{"title":"Attention on the Preambles: Sensing With mmWave CSI","authors":"Tatsuya Kikuzuki;Mahdi Boloursaz Mashhadi;Yi Ma;Rahim Tafazolli","doi":"10.1109/OJCOMS.2024.3475989","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3475989","url":null,"abstract":"The ubiquitous availability of wireless networks and devices provides a unique opportunity to leverage the corresponding communication signals to enable wireless sensing applications. In this article, we develop a new framework for environment sensing by opportunistic use of the mmWave communication signals. The proposed framework is based on a mixture of the conventional and Neural Network (NN) signal processing techniques for simultaneous counting and localization of multiple targets in the environment in a bi-static setting. In this framework, multi-modal delay, Doppler, angular features are first derived from the Channel State Information (CSI) estimated at the receiver, and then a transformer-based NN architecture exploiting attention mechanisms, called CSIformer, is designed to extract the most effective features for sensing. We also develop a novel post-processing technique based on Kullback-Leibler (KL) minimization to transfer knowledge between the counting and localization tasks, thereby simplifying the NN architecture. Our numerical results show accurate counting and localization capabilities that significantly outperform the existing works based on pure conventional signal processing techniques, as well as NN-based approaches. The simulation codes are available at: \u0000<uri>https://github.com/University-of-Surrey-Mahdi/Attention-on-the-Preambles-Sensing-with-mmWave-CSI</uri>\u0000.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":null,"pages":null},"PeriodicalIF":6.3,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10706812","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142447211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Selen Gecgel Cetin;Ángeles Vazquez-Castro;Gunes Karabulut Kurt
{"title":"Cislunar Communication Performance and System Analysis With Uncharted Phenomena","authors":"Selen Gecgel Cetin;Ángeles Vazquez-Castro;Gunes Karabulut Kurt","doi":"10.1109/OJCOMS.2024.3474571","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3474571","url":null,"abstract":"The Moon and its surrounding cislunar space have numerous unknowns, uncertainties, or partially charted phenomena that need to be investigated to determine the extent to which they affect cislunar communication. These include temperature fluctuations, spacecraft distance and velocity dynamics, surface roughness, and the diversity of propagation mechanisms. To develop robust and dynamically operative Cislunar space networks (CSNs), we need to analyze the communication system by incorporating inclusive models that account for the wide range of possible propagation environments and noise characteristics. In this paper, we consider that the communication signal can be subjected to both Gaussian and non-Gaussian noise, but also to different fading conditions. First, we analyze the communication link by showing the relationship between the brightness temperatures of the Moon and the equivalent noise temperature at the receiver of the Lunar Gateway. We propose to analyze the ergodic capacity and the outage probability, as they are essential metrics for the development of reliable communication. In particular, we model the noise with the additive symmetric alpha-stable distribution, which allows a generic analysis for Gaussian and non-Gaussian signal characteristics. Then, we present the closed-form bounds for the ergodic capacity and the outage probability. Finally, the results show the theoretically and operationally achievable performance bounds for the cislunar communication. To give insight into further designs, we also provide our results with comprehensive system settings that include mission objectives as well as orbital and system dynamics.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":null,"pages":null},"PeriodicalIF":6.3,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10705126","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142447210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eduardo N. Tominaga;Onel L. A. López;Tommy Svensson;Richard D. Souza;Hirley Alves
{"title":"Distributed MIMO Networks With Rotary ULAs for Indoor Scenarios Under Rician Fading","authors":"Eduardo N. Tominaga;Onel L. A. López;Tommy Svensson;Richard D. Souza;Hirley Alves","doi":"10.1109/OJCOMS.2024.3474170","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3474170","url":null,"abstract":"The Fifth-Generation (5G) wireless communications networks introduced native support for Machine-Type Communications (MTC) use cases. Nevertheless, current 5G networks cannot fully meet the very stringent requirements regarding latency, reliability, and number of connected devices of most MTC use cases. Industry and academia have been working on the evolution from 5G to Sixth Generation (6G) networks. One of the main novelties is adopting Distributed Multiple-Input Multiple-Output (D-MIMO) networks. However, most works studying D-MIMO consider antenna arrays with no movement capabilities, even though some recent works have shown that this could bring substantial performance improvements. In this work, we propose the utilization of Access Points (APs) equipped with Rotary Uniform Linear Arrays (RULAs) for this purpose. Considering a spatially correlated Rician fading model, the optimal angular position of the RULAs is jointly computed by the central processing unit using particle swarm optimization as a function of the location of the active devices. Considering the impact of imperfect location estimates, our numerical results show that the RULAs’s optimal rotation brings substantial performance gains in terms of mean per-user spectral efficiency. The improvement grows with the strength of the line-of-sight components of the channel vectors. Given the total number of antenna elements, we study the trade-off between the number of APs and the number of antenna elements per AP, revealing an optimal number of APs for the cases of APs equipped with static ULAs and RULAs.