. In the capacity approaching strategy for this class, the transmitter performs Costa's pre-coding against the mean value of the fading times the state while the receiver treats the remaining signal as noise. For the case in which only the receiver has knowledge of the fading, we determine a finite gap between inner and outer bounds for two classes of discrete fading distribution. The first class of distributions is the one in which there exists a probability mass larger than one half while the second class is the one in which the fading is uniformly distributed over values that are exponentially spaced apart. Unfortunately, the capacity in the case of a continuous fading distribution remains very hard to characterize.
- Published
- 2015
12. New Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes From Their Zeros.
- Author
-
Qiu, Jing, Zheng, Dabin, and Fu, Fang-Wei
- Subjects
CYCLIC codes ,REED-Solomon codes ,PAPER arts ,GENERALIZATION - Abstract
An $(r, \delta)$ -locally repairable code ($(r, \delta)$ -LRC for short) was introduced by Prakash et al. for tolerating multiple failed nodes in distributed storage systems, which was a generalization of the concept of $r$ -LRCs produced by Gopalan et al.. An $(r, \delta)$ -LRC is said to be optimal if it achieves the Singleton-like bound. Recently, Chen et al. generalized the construction of cyclic $r$ -LRCs proposed by Tamo et al. , and constructed several classes of optimal $(r, \delta)$ -LRCs of length $n$ for $n\, |\, (q-1)$ or $n\,|\, (q+1)$ , respectively in terms of a union of the set of zeros controlling the minimum distance and the set of zeros ensuring the locality. Following the work of , , this paper first characterizes $(r, \delta)$ -locality of a cyclic code via its zeros. Then we construct several classes of optimal cyclic $(r, \delta)$ -LRCs of length $n$ for $n\, |\, (q-1)$ or $n\,|\, (q+1)$ , respectively from the product of two sets of zeros. Our constructions include all optimal cyclic $(r,\delta)$ -LRCs proposed in , , and our method seems more convenient to obtain optimal cyclic $(r, \delta)$ -LRCs with flexible parameters. Moreover, many optimal cyclic $(r,\delta)$ -LRCs of length $n$ for $n\, |\, (q-1)$ or $n\,|\, (q+1)$ , respectively with $(r+\delta -1)\nmid n$ can be obtained from our method. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
13. Computation Alignment: Capacity Approximation Without Noise Accumulation.
- Author
-
Niesen, Urs, Nazer, Bobak, and Whiting, Phil
- Subjects
- *
WIRELESS communications , *PAPER arts , *MATHEMATICS , *STATISTICS , *NOISE - Abstract
Consider several source nodes communicating across a wireless network to a destination node with the help of several layers of relay nodes. Recent work by Avestimehr has approximated the capacity of this network up to an additive gap. The communication scheme achieving this capacity approximation is based on compress-and-forward, resulting in noise accumulation as the messages traverse the network. As a consequence, the approximation gap increases linearly with the network depth. This paper develops a computation alignment strategy that can approach the capacity of a class of layered, time-varying wireless relay networks up to an approximation gap that is independent of the network depth. This strategy is based on the compute-and-forward framework, which enables relays to decode deterministic functions of the transmitted messages. Alone, compute-and-forward is insufficient to approach the capacity as it incurs a penalty for approximating the wireless channel with complex-valued coefficients by a channel with integer coefficients. Here, this penalty is circumvented by carefully matching channel realizations across time slots to create integer-valued effective channels that are well suited to compute-and-forward. Unlike prior constant gap results, the approximation gap obtained in this paper also depends closely on the fading statistics, which are assumed to be i.i.d. Rayleigh. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
14. On the Multiple-Access Channel With Common Rate-Limited Feedback.
- Author
-
Shaviv, Dor and Steinberg, Yossef
- Subjects
- *
ENCODING , *PAPER arts , *MATHEMATICS , *MARKOV processes , *GAUSSIAN channels - Abstract
This paper studies the multiple-access channel (MAC) with rate-limited feedback. The channel output is encoded into one stream of bits, which is provided causally to the two users at the channel input. An achievable rate region for this setup is derived, based on superposition of information, block Markov coding, and coding with various degrees of side information for the feedback link. The suggested region coincides with the Cover–Leung inner bound for large feedback rates. The result is then extended for cases where there is only a feedback link to one of the transmitters, and for a more general case where there are two separate feedback links to both transmitters. We compute achievable regions for the Gaussian MAC and for the binary erasure MAC. The Gaussian region is computed for the case of common rate-limited feedback, whereas the region for the binary erasure MAC is computed for one-sided feedback. It is known that for the latter, the Cover–Leung region is tight, and we obtain results that coincide with the feedback capacity region for high feedback rates. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
15. On the Combinatorics of Locally Repairable Codes via Matroid Theory.
- Author
-
Westerback, Thomas, Freij-Hollanti, Ragnar, Ernvall, Toni, and Hollanti, Camilla
- Subjects
COMBINATORICS ,COMBINATORIAL probabilities ,COMBINATORIAL group theory ,MATROIDS ,LINEAR dependence (Mathematics) - Abstract
This paper provides a link between matroid theory and locally repairable codes (LRCs) that are either linear or more generally almost affine. Using this link, new results on both LRCs and matroid theory are derived. The parameters $(n,k,d,r,\delta )$ of LRCs are generalized to matroids, and the matroid analog of the generalized singleton bound by Gopalan et al. for linear LRCs is given for matroids. It is shown that the given bound is not tight for certain classes of parameters, implying a nonexistence result for the corresponding locally repairable almost affine codes that are coined perfect in this paper. Constructions of classes of matroids with a large span of the parameters $(n,k,d,r,\delta )$ and the corresponding local repair sets are given. Using these matroid constructions, new LRCs are constructed with prescribed parameters. The existence results on linear LRCs and the nonexistence results on almost affine LRCs given in this paper strengthen the nonexistence and existence results on perfect linear LRCs given by Song et al. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
16. A Factor-Graph Approach to Algebraic Topology, With Applications to Kramers–Wannier Duality.
- Author
-
Al-Bashabsheh, Ali and Vontobel, Pascal O.
