2013 13th Canadian Workshop on Information Theory最新文献

筛选
英文 中文
Low and high-delay source-channel coding with bandwidth expansion and correlated interference 具有带宽扩展和相关干扰的低延迟和高延迟源信道编码
2013 13th Canadian Workshop on Information Theory Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621593
A. Saleh, W. Chan, F. Alajaji
{"title":"Low and high-delay source-channel coding with bandwidth expansion and correlated interference","authors":"A. Saleh, W. Chan, F. Alajaji","doi":"10.1109/CWIT.2013.6621593","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621593","url":null,"abstract":"We consider the problem of sending a Gaussian source over an additive white Gaussian noise channel with Gaussian correlated interference known to the transmitter. We study both low-delay and asymptotically high-delay (in the sense of infinite source and coding block lengths) joint source-channel coding schemes based on purely analog and hybrid-digital analog (HDA) schemes with bandwidth expansion, respectively. The achievable (square error) distortion region of these schemes under matched and mismatched noise power is analyzed. The low-delay scheme uses a non-parametric analog mapping that is designed using a joint optimization of the encoder and the decoder. Numerical results show that the non-parametric approach adapts better to the interference than the classical linear scheme. For the high-delay regime, we establish a lower bound on the system's distortion and propose a layered HDA scheme based on Wyner-Ziv and HDA Costa coding. The proposed HDA scheme is shown to perform close to the derived bound and to be resilient under noise mismatch.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved systematic fountain codes in AWGN channel 改进了AWGN通道的系统喷泉码
2013 13th Canadian Workshop on Information Theory Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621610
Khaled F. Hayajneh, S. Yousefi
{"title":"Improved systematic fountain codes in AWGN channel","authors":"Khaled F. Hayajneh, S. Yousefi","doi":"10.1109/CWIT.2013.6621610","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621610","url":null,"abstract":"Fountain codes are typically defined solely based on the right degree distributions which are Soliton or Soliton-like in most cases. In this paper, we consider Fountain encoders for the Gaussian channel and improve their performance by shaping the resulting left degree distributions away from Poisson. The proposed Fountain encoders achieve lower left degree variance at the same average degree. This in turn improves the growth of the so-called ripple in the BP decoding. The new encoders outperform the traditional ones in terms of overhead, error rate, and decoding complexity.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124233273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Binary faster than Nyquist optical transmission via non-uniform power allocation 通过非均匀功率分配,二进制比奈奎斯特光传输更快
2013 13th Canadian Workshop on Information Theory Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621616
Yong Jin Daniel Kim, J. Bajcsy
{"title":"Binary faster than Nyquist optical transmission via non-uniform power allocation","authors":"Yong Jin Daniel Kim, J. Bajcsy","doi":"10.1109/CWIT.2013.6621616","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621616","url":null,"abstract":"Recently, faster-than-Nyquist (FTN) signaling (or also sub-Nyquist filtering) has been proposed as a means to increase the spectral efficiency of the next generation long-haul optical fiber transmission systems. In the high spectral efficiency regime, however, the severe intersymbol interference (ISI) inherent to the FTN signaling poses a significant challenge in implementing a practical FTN system. In this work, we propose to use non-uniform power allocation at the optical FTN transmitter and establish its optimality in the achievable capacity. Consequently, we utilize the non-uniform power allocation to design a low-complexity FTN receiver that can operate close to the channel capacity limit. Presented simulation results also illustrate that the proposed optical FTN signaling transceiver with non-uniform power allocation allows supporting very high spectral efficiencies.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116890834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Turbo code using adaptive puncturing for transform domain Wyner-Ziv video coding 采用自适应穿刺的Turbo码变换域Wyner-Ziv视频编码
2013 13th Canadian Workshop on Information Theory Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621595
M. H. Taieb, J. Chouinard, Demin Wang
{"title":"Turbo code using adaptive puncturing for transform domain Wyner-Ziv video coding","authors":"M. H. Taieb, J. Chouinard, Demin Wang","doi":"10.1109/CWIT.2013.6621595","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621595","url":null,"abstract":"In most DVC architectures presented in the literature, the puncturing mechanism operates according to a periodic pattern that spreads uniformly the turbo generated parity bits and discards all the systematic bits. These latter are replaced by the receiver side information (SI) during the turbo decoding process. The side information is generated by a block based motion interpolation algorithm that can, furthermore, predict whether or not each block is well interpolated. Thus, instead of uniformly dispersing the parity bits over the whole turbo code trellis, they can be directed to the most corrupted regions. If the side information displays regions that appear to be even more highly corrupted, systematic bits can likewise be guided adaptively towards these regions. In this paper, an adaptive puncturing scheme is proposed. A classification of the corrupted parts of each DCT band of the interpolated frame is performed and then an adaptive puncturing mechanism is employed for a more efficient parity and systematic bits repartition. Simulation results show that the adaptive puncturing scheme can provide as much as 20 % of Wyner-Ziv bitrate reduction: this is reflected by a PSNR vs bit rate performance improvement of up to 1.8 dB.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116954964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On optimal detection ordering for coded V-BLAST 编码V-BLAST的最优检测排序