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":null,"pages":null},"PeriodicalIF":6.3,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10705116","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142438491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nadir Adam;Mansoor Ali;Faisal Naeem;Abdallah S. Ghazy;Georges Kaddoum
{"title":"State-of-the-Art Security Schemes for the Internet of Underwater Things: A Holistic Survey","authors":"Nadir Adam;Mansoor Ali;Faisal Naeem;Abdallah S. Ghazy;Georges Kaddoum","doi":"10.1109/OJCOMS.2024.3474290","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3474290","url":null,"abstract":"With the growing interest that is being shown in marine resources, the concept of the Internet of Things (IoT) has been extended to underwater scenarios, which has given rise to the Internet of Underwater Things (IoUT). The IoUT encompasses a network of interconnected intelligent underwater devices that can be used to monitor underwater environments and support various applications, such as underwater exploration, disaster prevention, and environmental monitoring. Advances in underwater wireless communication and sensor technologies have propelled the IoUT concept forward. However, the IoUT faces significant challenges. The harsh and vast underwater environment makes information sensing particularly difficult and leads to insufficient or inaccurate data being collected. Additionally, underwater conditions like pressure variation, hydrological characteristics, temperature changes, water currents, and topography hinder conventional communication models and make data transmission difficult and inefficient. Security in IoUT networks is a critical concern due to hardware limitations and seawater channel imperfections. Constrained sensor nodes and spatial-temporal uncertainty introduced by node mobility further complicate security provisioning. This survey paper addresses these challenges by offering a comprehensive overview of IoUT security. The investigation thoroughly examines both traditional and classic machine learning techniques and focuses on deploying advanced technologies such as federated learning and digital twin. The study effectively addresses integration challenges and open issues and provides a roadmap for future directions to play a pivotal role in formulating robust security mechanisms for IoUT networks.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":null,"pages":null},"PeriodicalIF":6.3,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10705129","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142517969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-Based Decentralized Federated Learning With On-Chain Model Aggregation and Incentive Mechanism for Industrial IoT","authors":"Qing Yang;Wei Xu;Taotao Wang;Hao Wang;Xiaoxiao Wu;Bin Cao;Shengli Zhang","doi":"10.1109/OJCOMS.2024.3471621","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3471621","url":null,"abstract":"Federated learning (FL) is an emerging machine learning paradigm that enables the participants to train a global model without sharing the training data. Recently, FL has been widely deployed in industrial IoT scenarios because of its data privacy and scalability. However, the current FL architecture relies on a central server to orchestrate the FL process, thus incurring a risk of privacy leakage and single-point failure. To address this issue, we propose a fully decentralized FL architecture based on blockchain technology. Unlike existing blockchain-based FL systems that use blockchain for coordination or storage, we use blockchain as a trustable computing platform for model aggregation. Furthermore, we model the interaction between the FL task publisher and participants as a Stackelberg game and design a rewarding mechanism to incentivize participants to contribute to the FL task. We build a prototype system of the proposed decentralized FL architecture and implement an FL-based damaged package detection application to evaluate the proposed approach. Experimental results show that the blockchain-based decentralized FL is feasible in a practical industrial IoT scenario, and the incentive mechanism performs well with real application data.