{"title":"Exceptionality of the Variational Distance","authors":"M. Khosravifard, D. Fooladivanda, T. Gulliver","doi":"10.1109/ITW2.2006.323802","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323802","url":null,"abstract":"Csiszar f-divergences are an important class of distances for probability distributions. In particular, a well-known Csiszar f-divergence is the variational distance which is also a metric. Here, we prove that the variational distance is actually the unique Csiszar f-divergence which satisfies all metric conditions","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130882523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bidirectional Viterbi Decoding using the Levenshtein Distance Metric for Deletion Channels","authors":"Ling Cheng, H. C. Ferreira, T. Swart","doi":"10.1109/ITW2.2006.323798","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323798","url":null,"abstract":"In this paper, we present a bidirectional Viterbi decoding algorithm using the Levenshtein distance metric for a regular convolutional encoding system. For a deletion channel, this decoding algorithm can correct an average of 30 deletion errors within a 6000 bit frame, when using an r = 0.67 regular convolutional code; and it can correct an average of 80 deletion errors within a 4000 bit frame, when using an r = 0.25 regular convolutional code","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131146765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Detection Scheme for Differential Unitary Space-Time Modulation","authors":"Z. Du, Xiqi Gao","doi":"10.1109/ITW2.2006.323727","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323727","url":null,"abstract":"The performance loss of approximately 3 dB signal to noise ratio is always paid with conventional differential unitary space-time demodulation (DUSTD) compared to the related coherent detection. In this paper, a new detection scheme consisting of two steps is proposed for differential unitary space-time modulation (DUSTM) system. In the first step, the data sequence is estimated by conventional DUSTD and receded to produce an initial estimate of the transmitted symbol stream. In the second step, the initial estimate of the symbol stream is utilized to estimate the channel, which is then used to implement coherent sequence detection. Simulation results show that the proposed detection scheme performs much better than conventional DUSTD","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126701126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Error Correction and PAPR Reduction of OFDM Signals","authors":"I. Shakeel, A. Grant","doi":"10.1109/ITW2.2006.323707","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323707","url":null,"abstract":"In this paper, we describe a coding technique for joint error correction and peak-to-average power ratio (PAPR) reduction of orthogonal frequency division multiplexing (OFDM) signals. This technique uses a standard block code for error correction and achieves PAPR reduction at the expense of lower error correcting capability. The technique is first expressed as an optimisation problem and an efficient suboptimal algorithm for solving this problem is then proposed. The PAPR reduction and bit error rate (BER) performance of the proposed algorithm are investigated. The results show that the proposed algorithm significantly improves the system performance and also give PAPR reductions comparable with other PAPR reduction techniques","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114634800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stopping Set Distributions of Some Linear Codes","authors":"Yong Jiang, Shutao Xia, Fang-Wei Fu","doi":"10.1109/ITW2.2006.323751","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323751","url":null,"abstract":"In this paper, the stopping set distributions (SSD) of some well-known binary linear codes are determined by using finite geometry theory. Similar to the weight distribution of a binary linear code, the SSD {Ti(H)}n i=0 enumerates the number of stopping sets with size i of a linear code with parity-check matrix H. First, we deal with the simplex codes and Hamming codes. With parity-check matrix formed by all the weight 3 codewords of the Hamming code, the SSD of the simplex code is completely determined with explicit formula. With parity-check matrix formed by all the nonzero codewords of the simplex code, the SSD of the Hamming code is completely determined with two recursive equations. Then, the first order Reed-Muller codes and the extended Hamming codes are discussed. With parity-check matrix formed by all the weight 4 codewords of the extended Hamming code, the SSD of the first order Reed-Muller code is completely determined with explicit formula. With parity-check matrix formed by all the minimum codewords of the first order Reed-Muller code, the SSD of the extended Hamming code is completely determined with two recursive equations","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116095267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Joint