- Subjects
TOPOLOGY ,MATHEMATICS ,MATHEMATICAL analysis ,GRAPH theory ,COMPUTER science ,COMPUTER engineering - Abstract
Algebraic topology studies topological spaces with the help of tools from abstract algebra. The main focus of this paper is to show that many concepts from algebraic topology can be conveniently expressed in terms of (normal) factor graphs. As an application, we give an alternative proof of a classical duality result of Kramers and Wannier, which expresses the partition function of the 2-D Ising model at a low temperature in terms of the partition function of the 2-D Ising model at a high temperature. Moreover, we discuss analogous results for the 3-D Ising model and the Potts model. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
17. Infection-Probability-Dependent Interlayer Interaction Propagation Processes in Multiplex Networks.
- Author
-
Liu, Juan, Wu, Xiaoqun, Lu, Jinhu, and Wei, Xiang
- Subjects
MULTIPLEXING ,SOCIAL networks - Abstract
Different spreading processes in multiplex networks may interact with each other and display intertwined effects. In this paper, we propose a theoretical framework called infection-probability-dependent interlayer interaction propagation processes in multiplex networks with an arbitrary number of layers, to more precisely depict the intertwined effects which bring challenges to the existing state-dependent interlayer interaction models. Specifically, the spreading rate of each node is regulated by the proposed spreading rate function (SRF) which depends on both the intrinsic dynamics in its layer and the infection probabilities of its counterparts. We propose an algorithm to obtain the spreading threshold of each layer of the proposed theoretical framework. We analyze the three-layer tuberculosis-awareness-flu model with the SRF of each node being the expectation of infection-probability-dependent spreading rate. This paper gives a thorough and detailed numerical investigation of the impact and interaction of system settings and the spreading threshold of each layer. We find that for tuberculosis spreading which is in competing relation with awareness and cooperation relation with flu, the epidemic threshold is a constant when other layers’ intrinsic spreading rates are small. The cooperation layer has dramatic influence on the constant while the competing layer has no effect on it. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
18. Capacity Characterization for State-Dependent Gaussian Channel With a Helper.
- Author
-
Sun, Yunhao, Duan, Ruchen, Liang, Yingbin, Khisti, Ashish, and Shamai Shitz, Shlomo
- Subjects
GAUSSIAN channels ,TRANSMITTERS (Communication) ,ARBITRARY constants ,MATHEMATICAL constants ,MATHEMATICS - Abstract
The state-dependent point-to-point Gaussian channel with a helper is first studied, in which a transmitter communicates with a receiver via a state-corrupted channel. The state is not known to the transmitter nor to the receiver, but known to a helper noncausally, which then wishes to assist the receiver to cancel the state. Differently from the previous work that characterized the capacity only in the infinite state power regime, this paper explores the general case with arbitrary state power. A lower bound on the capacity is derived based on an achievable scheme that integrates direct state subtraction and single-bin dirty paper coding. By analyzing this lower bound and further comparing it with the existing upper bounds, the capacity of the channel is characterized for a wide range of channel parameters. Such an idea of characterizing the capacity is further extended to study the two-user state-dependent multiple access channel with a helper. By comparing the derived inner and outer bounds, the channel parameters are partitioned into appropriate cases, and for each case, either segments on the capacity region boundary or the full capacity region are characterized. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
19. Column Distances of Convolutional Codes Over ${\mathbb Z}_{p^r}$.
- Author
-
Napp, Diego, Pinto, Raquel, and Toste, Marisa
- Subjects
ERROR-correcting codes ,COLUMN foundations ,GEOMETRIC vertices ,SINGLETON bounds ,CYCLIC codes - Abstract
Maximum distance profile codes over finite non-binary fields have been introduced and thoroughly studied in the last decade. These codes have the property that their column distances are maximal among all codes of the same rate and degree. In this paper, we aim at studying this fundamental concept in the context of convolutional codes over a finite ring. We extensively use the concept of $p$ -encoder to establish the theoretical framework and derive several bounds on the column distances. In particular, a method for constructing (not necessarily free) maximum distance profile convolutional codes over ${\mathbb Z}_{p^{r}}$ is presented. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
20. Binary LCD Codes and Self-Orthogonal Codes From a Generic Construction.
- Author
-
Zhou, Zhengchun, Li, Xia, Tang, Chunming, and Ding, Cunsheng
- Subjects
LINEAR codes ,INJECTIONS ,POLYNOMIALS ,BINARY codes ,GENERIC drugs - Abstract
Linear codes with certain special properties have received renewed attention in recent years due to their practical applications. Among them, binary linear complementary dual (LCD) codes play an important role in implementations against side-channel attacks and fault injection attacks. Self-orthogonal codes can be used to construct quantum codes. In this paper, four classes of binary linear codes are constructed via a generic construction which has been intensively investigated in the past decade. Simple characterizations of these linear codes to be LCD or self-orthogonal are presented. Resultantly, infinite families of binary LCD codes and self-orthogonal codes are obtained. Infinite families of binary LCD codes from the duals of these four classes of linear codes are produced. Many LCD codes and self-orthogonal codes obtained in this paper are optimal or almost optimal in the sense that they meet certain bounds on general linear codes. In addition, the weight distributions of two sub-families of the proposed linear codes are established in terms of Krawtchouk polynomials. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
21. An Ergodic Theory of Binary Operations—Part I: Key Properties.
- Author
-
Nasser, Rajai
- Subjects
ERGODIC theory ,BINARY operations ,MATHEMATICS ,CONTINUOUS groups ,INVARIANT measures - Abstract
An open problem in polarization theory is to determine the binary operations that always lead to polarization (in the general multilevel sense) when they are used in Arıkan style constructions. This paper, which is presented in two parts, solves this problem by providing a necessary and sufficient condition for a binary operation to be polarizing. This (first) part of this paper introduces the mathematical framework that we will use in the second part to characterize the polarizing operations. We define uniformity preserving, irreducible, ergodic, and strongly ergodic operations, and we study their properties. The concepts of a stable partition and the residue of a stable partition are introduced. We show that an ergodic operation is strongly ergodic if and only if all its stable partitions are their own residues. We also study the products of binary operations and the structure of their stable partitions. We show that the product of a sequence of binary operations is strongly ergodic if and only if all the operations in the sequence are strongly ergodic. In the second part of this paper, we provide a foundation of polarization theory based on the ergodic theory of binary operations that we develop in this part. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