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":null,"pages":null},"PeriodicalIF":6.3,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10701002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142447092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent Advances in Deep Learning for Channel Coding: A Survey","authors":"Toshiki Matsumine;Hideki Ochiai","doi":"10.1109/OJCOMS.2024.3472094","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3472094","url":null,"abstract":"This paper provides a comprehensive survey of recent advances in deep learning (DL) techniques for channel coding problems. Inspired by the recent successes of DL in a variety of research domains, its applications to physical layer technologies have been extensively studied in recent years, and they are expected to be a potential breakthrough in supporting the emerging use cases of the next generation wireless communication systems such as 6G. In this paper, we focus exclusively on channel coding problems and review existing approaches that incorporate advanced DL techniques into code design and channel decoding. After briefly introducing the background of recent DL techniques, we categorize and summarize a variety of approaches, including model-free and model-based DL, for the design and decoding of modern error-correcting codes, such as low-density parity check (LDPC) codes and polar codes, to highlight their potential advantages and challenges. Finally, the paper concludes with a discussion of open issues and future research directions in channel coding.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":null,"pages":null},"PeriodicalIF":6.3,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10702508","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142447136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CoCo: A CBOW-Based Framework for Synergistic Vulnerability Detection in Partial and Discontinuous Logs for NextG Communications","authors":"Yifeng Peng;Xinyi Li;Sudhanshu Arya;Ying Wang","doi":"10.1109/OJCOMS.2024.3471709","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3471709","url":null,"abstract":"With the development of communication technology, protocol design, and infrastructure implementation have become more complex, bringing significant security challenges to 5G and NextG systems. Fuzz testing is widely used to detect system vulnerabilities and the health status under the condition of abnormal input. In this paper, we generate fuzz testing via the Man In The Middle Model (MITM) at various locations of the time sequence in the 5G authentication and authorization process and analyze the communication state transitions, which are recorded in the log files of fuzz testing cases. CoCo introduces a novel CBOW-based framework for synergistic vulnerability detection, addressing the challenge of partial log data and scalability in real-time environments, a significant advancement in the field of NextG communication security. CoCo can be applied to identifying the type of attacks or abnormal inputs from partial system profiling for the impacted behaviors. In particular, we show, for the first time, that by utilizing the CoCo, we can precisely detect the fuzzed layer using only a partial segment of the log file in real-time and identify the root cause of vulnerabilities with high accuracy. The results show that when we get only 40% portion of the entire log file, applying convolutional neural network (CNN) in the machine learning models can reach the Area under Curve (AUC) value of 92%. Furthermore, by strategically combining these segments, we enhanced the efficacy of vulnerability detection, demonstrating a synergistic effect where the combined impact is greater than the sum of individual parts, meanwhile reducing the time complexity by 6%.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":null,"pages":null},"PeriodicalIF":6.3,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10701039","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142447137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Near-Field Integrated Sensing and Communication: Performance Analysis and Beamforming Design","authors":"Kaiqian Qu;Shuaishuai Guo;Nasir Saeed;Jia Ye","doi":"10.1109/OJCOMS.2024.3470844","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3470844","url":null,"abstract":"This paper explores the potential near-field beamforming (NFBF) in integrated sensing and communication (ISAC) systems with extremely large-scale arrays (XL-arrays). The large-scale antenna arrays increase the possibility of having communication users and targets of interest in the near field of the base station (BS). The paper first establishes the models of near-field spherical waves and far-field plane waves. With the models, we analyze the near-field beam focusing ability and the far-field beam steering ability by finding the gain-loss mathematical expression caused by the far-field steering vector mismatch in the near-field case. Subsequently, we analyzed the performance degradation caused by traditional far-field beamforming in the near field for both communication and sensing. We formulate the transceiver NFBF design problem as maximizing the sensing signal-to-interference-plus-noise ratio (SINR) while ensuring the required communication quality-of-service (QoS) and total power constraint. We decompose it into two subproblems and solve them using the generalized Rayleigh entropy theory and the Semi-Definite Relaxation (SDR) technique. Additionally, we prove the attainability of the optimal solution for SDR. Additionally, a low-complexity design scheme is proposed as an alternative to the SDR approach for obtaining transmit beamforming. The simulation results validate the effectiveness of the proposed NFBF scheme, demonstrating its capability to manage co-angle interference and enhance both communication and sensing performance.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":null,"pages":null},"PeriodicalIF":6.3,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10700785","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142408930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salem Titouni;Idris Messaoudene;Yassine Himeur;Massinissa Belazzoug;Boualem Hammache;Shadi Atalla;Wathiq Mansoor