2013 13th Canadian Workshop on Information Theory Pub Date : 2013-06-18 DOI: 10.1109/cwit.2013.6621587
Alain U. Toboso, S. Loyka, F. Gagnon
{"title":"On optimal detection ordering for coded V-BLAST","authors":"Alain U. Toboso, S. Loyka, F. Gagnon","doi":"10.1109/cwit.2013.6621587","DOIUrl":"https://doi.org/10.1109/cwit.2013.6621587","url":null,"abstract":"Optimum ordering strategies for the coded V-BLAST with capacity achieving temporal codes on each stream are analytically studied in this paper, including optimal power and/or rate allocations among data streams. A compact closed-form solution is obtained for the case of two transmit antennas and necessary optimality conditions are found for the general case. The optimal rate allocation is shown to have a major impact (stronger streams are detected last) while the optimal power allocation does not alter the original Foschini ordering (stronger streams are detected first). A sub-optimal ordering is proposed based on the necessary optimality conditions, which performs very close to the optimal one but has much smaller computational complexity. An SNR gain of ordering is introduced and studied. All the results also apply to a multiple-access channel under successive interference cancelation.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128250578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An efficient Soliton-like network coding protocol for the resource-constrained Y-network 一种资源受限的类孤子网络编码协议
2013 13th Canadian Workshop on Information Theory Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621613
Andrew Liau, Il Kim, S. Yousefi
{"title":"An efficient Soliton-like network coding protocol for the resource-constrained Y-network","authors":"Andrew Liau, Il Kim, S. Yousefi","doi":"10.1109/CWIT.2013.6621613","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621613","url":null,"abstract":"Originally designed for point-to-point transmissions, fountain codes are capacity-achieving codes over a binary erasure channel. On the other hand, network coding is an optimal multihop data dissemination protocol whose high decoding complexity makes it too expensive for resource-constrained applications. Soliton-like rateless coding (SLRC) has previously combined network and fountain coding paradigms such that a less complex decoder can be applied. Specifically, the coding done at an intermediate relay node allows a belief propagation decoder to be efficiently applied. We extend the SLRC protocol and propose the Improved Soliton-like Rateless Coding (ISLRC) protocol. In ISLRC, the relay applies intelligent coding and shapes the degree distribution such that performance is better than SLRC. In addition, ISLRCs performance gains are achieved using fewer resources than SLRC while maintaining all the key properties of SLRC. Simulation results show that even under the worst-case scenario of ISLRC, better performance can be achieved compared to SLRC and other existing schemes.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130299947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the reserved sub-carrier approach to achieving N-continuity for side-lobe reduction in OFDM 在OFDM中实现n -连续性旁瓣消减的保留子载波方法
2013 13th Canadian Workshop on Information Theory Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621622
Jesse Haber-Kucharsky, E. Alian, P. Mitran
{"title":"On the reserved sub-carrier approach to achieving N-continuity for side-lobe reduction in OFDM","authors":"Jesse Haber-Kucharsky, E. Alian, P. Mitran","doi":"10.1109/CWIT.2013.6621622","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621622","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is a popular modulation scheme used in a variety of applications. One significant problem associated with OFDM is the possibility of large side-lobes in its spectrum. In this paper, we consider the so-called N-continuous method for reducing the side-lobes. We first consider one implementation approach, whereby certain sub-carriers are reserved for the purpose of adjusting the spectrum of an OFDM symbol. We find that significant side-lobe reduction is possible, although at the cost of injecting very large power in the reserved sub-carriers that results in unacceptable spectrum overshoot. In order to achieve reasonable power levels, at least 20% of all sub-carriers must be reserved for weighting. As a solution to the problem of spectrum overshoot, we propose an alternative approach whereby the power of the reserved sub-carriers is constrained. Numerical results show that reasonable power levels are achieved at the cost of significant performance loss in the N-continuous OFDM technique for side-lobe reduction. We thus find that the performance cost of eliminating the spectrum overshoot reduces the side-lobes reduction to less than 5 dB in cases of interest.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126051090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrating prior knowledge in time series alignment: Prior Optimized Time Warping 在时间序列比对中整合先验知识:先验优化时间翘曲
2013 13th Canadian Workshop on Information Theory Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621621