22. Infinite Families of Linear Codes Supporting More t -Designs.
- Author
-
Yan, Qianqian and Zhou, Junling
- Subjects
AUTOMORPHISM groups ,CYBERNETICS ,AUTOMORPHISMS ,LINEAR codes - Abstract
Tang and Ding [IEEE IT 67 (2021) 244-254] studied the class of BCH codes $\mathcal {C}_{(q,q+1,4,1)}$ and their dual codes with $q=2^{m}$ and established that the codewords of the minimum (or the second minimum) weight in these codes support 4-designs or 3-designs. Motivated by this, we further investigate the codewords of the next adjacent weight in such codes and discover more infinite classes of $t$ -designs with $t=3,4$. In particular, we prove that codewords of weight 7 in $\mathcal {C}_{(q,q+1,4,1)}$ support 4-designs for odd $m \geqslant 5$ and they support 3-designs for even $m \geqslant 4$ , which provide infinite classes of simple $t$ -designs with new parameters. Another significant class of $t$ -designs we produce in this paper has complementary designs with parameters 4- $(2^{2s+1}+ 1,5,5)$ ; these designs have the smallest index among all the known simple 4- $(q+1,5,\lambda)$ designs derived from codes for prime powers $q$ ; and they are further proved to be isomorphic to the 4-designs admitting the projective general linear group PGL $(2,2^{2s+1})$ as the automorphism group constructed by Alltop in 1969. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
23. Shortened Linear Codes From APN and PN Functions.
- Author
-
Xiang, Can, Tang, Chunming, and Ding, Cunsheng
- Subjects
LINEAR codes ,BINARY codes ,CODING theory ,REED-Muller codes ,GENERATING functions ,NONLINEAR functions - Abstract
Linear codes generated by component functions of perfect nonlinear (PN for short) and almost perfect nonlinear (APN for short) functions and the first-order Reed-Muller codes have been an object of intensive study in coding theory. The objective of this paper is to investigate some binary shortened codes of two families of linear codes from APN functions and some $p$ -ary shortened codes associated with PN functions. The weight distributions of these shortened codes and the parameters of their duals are determined. The parameters of these binary codes and $p$ -ary codes are flexible. Many of the codes presented in this paper are optimal or almost optimal. The results of this paper show that the shortening technique is very promising for constructing good codes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
24. Comments on Cut-Set Bounds on Network Function Computation.
- Author
-
Huang, Cupjin, Tan, Zihan, Yang, Shenghao, and Guang, Xuan
- Subjects
LINEAR network coding ,COMPUTER systems ,INFORMATION theory ,TOPOLOGY ,MATHEMATICS - Abstract
A function computation problem over a directed acyclic network has been considered in the literature, where a sink node is required to compute a target function correctly with the inputs arbitrarily generated at multiple source nodes. The network links are error free but capacity limited, and the intermediate nodes perform network coding. The computing rate of a network code is the average number of times that the target function is computed for one use of the network, i.e., each link in the network is used at most once. In the existing papers, two cut-set bounds were proposed on the computing rate. However, we in this paper show that these bounds are not valid for general network function computation problems. We analyze the reason of the invalidity and propose a general cut-set bound by using a new equivalence relation associated with the inputs of the target function. Moreover, some results in the existing papers were proved by applying the invalid upper bound. We also justify the validity of these results. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
25. The q -Ary Antiprimitive BCH Codes.
- Author
-
Zhu, Hongwei, Shi, Minjia, Wang, Xiaoqiang, and Helleseth, Tor
- Subjects
CYCLIC codes ,LINEAR codes ,DECODING algorithms ,LIQUID crystal displays - Abstract
It is well-known that cyclic codes have efficient encoding and decoding algorithms. In recent years, antiprimitive BCH codes have attracted a lot of attention. The objective of this paper is to study BCH codes of this type over finite fields and analyse their parameters. Some lower bounds on the minimum distance of antiprimitive BCH codes are given. The BCH codes presented in this paper have good parameters in general, containing many optimal linear codes. In particular, two open problems about the minimum distance of BCH codes of this type are partially solved in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
26. Stochastic Texture Analysis for Measuring Sheet Formation Variability in the Industry.
- Author
-
Scharcanski, Jacob
- Subjects
MANUFACTURING processes ,QUALITY control ,IMAGE processing ,STOCHASTIC analysis ,VISUAL perception ,WAVELETS (Mathematics) ,MATHEMATICS - Abstract
Several continuous manufacturing processes use stochastic texture images for quality control and monitoring. Large amounts of pictorial data are acquired, providing important information about both the materials produced and the manufacturing processes involved. However, it is often difficult to measure objectively the similarity among such industrial stochastic images or to discriminate between the texture images of stochastic materials with distinct properties. Nowadays, the degree of discrimination required by industrial processes often goes beyond the limits of human visual perception. This paper proposes a new approach for multiresolution stochastic texture discrimination in the industry (e.g., nonwoven textiles and paper), which is focused on sheet formation properties. The wavelet transform is used to represent stochastic texture images in multiple resolutions and to describe them using local density variability as features. At each resolution, the wavelet subbands approximate image gradients. The image gradients are modeled as Gaussian colored noise, and the gradient magnitudes, as Rayleigh probability density functions. Based on this representation, a multiresolution distance measure for stochastic textures is proposed. Some experimental results are reported, and ideas for future work are presented with the conclusions. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
27. Design of the cognitive radio with partial channel state information at the transmitter
- Author
-
Pin-Hsun Lin, Hsuan-Jung Su, and Shih-Chun Lin
- Subjects
Cognitive radio ,Optimization problem ,Channel state information ,Control theory ,Transmitter ,Dirty paper coding ,Fading ,Data_CODINGANDINFORMATIONTHEORY ,Precoding ,Algorithm ,Computer Science::Information Theory ,Communication channel ,Mathematics - Abstract
In this paper, we present the cognitive radio system design with partial channel state information known at the transmitter (CSIT). We replace the dirty paper coding (DPC) used in the cognitive radio with full CSIT by the linear assignment Gel'fand-Pinsker coding (LA-GPC), which can utilize the limited knowledge of the channel more efficiently. Based on the achievable rate derived from the LA-GPC, two optimization problems under the fast and slow fading channels are formulated. We then derive semi-analytical solutions to the relaying ratios and precoding coefficients of these two problems. Simulation results show that the proposed semi-analytical solutions perform close to the optimal solutions found by brute-force search, and outperform the systems base on naive DPC. Asymptotic analysis also shows that these solutions converge to the optimal ones solved with full CSIT when the K-factor of Rician channels approaches infinity.