{"title":"An Efficient Spectral Approach for JCR Narrow Band Signals in Presence of Multipath and Noise","authors":"Salem Titouni;Idris Messaoudene;Yassine Himeur;Massinissa Belazzoug;Boualem Hammache;Shadi Atalla;Wathiq Mansoor","doi":"10.1109/OJCOMS.2024.3470689","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3470689","url":null,"abstract":"Joint Communication Radar (JCR) systems have garnered significant attention due to their ability to simultaneously perform communication and radar sensing tasks. However, in challenging environments, JCR signals are vulnerable to multipath propagation, resulting in signal degradation, interference, and reduced system performance. This paper explores the challenges posed by multipath effects on JCR signals and proposes novel mitigation techniques to enhance their robustness and reliability. The suggested method involves employing a spectral transformation to enhance the JCR-emitted signal, resulting in a significant improvement in the overall effectiveness of JCR systems. Consequently, the numerical implementation of the JCR system integrated with the proposed technique leads to improved performance metrics, including Multipath Error Envelope (MEE), Root Mean Square Error (RMSE), and Standard Deviation (STD). By effectively mitigating the adverse impacts of multipath propagation, the proposed methodologies enhance the robustness and accuracy of JCR systems, leading to improved communication reliability and radar sensing capabilities. Notably, the proposed method achieved a minimal Root Mean Square Error (RMSE) of just 0.05, marking a substantial enhancement in performance compared to existing methods.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":null,"pages":null},"PeriodicalIF":6.3,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10700591","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142408890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lan Ma;Liyang Zhou;Shaoteng Liu;Xiangyu Chen;Qifu Sun
{"title":"New Systematic MDS Array Codes With Two Parities","authors":"Lan Ma;Liyang Zhou;Shaoteng Liu;Xiangyu Chen;Qifu Sun","doi":"10.1109/OJCOMS.2024.3468873","DOIUrl":"https://doi.org/10.1109/OJCOMS.2024.3468873","url":null,"abstract":"Row-diagonal parity (RDP) code is a classical \u0000<inline-formula> <tex-math>$(k+2,~k)$ </tex-math></inline-formula>\u0000 systematic maximum distance separable (MDS) array code with \u0000<inline-formula> <tex-math>$k leq L-1$ </tex-math></inline-formula>\u0000 under sub-packetization level \u0000<inline-formula> <tex-math>$l = L-1$ </tex-math></inline-formula>\u0000, where L is a prime integer. When \u0000<inline-formula> <tex-math>$k = L-1$ </tex-math></inline-formula>\u0000, its encoding requires \u0000<inline-formula> <tex-math>$2-{}frac {2}{k}$ </tex-math></inline-formula>\u0000 XORs per original data bit, which exactly achieves theoretical optimal lower bound. In this paper, we present three new constructions of \u0000<inline-formula> <tex-math>$(k+2,~k)$ </tex-math></inline-formula>\u0000 systematic MDS array codes. First, under sub-packetization level \u0000<inline-formula> <tex-math>$l = 4$ </tex-math></inline-formula>\u0000, we novelly design a \u0000<inline-formula> <tex-math>$(17,~15)$ </tex-math></inline-formula>\u0000 array code \u0000<inline-formula> <tex-math>${mathcal {C}}_{1}$ </tex-math></inline-formula>\u0000, where k can reach the largest possible value to satisfy the MDS property. Moreover, when \u0000<inline-formula> <tex-math>$k leq 7$ </tex-math></inline-formula>\u0000, the encoding complexity of its subcodes can exactly achieve the theoretical optimal \u0000<inline-formula> <tex-math>$2-{}frac {2}{k}$ </tex-math></inline-formula>\u0000 XORs per original data bit, and likewise, the decoding complexity of the subcodes with \u0000<inline-formula> <tex-math>$k leq 4$ </tex-math></inline-formula>\u0000 is also exactly optimal. Under sub-packetization level \u0000<inline-formula> <tex-math>$l = L-1$ </tex-math></inline-formula>\u0000 with certain primes L, the second construction yields an MDS array code \u0000<inline-formula> <tex-math>${mathcal {C}}_{2}$ </tex-math></inline-formula>\u0000 with \u0000<inline-formula> <tex-math>$k leq {}frac {L(L-1)}{2}$ </tex-math></inline-formula>\u0000, and the encoding complexity of \u0000<inline-formula> <tex-math>${mathcal {C}}_{2}$ </tex-math></inline-formula>\u0000 is also exactly optimal for \u0000<inline-formula> <tex-math>$k = L-1$ </tex-math></inline-formula>\u0000, \u0000<inline-formula> <tex-math>$2L-3$ </tex-math></inline-formula>\u0000. Furthermore, based on bit permutation, the third MDS array code \u0000<inline-formula> <tex-math>${mathcal {C}}_{3}$ </tex-math></inline-formula>\u0000 is obtained with \u0000<inline-formula> <tex-math>$k leq L(L-1)$ </tex-math></inline-formula>\u0000 under sub-packetization level \u0000<inline-formula> <tex-math>$l = 2(L-1)$ </tex-math></inline-formula>\u0000 with certain primes L. In particular, as an extension of \u0000<inline-formula> <tex-math>${mathcal {C}}_{2}$ </tex-math></inline-formula>\u0000, \u0000<inline-formula> <tex-math>${mathcal {C}}_{3}$ </tex-math></inline-formula>\u0000 exactly achieves the optimal encoding complexity for \u0000<inline-formula> <tex-math>$k = 2(2L-3)$ </tex-math></inline-formula>\u0000, which does not hold for other array codes in the literature.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":null,"pages":null},"PeriodicalIF":6.3,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10695780","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142408889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}