Xiaoguang Yan, W. Gage, A. Eckford
{"title":"Integrating prior knowledge in time series alignment: Prior Optimized Time Warping","authors":"Xiaoguang Yan, W. Gage, A. Eckford","doi":"10.1109/CWIT.2013.6621621","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621621","url":null,"abstract":"In this paper, we propose Prior Optimized Time Warping (POTW) algorithm, which allows user to integrate prior knowledge by marking out pairs of matching sub-sequences from the sequences to be aligned. To relieve users of the task of guaranteeing the full accuracy of the marking, a certainty coefficient reflecting the certainty of the matching can also be specified for each marked pairs. POTW will then look for the best alignment based on the two sequences and the given matching pairs. POTW is an extension of existing align algorithm, and in the absence of prior knowledge, is able to independently find the best alignment of two sequences. We apply our algorithm to walk sequences from CMU motion capture database, as well as UJI pen characters dataset to demonstrate its ability to allow easy and effective integration of prior knowledge.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115256197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An enhanced cross-layer authentication mechanism for wireless communications based on PER and RSSI 一种基于PER和RSSI的增强无线通信跨层认证机制
2013 13th Canadian Workshop on Information Theory Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621590
Peng Hao, Xianbin Wang, A. Refaey
{"title":"An enhanced cross-layer authentication mechanism for wireless communications based on PER and RSSI","authors":"Peng Hao, Xianbin Wang, A. Refaey","doi":"10.1109/CWIT.2013.6621590","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621590","url":null,"abstract":"Recently physical layer attributes and statistics have been exploited in securing wireless communications. However, one major obstacle of physical layer security techniques is that not all of these attributes are accessible in practical wireless communication platforms. More precisely, once the hardware of a physical transceiver is implemented, most of the physical layer attributes are not accessible due to the highly integrated circuits. Consequently, it becomes essential to develop implementable security enhancement techniques by utilizing all available attributes and statistics at different layers of wireless communication networks. In this paper, we consider the packet error rate (PER) and the received signal strength indicator (RSSI) in IEEE 802.11 networks to improve the wireless communication security. These two unique user and environment dependent attributes are readily available in most of the currently deployed IEEE 802.11 platforms. To enhance the spoofing attack detection capability, we propose a practical authentication scheme by monitoring and analyzing the PER and RSSI at the same time. The hypothesis testing model for the proposed authentication using PER and RSSI as two testing variables is presented. In addition, a decision rule for authentication, which is able to differentiate between a legitimate transmitter and a potential attacker by combining both attributes together, is developed. To evaluate the feasibility of our proposed scheme, lab experiments have been conducted using an IEEE 802.11g Atheros platform. The proposed authentication technique is validated by the experimental and simulation data. Our final authentication results confirm the improved spoofing detecting capability of the proposed technique over the single-variable based authentication.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131115290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Approximate bounds for limited backhaul uplink multicell processing with single-user compression 单用户压缩下有限回程上行多小区处理的近似边界
2013 13th Canadian Workshop on Information Theory Pub Date : 2013-06-18 DOI: 10.1109/CWIT.2013.6621603
Yuhan Zhou, Wei Yu
{"title":"Approximate bounds for limited backhaul uplink multicell processing with single-user compression","authors":"Yuhan Zhou, Wei Yu","doi":"10.1109/CWIT.2013.6621603","DOIUrl":"https://doi.org/10.1109/CWIT.2013.6621603","url":null,"abstract":"This paper studies single-user compression for the uplink multi-cell processing (MCP) model where multiple base-stations are connected to a central processor via noiseless backhaul links with a sum capacity constraint. The proposed scheme is based on the virtual multiple-access channel (V-MAC) architecture, where the base-stations quantize the received signals and send the quantized bits to the central processor, and at the decoder side the central processor first recovers the quantized signals then decodes the user messages in a successive manner. This paper focuses on the use of single-user compression in the V-MAC architecture, which is significantly simpler to implement than Wyner-Ziv compression. The main result of this paper is that single-user compression can achieve the sum capacity of the MCP model to within a constant gap under two specific scenarios. First, we define a diagonally dominant channel criterion and show the constant-gap result for the case when the covariance matrix of the received signals across the base-stations is κ-strictly diagonally dominant for some constant κ > 1. Second, we show that the constant-gap result holds for a special class of Wyner channel models in the weak interference regime.","PeriodicalId":398936,"journal":{"name":"2013 13th Canadian Workshop on Information Theory","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134361712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信