- Published
- 2009
28. Lattices are everywhere
- Author
-
Ram Zamir
- Subjects
Channel code ,Theoretical computer science ,Dithered quantization ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Probability density function ,Data_CODINGANDINFORMATIONTHEORY ,Interference cancelation ,symbols.namesake ,Additive white Gaussian noise ,Lattice (order) ,symbols ,Dirty paper coding ,Computer Science::Information Theory ,Mathematics ,Coding (social sciences) - Abstract
As bees and crystals (and people selling oranges in the market) know it for many years, lattices provide efficient structures for packing, covering, quantization and channel coding. In the recent years, interesting links were found between lattices and coding schemes for multi-terminal networks. This tutorial paper covers close to 20 years of my research in the area; of enjoying the beauty of lattice codes, and discovering their power in dithered quantization, dirty paper coding, Wyner-Ziv DPCM, modulo-lattice modulation, distributed interference cancelation, and more.
- Published
- 2009
29. Comments on "A Noncoherent Tracking Loop With Diversity and Multipath Interference Cancellation for Direct-Sequence Spread-Spectrum Systems".
- Author
-
Jia-Chin Lin
- Subjects
RADIO transmitter fading ,MATHEMATICS ,SCIENCE ,MATHEMATICAL programming ,TELECOMMUNICATION ,TELECOMMUNICATION systems - Abstract
This article comments on a research paper "A Noncoherent Tracking Loop With Diversity and Multipath Interference Cancellationfor Direct-Sequence Spread-Spectrum Systems." Researchers presented a noncoherent tracking loop with diversity and multipath interference cancellation to improve the loop performance on frequency-selective fading channels. Actually, such effects can change the error characteristic, at least in the mean sense, and thus make the analyses of jitter performance improper. The mathematical derivation of the research has been provided in the article.
- Published
- 2004
- Full Text
- View/download PDF
30. Wyner-Ziv coding over broadcast channels
- Author
-
J. Nayak, Ertem Tuncel, and Deniz Gunduz
- Subjects
Shannon–Fano coding ,Theoretical computer science ,Variable-length code ,Dirty paper coding ,Data_CODINGANDINFORMATIONTHEORY ,Information theory ,Hamming code ,Algorithm ,Decoding methods ,Slepian–Wolf coding ,Computer Science::Information Theory ,Mathematics ,Coding (social sciences) - Abstract
This paper deals with the design of coding schemes for lossy transmission of a source over a broadcast channel when there is correlated side information at the receivers. Using ideas from Slepian-Wolf coding over broadcast channels and dirty paper coding, new schemes are presented and their rate-distortion performance is derived. For the binary Hamming and quadratic Gaussian scenarios, when the source and the channel bandwidths are equal, it is shown that these schemes are sometimes optimal and that they can outperform both separate source and channel coding, and uncoded transmission.
- Published
- 2008
31. Vector Wyner-Ziv coding for vector Gaussian CEO problem
- Author
-
Shih-Chun Lin and Hsuan-Jung Su
- Subjects
Theoretical computer science ,Gaussian ,Scalar (mathematics) ,Data compression ratio ,Data_CODINGANDINFORMATIONTHEORY ,symbols.namesake ,symbols ,Symmetric matrix ,Dirty paper coding ,Gaussian process ,Algorithm ,Decoding methods ,Computer Science::Information Theory ,Coding (social sciences) ,Mathematics - Abstract
Wyner-Ziv coding (WZC) is a compression technique which uses decoder side-information to help reconstruction. The vector WZC is a key element to solve the vector Gaussian CEO problem for sensor networks. Compared with the scalar CEO problem, in the vector CEO problem sensor node array is used by each agent and a vector source is to be estimated. In this paper, we present a nested-lattice based vector WZC structure, which is a generalization of the scalar WZC proposed by Zamir et al. The key is to explore the duality between the WZC problem and the dirty paper coding (DPC) problem. This coding structure is shown to be able to achieve the Berger-Tung sum rate, which is the best known compression rate for the CEO problem.
- Published
- 2007
32. A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels
- Author
-
John M. Cioffi and Mehdi Mohseni
- Subjects
Mathematical optimization ,Gaussian ,MIMO ,Data_CODINGANDINFORMATIONTHEORY ,Topology ,Entropy power inequality ,symbols.namesake ,Channel capacity ,Gaussian noise ,Convex optimization ,Converse ,symbols ,Dirty paper coding ,Computer Science::Information Theory ,Mathematics - Abstract
The paper provides a proof of the converse for the capacity region of the Gaussian MIMO broadcast channel under total average transmit power constraint. The proof uses several ideas from earlier works on the problem including the recent converse proof by Weingarten, Steinberg and Shamai. First the duality between Gaussian multiple access and broadcast channels is employed to show that every point on the boundary of the dirty paper coding region can be represented as the optimal solution to a convex optimization problem. Using the optimality conditions for this convex problem, a degraded broadcast channel is constructed for each point. It is then shown that the capacity region for this degraded broadcast channel contains the capacity region of the original channel. Moreover, the same point lies on the boundary of the dirty paper coding region for this degraded channel. Finally, the standard entropy power inequality is used to show that this point lies on the boundary of the capacity region of the degraded channel as well and consequently it is on the boundary of the capacity region of the original channel.