Compression and Information Embedding When Watermarks and Covertexts Are Correlated","authors":"Wei Sun, E. Yang","doi":"10.1109/ITW2.2006.323808","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323808","url":null,"abstract":"A joint compression and public digital watermarking system with correlated watermark source and covertext source (M, S) is investigated in this paper. More specifically, for a given distortion level D between S and a watermarked signal X and a given compression rate Rc for X, the watermark source M can be fully recovered with high probability at the end of a public watermark decoder after the watermarked signal is disturbed by a fixed memoryless attack channel p(yx) if and only if H(M) les maxp(x,um,s) min{Rc - I(M, S; U, X) + I(M; U, Y), I(U; Y) - I(U; M, S) + I(M; U, Y)}, where the maximization is taken over all auxiliary random variables U (with finite alphabet U) and X jointly distributed with (M, S, X, Y) according to p(m, s, u, x, y) = p(m, s)p(u, xm, s)p(yx) such that Ed(S, X) les D","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116780742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The signal subspace decomposition method for extracting harmonic signal","authors":"Dengwei Wang, Yinghua Lu","doi":"10.1109/ITW2.2006.323755","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323755","url":null,"abstract":"The subspace decomposition method for extracting harmonic character is discussed. The theory of the cross-correlation matrix based MUSIC method in Gaussian white noise is analysed. A method of subspace decomposition is proposed for the purpose of suppressing noise interference and increasing the ability of recognizing targets and multiple signal classification, an algorithm of harmonic retrieval, was introduced to extract harmonic frequencies. Then the frequency of harmonics is estimated by setting threshold in MUSIC power spectrum curve. The simulation proves the method is correct and feasible","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128311087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved and Smoothened Upper Bounds on the Redundancy of the Optimal Fix-Free Code","authors":"M. Khosravifard, R. Rashtchi","doi":"10.1109/ITW2.2006.323797","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323797","url":null,"abstract":"Recently, Yekhanin guaranteed the existence of fix-free codes with codeword lengths (l<sub>1</sub>, l<sub>2</sub>, ..., l<sub>n</sub>) satisfying Sigma<sup>n</sup> <sub>i=1</sub> 2<sup>-li</sup> les 5/8 or Sigma<sup>n</sup> <sub>i=1</sub> 2<sup>-li</sup>) les 3/4 and min <sub>i</sub>l<sub>i</sub> = 1. In this paper, Ye-Yeung approach in deriving upper bound on the redundancy of optimal fix-free code in terms of a known symbol probability q is extended and applied to the new theorems due to Yekhanin. Also, it is shown that for some values of q, assigning a lfloor-log1/2qrfloor bits codeword to the symbol with probability q is preferable to a lceil-log1/2qrceil bits codeword. Noting this point, we remove the discontinuities in the upper bound curves","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128618289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conjugate Codes for Secure and Reliable Information Transmission","authors":"M. Hamada","doi":"10.1109/ITW2.2006.323776","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323776","url":null,"abstract":"A conjugate code pair is defined as a pair of linear codes either of which contains the dual of the other. A conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is known that conjugate code pairs are applicable to (quantum) cryptography. In this work, polynomially constructible and efficiently decodable conjugate code pairs are presented. The constructed pairs achieve the highest known achievable rate on additive channels.","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126908574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Near Maximum Likelihood Detection Scheme for Wireless MIMO Systems","authors":"Jiming Chen, W. Mow, Shaoqian Li","doi":"10.1109/ITW2.2006.323699","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323699","url":null,"abstract":"In this paper, we propose a novel near maximum likelihood detection (MLD) scheme for wireless multiple-input multiple-output (MIMO) systems. The scheme is to reduce the dimension by first using the minimum mean square error (MMSE) detection to fix symbols with high signal to interference plus noise ratio (SINR), and then calculate the bit log-likelihood ratio (LLR) for the initial MMSE estimate, construct a list of reliability-based candidate vectors using the corresponding LLR, and return the most likely bit vector among all visited options. Simulation results show that the proposed method can approach identical performance to that of MLD but with a significant reduction in complexity","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125831289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}