The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A concatenated coding scheme using a polarization transformation followed by outer sub-codes is analyzed. Achievable error exponents and upper bounds on the error rate are derived. The first bound is obtained using outer codes which are typical linear codes from the ensemble of parity check matrices whose elements are chosen independently and uniformly. As a byproduct of this bound, it determines...
This paper investigates the Gaussian state-dependent Z-interference channel (Z-IC), in which two receivers are corrupted respectively by two correlated states that are noncausally known to transmitters and unknown to receivers. Three interference regimes are studied, and the capacity region or sum capacity boundary is characterized either fully or partially under various channel parameters. The impact...
One of the main challenges of communication in the absence of transmitter channel knowledge is codebook universality, i.e., the existence of a single codebook that guarantees a given rate for all channel states. We address this problem for a class of ergodic fading multiple-input multiple-output (MIMO) channels, whose fading distribution is not necessarily isotropic. It is shown that a universal codebook...
Two independent data streams — the “zero-error stream” and the “rare-error stream” — are to be transmitted over a noisy discrete memoryless channel with feedback. Errors are tolerated only in the rare-error stream, provided that their probability tends to zero. Clearly the rate of the error-free stream cannot exceed the channel's zero-error feedback capacity, and the sum of the streams' rates cannot...
In this paper, the impact of a small variations in the channel gains on the secrecy rate of the wiretap channel is studied, in which it is assumed that the imperfect channel knowledge is available at the transmitter. First, we consider general additive noise model for both legitimate and eavesdropper channels in the wiretap channel, and compute the variation of the secrecy rate resulting from the...
Achieving information-theoretic security using explicit coding scheme in which unlimited computational power for eavesdropper is assumed, is one of the main topics is security consideration. It is shown that polar codes are capacity achieving codes and have a low complexity in encoding and decoding. It has been proven that polar codes reach to secrecy capacity in the binary-input wiretap channels...
We address the single-source-destination routing problem in a mesh network with a broadcast channel, time-division multiplexing (TDM) and no spatial reuse, which is a special type of the PLC channel. First, the outer bound on the achievable data rate is evaluated. We show that the routing protocols (RPs) with static routing do not allow approaching this data rate limit. Then, we study RP with opportunistic...
The capacity of the AWGN broadcast is achieved by superposition coding, but superposition of individual coded modulations does not in general obey a predefined constellation. We propose a coded modulation broadcast with strict channel input modulation constraint via multilevel coding (MLC). For a degraded broadcast channel, conditions of optimality of the multilevel decomposition of a superposition...
Media-based Modulation (MBM), introduced by Khandani, is based on bearing part of information in the variations of transmission media. However, MBM combined with forward error correction (FEC) codes is limited to hard decision decoding in the literature, which causes a performance loss. In this paper, a novel scheme is proposed, called polar coded MBM (PCMBM), to provide a higher coding gain and better...
In this paper, we propose the encoding and list decoding method of polar codes based on the four-dimensional Reed-Solomon (RS-4) kernel. In specific, an encoding table based method is employed to reduce the computational complexity of both encoder and decoder. In addition, a simplified method to update log-likelihood ratios (LLRs) which employs additions instead of exponential calculations is also...
Recent studies have shown the potential performance gain of Non Uniform Constellations (NUC) compared to the conventional uniform constellations. NUC can be a promising candidate in 5G systems to increase the data throughput. In the literature, NUC is designed for a specific SNR value and propagation channel. However, in broadcast/multicast services, the received signal by different users will see...
In this paper, we consider a fully connected device-to-device communications network, where a group of devices with heterogeneous channel capacities cooperate with each other to recover their missing packets. In such cooperative network, we aim to minimize the completion time required for recovering all missing packets at devices using instantly decodable network coding (IDNC). In particular, we first...
We investigate the duality of the binary erasure channel (BEC) and the binary defect channel (BDC). This duality holds for channel capacities, capacity achieving schemes, minimum distances, and upper bounds on the probability of failure to retrieve the original message. In addition, the relations between BEC, BDC, binary erasure quantization (BEQ), and write-once memory (WOM) are described. From these...
Hybrid Automatic Repeat reQuest (HARQ) techniques are largely used in the context of wireless communications systems especially in the last few years, being employed in the latest cellular systems, including the Long Term Evolution (LTE) standard. Such schemes have been widely studied in literature; however, in this paper we are interested in applying the results of Polyanskiy-Poor-Verdù on the finite...
We propose a linear transceiver scheme for the symmetric two-user multiple access channel with additive white Gaussian noise and quantized feedback. The quantized feedback link is modeled as an information bottleneck subject to a rate constraint. We introduce a superposition scheme that splits the transmit power of each user between an Ozarow-like code (designed for perfect rate-limited feedback)...
We firstly extend the interpretation of feedback communication over stationary finite dimensional Gaussian channels as feedback control systems by showing that, the problem of finding stabilizing feedback controllers with maximal reliable transmission rate over Youla parameters coincides with the problem of finding strictly causal filters to achieve feedback capacity recently derived in [1]. The aforementioned...
Lattice codes can achieve the capacity of additive white Gaussian noise channel with and without power construction. It is well known that lattice codes can provide a classical information theoretic way to obtain achievable rate and performance gains for point-to-point Gaussian channels. The coding scheme based on lattice codes can be used as building blocks for practical applications, such as point-to-point...
We explore the possibility of implementing dense coding with linear optics and coincidence photodetection without Bell state discrimination. We discover that such implementations exist for two-photon in N-mode (N=4,6,8) scenarios and provide examples.
In this paper, a cooperative satellite system consisting of two satellites is considered. After building the channel model, the channel capacity is analysed. Since the propagation time of the signal via different satellites is not equal, a scheme to handle the propagation time difference is proposed. Considering the various propagation time difference of different users, the scheme takes advantage...
□ Following power — aware practices throughout a design cycle can lead to very low power DSP and SDFEC designs for the optical transceivers □ The slides captured a sub-set of techniques being used in designs today □ Newer more creative solutions continue to be invented
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.