- Published
- 2006
33. How Much Does Transmit Correlation Affect the Sum-Rate of MIMO Downlink Channels?
- Author
-
Babak Hassibi, M. Sharif, and Tareq Y. Al-Naffouri
- Subjects
Discrete mathematics ,Beamforming ,Spatial correlation ,business.industry ,Covariance matrix ,MIMO ,Type (model theory) ,Channel capacity ,Signal-to-noise ratio (imaging) ,Dirty paper coding ,business ,Caltech Library Services ,Computer Science::Information Theory ,Computer network ,Mathematics - Abstract
This paper considers the effect of spatial correlation between transmit antennas on the sum-rate capacity of the MIMO broadcast channel (i.e., downlink of a cellular system). Specifically, for a system with a large number of users n, we analyze the scaling laws of the sum-rate for the dirty paper coding and for different types of beamforming transmission schemes. When the channel is i.i.d., it has been shown that for large n, the sum rate is equal to M log log n + M log P/M + o(1) where M is the number of transmit antennas, P is the average signal to noise ratio, and o(1) refers to terms that go to zero as n rarr infin. When the channel exhibits some spatial correlation with a covariance matrix R (non-singular with tr(R) = M), we prove that the sum rate of dirty paper coding is M log log n + M log P/M + log det(R) + o(1). We further show that the sum-rate of various beamforming schemes achieves M log log n + M log P/M + M log c + o(1) where c les 1 depends on the type of beamforming. We can in fact compute c for random beamforming proposed in M. Sharif et al. (2005) and more generally, for random beamforming with preceding in which beams are pre-multiplied by a fixed matrix. Simulation results are presented at the end of the paper.
- Published
- 2006
34. Narrow-Sense BCH Codes Over \mathrm GF(q) With Length n=\frac q^m-1q-1.
- Author
-
Li, Shuxing, Ding, Cunsheng, Xiong, Maosheng, and Ge, Gennian
- Subjects
CYCLIC codes ,QUADRATIC forms ,BCH codes ,DECODING algorithms ,TELECOMMUNICATION systems - Abstract
Cyclic codes are widely employed in communication systems, storage devices, and consumer electronics, as they have efficient encoding and decoding algorithms. BCH codes, as a special subclass of cyclic codes, are in most cases among the best cyclic codes. A subclass of good BCH codes are the narrow-sense BCH codes over \mathrm GF(q) with length n=(q^m-1)/(q-1) . Little is known about this class of BCH codes when $q>2$ . The objective of this paper is to study some of the codes within this class. In particular, the dimension, the minimum distance, and the weight distribution of some ternary BCH codes with length n=(3^{m}-1)/2 are determined in this paper. A class of ternary BCH codes meeting the Griesmer bound is identified. An application of some of the BCH codes in secret sharing is also investigated. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
35. Open-Loop Coherent Distributed Arrays.
- Author
-
Nanzer, Jeffrey A., Schmid, Robert L., Comberiate, Thomas M., and Hodkin, Jason E.
- Subjects
QUANTITATIVE research ,REMOTE sensing ,RANGE of measurement ,DETECTORS ,MATHEMATICS - Abstract
The ability to cohere the wireless operations between separate, moving microwave systems enables significant increases in capability for remote sensing, radar, communications, and other microwave wireless applications. Open-loop coherent distributed arrays, which are distributed systems of nodes that coherently coordinate without external signal inputs from the destination, are introduced in this paper. A model of the signal received from a coherent distributed array is derived, and a statistical analysis of the variation in signal power in the presence of coordination errors is presented. Requirements on the tolerable errors for internode range measurement, beamsteering angle measurement, and internode clock phase synchronization are given as a function of the probability of achieving a given signal power. Approaches for achieving the necessary internode range and angle measurements are presented, and the experimental results of a novel one-way clock transfer approach to phase synchronization are shown. These examples demonstrate the feasibility of implementing coherent distributed arrays on moving platforms operating at frequencies extending into the microwave region. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
36. Reduced Electromagnetic Edge Scattering Using Inhomogeneous Anisotropic Impedance Surfaces.
- Author
-
Hou, Haijian, Long, Jiang, Wang, Junhong, and Sievenpiper, Daniel F.
- Subjects
CRITICAL angle (Optics) ,MATHEMATICS ,ELECTROMAGNETIC wave scattering ,REFRACTIVE index ,ELECTRO-optical effects - Abstract
Electromagnetic scattering characteristics highly depend on the geometry and material property of the scatterers. In particular, electromagnetic wave scattering occurs at the discontinuity of the propagation path, such as the edge of a scatterer. In this paper, the edge scattering from a triangular object is largely reduced by patterning the triangular surface with inhomogeneous and anisotropic impedance surface. Because surface waves propagate toward the direction with the lower surface refractive index on an anisotropic surface, the direction of the wave propagation can be controlled by designing the distribution of the refractive index. Consequently, the proposed anisotropic impedance surfaces can make the current flows toward or away from the edge so that the edge scattering can be reduced or redirected to a different angle. For demonstration, anisotropic unit cells are analyzed and designed. Also, the anisotropic impedance surfaces are simulated, fabricated, and measured. Here we propose two types of impedance profiles, which are capable of changing the surface current direction either toward or away from the scattering edge. The experimental measurement demonstrates a 7–10 dB edge scattering reduction. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
37. Scaling laws of sum rate using time-sharing, DPC, and beamforming for MIMO broadcast channels
- Author
-
Babak Hassibi and M. Sharif
- Subjects
Beamforming ,Discrete mathematics ,Gaussian ,Multiplicative function ,MIMO ,Real-time computing ,Throughput ,Data_CODINGANDINFORMATIONTHEORY ,Transmitter power output ,symbols.namesake ,Log-log plot ,symbols ,Dirty paper coding ,Caltech Library Services ,Mathematics ,Computer Science::Information Theory - Abstract
This paper derives scaling laws of the sum rate throughput for MIMO Gaussian broadcast channels using time-sharing to the strongest user, dirty paper coding (DPC), and beamforming when the number of users (receivers) n is large. Assuming a fixed total average transmit power, we show that for a system with M transmit antennas and users equipped with N antennas, the sum rate scales like M log log nTV for DPC and beamforming when M is fixed and for any N (either growing to infinity or not). On the other hand, when both M and TV are fixed, the sum rate of time-sharing to the strongest user scales like min(M,N) log log n. It is also shown that if M grows as logn, the sum rate of DPC and beamforming will grow linearly in M, but with different constant multiplicative factors. In this region, the sum rate capacity of time-sharing scales like N log log n.
- Published
- 2004
38. Topological Structure, Reachability, and Stabilization of Constrained Boolean Control Networks via Event-Triggered Control.
- Author
-
Lin, Lin, Cao, Jinde, Abdel-Aty, Mahmoud, and Al-Juboori, Udai Ali
- Subjects
ESCHERICHIA coli ,SWARM intelligence ,STATE feedback (Feedback control systems) ,ALGORITHMS - Abstract
This paper is concerned with the topological structure, reachability, and stabilization for Boolean control networks (BCNs) with state constraints via event-triggered control (ETC) scheme. In the first part, the topological structure of BCNs with state constraints is studied. Under the framework of state constrain, the definitions of fixed point and cycle are first defined. A novel phenomenon is that there may exist two kinds constrained fixed points, which are, respectively, named as the livelock and deadlock ones. It is different with the traditional fixed point. Accordingly, a formula is presented to calculate the number of constrained fixed points and constrained cycles. In the second part, the constrained reachability and stabilization problem of the event-triggered controlled BCNs are investigated. Two necessary and sufficient criteria are, respectively, obtained. Furthermore, an algorithm is developed to design all feasible controllers. Finally, a reduced model of the lac operon in the Escherichia coli is shown to illustrate the efficiency of the obtained results. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
39. Geometric Approach to b-Symbol Hamming Weights of Cyclic Codes.
- Author
-
Shi, Minjia, Ozbudak, Ferruh, and Sole, Patrick
- Subjects
CYCLIC codes ,HAMMING weight ,GEOMETRIC approach ,FINITE fields ,BINARY codes ,DECODING algorithms ,HAMMING distance ,ALGEBRAIC curves - Abstract
Symbol-pair codes were introduced by Cassuto and Blaum in 2010 to protect pair errors in symbol-pair read channels. Recently Yaakobi, Bruck and Siegel (2016) generalized this notion to b-symbol codes in order to consider consecutive b errors for a prescribed integer b ≥ 2, and they gave constructions and decoding algorithms. Cyclic codes were considered by various authors as candidates for symbol-pair codes and they established minimum distance bounds on (certain) cyclic codes. In this paper we use algebraic curves over finite fields in order to obtain tight lower and upper bounds on b-symbol Hamming weights of arbitrary cyclic codes over F
q . Here b ≥ 2 is an arbitrary prescribed positive integer and Fq is an arbitrary finite field. We also present a stability theorem for an arbitrary cyclic code C of dimension k and length n: the b-symbol Hamming weight enumerator of C is the same as the k-symbol Hamming weight enumerator of C if k ≤ b ≤ n−1. Moreover, we give improved tight lower and upper bounds on b-symbol Hamming weights of some cyclic codes related to irreducible cyclic codes. Throughout the paper the length n is coprime to q. [ABSTRACT FROM AUTHOR]- Published
- 2021
- Full Text
- View/download PDF
40. Distributed Control for Identical Dynamically Coupled Systems: A Decomposition Approach
- Author
-
Paolo Massioni and Michel Verhaegen
- Subjects
decomposition ,formation flying ,paper machines ,Linear system ,Linear matrix inequality ,Transfer function ,Multi-objective optimization ,Computer Science Applications ,Matrix decomposition ,Discrete time and continuous time ,distributed control ,Control and Systems Engineering ,Control theory ,Symmetric matrix ,linear matrix inequalities (LMIs) ,Electrical and Electronic Engineering ,Mathematics - Abstract
We consider the problem of designing distributed controllers for a class of systems which can be obtained from the interconnection of a number of identical subsystems. If the state space matrices of these systems satisfy a certain structural property, then it is possible to derive a procedure for designing a distributed controller which has the same interconnection pattern as the plant. This procedure is basically a multiobjective optimization under linear matrix inequality constraints, with system norms as performance indices. The explicit expressions for computing these controllers are given for both H infin or H 2 performance, and both for static state feedback and dynamic output feedback (in discrete time). At the end of the paper, two application examples illustrate the effectiveness of the approach.
- Published
- 2009
41. On Factor Prime Factorizations for n-D Polynomial Matrices.
- Author
-
Mingsheng Wang
- Subjects
MATRICES (Mathematics) ,POLYNOMIAL rings ,COMMUTATIVE rings ,ALGORITHMS ,RING theory ,ALGEBRA ,FACTORIZATION ,MATHEMATICS ,MATHEMATICAL analysis - Abstract
This paper investigates the problem of factor prime factorizations for n-D polynomial matrices and presents a criterion for the existence of factor prime factorizations for an important class of n-D polynomial matrices. As a by-product, we also obtain an algebraic algorithm to check n-D factor primeness in some important cases which partially solves the long-standing open problem of recognizing n-D factor prime matrices. Some problems related to the factorization methods are also studied. Several exam- pies are given to illustrate the results. The results presented in this paper are true over any coefficient field. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
42. Lattice Strategies for the Dirty Multiple Access Channel
- Author
-
Tal Philosof, Ram Zamir, Uri Erez, and Ashish Khisti
- Subjects
FOS: Computer and information sciences ,Linear coding ,Computer Science - Information Theory ,Gaussian ,Library and Information Sciences ,Topology ,Precoding ,Upper and lower bounds ,Combinatorics ,symbols.namesake ,Lattice (order) ,Computer Science::Information Theory ,Mathematics ,Channel code ,business.industry ,Information Theory (cs.IT) ,Transmitter ,Computer Science Applications ,Single antenna interference cancellation ,Channel state information ,symbols ,Dirty paper coding ,Transceiver ,Telecommunications ,business ,Random variable ,Information Systems ,Coding (social sciences) - Abstract
A generalization of the Gaussian dirty-paper problem to a multiple access setup is considered. There are two additive interference signals, one known to each transmitter but none to the receiver. The rates achievable using Costa's strategies (i.e. by a random binning scheme induced by Costa's auxiliary random variables) vanish in the limit when the interference signals are strong. In contrast, it is shown that lattice strategies ("lattice precoding") can achieve positive rates independent of the interferences, and in fact in some cases - which depend on the noise variance and power constraints - they are optimal. In particular, lattice strategies are optimal in the limit of high SNR. It is also shown that the gap between the achievable rate region and the capacity region is at most 0.167 bit. Thus, the dirty MAC is another instance of a network setup, like the Korner-Marton modulo-two sum problem, where linear coding is potentially better than random binning. Lattice transmission schemes and conditions for optimality for the asymmetric case, where there is only one interference which is known to one of the users (who serves as a "helper" to the other user), and for the "common interference" case are also derived. In the former case the gap between the helper achievable rate and its capacity is at most 0.085 bit., 42 pages, 14 figures
- Published
- 2007
43. Binary [ n , (n + 1)/2] Cyclic Codes With Good Minimum Distances.
- Author
-
Tang, Chunming and Ding, Cunsheng
- Subjects
CYCLIC codes ,REED-Muller codes ,BINARY codes ,LINEAR codes - Abstract
The binary quadratic-residue codes and the punctured Reed-Muller codes ${\mathcal {R}}_{2}((m-1)/2, m))$ are two families of binary cyclic codes with parameters $[n, (n+1)/2, d \geq \sqrt {n}]$. These two families of binary cyclic codes are interesting partly due to the fact that their minimum distances have a square-root bound. The objective of this paper is to construct two families of binary cyclic codes of length $2^{m}-1$ and dimension near $2^{m-1}$ with good minimum distances. When $m \geq 3$ is odd, the codes become a family of duadic codes with parameters $[2^{m}-1, 2^{m-1}, d]$ , where $d \geq 2^{(m-1)/2}+1$ if $m \equiv 3 \pmod {4}$ and $d \geq 2^{(m-1)/2}+3$ if $m \equiv 1 \pmod {4}$. The two families of binary cyclic codes contain some optimal binary cyclic codes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
44. DPC VS TDMA in SISO Broadcast Channels: A Practical Comparison
- Author
-
Julien Dumont, G. R. Mohammad-Khani, and Samson Lasaulce
- Subjects
business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Time division multiple access ,Data_CODINGANDINFORMATIONTHEORY ,Imperfect channel state information ,Dirty paper ,Broadcast channels ,Computer Science::Networking and Internet Architecture ,Trellis modulation ,Trellis coded quantization ,business ,Algorithm ,Decoding methods ,Computer Science::Information Theory ,Coding (social sciences) ,Computer network ,Mathematics - Abstract
In this paper we want to make a fair comparison between TDMA and DPC in terms of the BER region and maximum number of satisfied users. For this purpose we choose the coding/decoding schemes as follows : DPC is based on a trellis coded quantization implementation and successive coding while TDMA uses trellis coded modulation. Simulation results are provided both for the perfect and imperfect channel state information cases. In the perfect CSI case all the tested scenarios show that TDMA generally outperfoms DPC. In the imperfect CSI case DPC is shown to be less sensitive than TDMA to channel estimation errors.
- Published
- 2006
45. A Double-Blind Anonymous Evaluation-Based Trust Model in Cloud Computing Environments.
- Author
-
Zhang, Peiyun, Zhou, Mengchu, and Kong, Yang
- Subjects
CLOUD computing ,HELPING behavior ,TRUST ,COMPUTER systems ,DECEPTION ,FUZZY graphs ,FUZZY mathematics - Abstract
In the last ten years, cloud services provided many applications in various areas. Most of them are hosted in a heterogeneous distributed large-scale cloud computing environment and face inherent uncertainty, unreliability, and malicious attacks that trouble both service users and providers. To solve the problems of malicious attacks (including solo and collusion deception ones) in a public cloud computing environment, we for the first time propose a double-blind anonymous evaluation-based trust model. Based on it, cloud service providers and users are anonymously matched according to user requirements. It can be used to effectively handle some malicious attacks that intend to distort trust evaluations. Providers may secretly hide gain-sharing information into service results and send the results to users to ask for higher trust evaluations than their deserved ones. This paper proposes to adopt checking nodes to help detect such behavior. It then conducts gain–loss analysis for providers who intend to perform provider–user collusion deception. The proposed trust model can be used to effectively help one recognize collusion deception behavior and allow policy-makers to set suitable loss to punish malicious providers. Consequently, provider-initiated collusion deception behavior can be greatly discouraged in public cloud computing systems. Simulation results show that the proposed method outperform two updated methods, i.e., one based on fail-stop signature and another based on fuzzy mathematics in terms of malicious node detection ratio and speed. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
46. Emergency Remote Teaching in Higher Education Institutes: A Taxonomy of Challenges Faced by First-Year Mathematics Students in the Pacific Region
- Author
-
Sione Paea, Bibhya Sharma, Gabiriele Bulivou, and Christos Katsanos
- Subjects
Best merge method (BMM) ,card sorting ,category validity technique (CVT) ,COVID-19 pandemic ,emergency remote teaching (ERT) ,mathematics ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Emergency Remote Teaching (ERT) can be defined as a shift of instructional delivery to a substitute delivery approach during a crisis. Such a shift poses several challenges for students at Higher Education Institutes. This paper presents a taxonomy of such challenges faced by first-year mathematics students in the Pacific region during the ERT dictated by the COVID-19 pandemic. First, a list of 44 challenges was assembled based on a university’s in-house monitoring report, literature review and the authors’ experiences of challenges faced by students. Next, the open card sorting technique involving 32 participants was used to classify these challenges. Open card sorting is a well-established method for discovering how people understand and categorize information. This paper employed a recently proposed algorithm to quantitatively analyze open card sorting data using the Best Merge Method, Category Validity Technique and Multidimensional Scaling. Analysis of the collected card sort data produced the initial taxonomy of challenges. Finally, the participants were asked to answer a questionnaire so that we could validate and further refine the taxonomy. The proposed taxonomy includes seven challenges: i) lack of online learning support; ii) problem with online course delivery; iii) time and workload management; iv) learning management system issues; v) lack of face-to-face interaction; vi) financial hardship; vii) internet challenge. Such a taxonomy might be particularly useful in designing and evaluating an ERT approach.
- Published
- 2024
- Full Text
- View/download PDF
47. Combined shaping and precoding for interference cancellation at low SNR
- Author
-
Ram Zamir, Tal Philosof, and Uri Erez
- Subjects
business.industry ,Concatenated error correction code ,Concatenation ,Variable-length code ,Data_CODINGANDINFORMATIONTHEORY ,Precoding ,Single antenna interference cancellation ,Zero-forcing precoding ,Dirty paper coding ,Constant-weight code ,Telecommunications ,business ,Algorithm ,Computer Science::Information Theory ,Mathematics - Abstract
We consider multi dimensional dirty paper coding at low SNR, and propose a low rate precoding scheme which combines MMSE estimation, dithering and a variant of nested codes, based on concatenation of a "syndrome dilution" code and a "syndrome-to-coset" modulation code.
- Published
- 2003
48. PAPR Problem for Walsh Systems and Related Problems.
- Author
-
Boche, Holger and Tampubolon, Ezra
- Subjects
SIGNAL processing ,WIRELESS communications ,ENERGY consumption ,POWER resources ,CODE division multiple access ,ARITHMETIC series - Abstract
High peak values of transmission signals in wireless communication systems lead to wasteful energy consumption and degradation of several transmission performances. We continue the theoretical contributions made by Boche and Farell toward the understanding of peak value reduction, using the strategy known as tone reservation for orthogonal transmission schemes. There it was shown that for orthogonal frequency-division multiplexing (OFDM) systems, the combinatorial object called arithmetic progression plays an important role in setting limitations for the applicability of the tone reservation method. In this paper, we show that the combinatorial object introduced as perfect Walsh sum (PWS) plays a similar role for code-division multiple access (CDMA) systems as arithmetic progression for OFDM systems. By specific construction, we show that for a chosen numbers $m$ and $n$ , all subsets $\mathcal {I} $ of the set $[N]$ of the first $N=2^{n}$ natural numbers, which has the density in $[N]$ larger than a given $\delta \in (0,1)$ , i.e., $\left |{ \mathcal {I} }\right |/N\geq \delta $ , and which is sufficiently large enough, in the sense that $\left |{ I }\right |\geq 2(2/\delta)^{2^{m}-1}$ , contains a PWS of size $2^{m}$. By means of this result, and motivated by the previously mentioned connection between arithmetic progression and PWS, we show results for the PWS which are analogous to the famous Szemerédi theorem on arithmetic progressions, Conlon-Gower’s theorem on probabilistic construction of “sparse” sets containing an arithmetic progression, and even a solution of an analogon to the Erdős’ conjecture on arithmetic progressions. Those results give in particular an insight into the asymptotic limitations of tone reservation method for the CDMA systems. Besides, we show that a subset $I$ of $[N]$ is a PWS if and only if the embedding inequality of the subspace of $L^{1}([{0,1}])$ , containing linear combinations of Walsh functions indexed by elements of $\mathcal {I} $ , holds with the minimum possible embedding constant $\sqrt { \left |{ \mathcal {I} }\right |}$. The corresponding approach based in particular by the fact that the PWSs are the only Walsh sums having unit $L^{1}$ -norm, proven in this paper. By means of that results, we show that the minimum possible threshold constant for which the tone reservation method is applicable yields $\sqrt { \left |{ \mathcal {I} }\right |}$ if and only if the information set $\mathcal {I} $ is a PWS. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
49. Advances in the First Brazilian Project on an HTS Power Cable.
- Author
-
Neves, Marcelo A., da Silva, Edson P., Lopes, Artur J. S., Branco, Luiz M. C., Pereyra, Luiz A., de Léo, Ana C., Neto, Denis P., Berredo, Alessandro C. S., Barony, Marcio A. P., Gliender Mendonca, Nascimento, Carlos A. F., Pereira, Maureen T. R. F., Paulo Teixeira, Toshiaki Hojo, Carvalho Jr., Eden L., Alves, Wanderson M., Guimarães, Maurissone F., and Nascimento, Carlos A. M.
- Subjects
DIELECTRIC devices ,ELECTROMAGNETIC devices ,COMPUTER simulation ,GEOMETRY ,MATHEMATICS - Abstract
This paper presents, in development in Brazil, a research for an ac three-phase cold dielectric (CD) high-temperature superconducting (HTS) power cable. That cable was rated to operate mainly at 69 kV/300 A. The first phase of research was part of a National Strategic Project for power transfer in Brazil. The research over the last two years included an improvement in design in order to enable operation also at higher voltages. The cable design changed and now each phase is inside its own cryostat. The electric isolation also changed. It was selected a laminated dielectric material not yet used (to our knowledge) in any other HTS power cable project. The main outcomes and results presented here are i) the improved cable design, ii) the characterizations of the new isolating material, iii) the facilities for cable construction and high-current tests, iv) one demonstrative model for one phase of the cable, and v) the validation of the new cable geometry by numerical simulation of electromagnetic and thermal behaviors of one of its phases at the rated voltage and current. As a conclusion, the results allowed to improve and disseminate the feasibility of the CD HTS cable technology in Brazil. Some details are not shown because they are patent pending. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
50. A Possible Way to Perform Recursive Bayesian Estimate in the Possibility Domain.
- Author
-
Jiang, Wei, Ferrero, Alessandro, Salicone, Simona, and Zhang, Qi
- Subjects
GENERALIZATION ,BAYESIAN analysis ,RANDOM variables ,POSSIBILITY ,MATHEMATICS - Abstract
This paper defines a generalization of the recursive Bayesian estimate (RBE), within the mathematical possibility theory. This generalization is motivated by the fact that the classical RBE, by design, deals only with random variables and can only provide closed-form solution for a few cases. The possibilistic generalization is based on the random-fuzzy variables, thus allowing one to take into account, in a very natural way, both random and systematic contributions to the uncertainty and to implement the RBE for any distribution of system state variables in a simple way. This paper illustrates the advantages of the proposed generalization, by presenting both the theoretical development, and a detailed application example. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.