2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems最新文献

筛选
英文 中文
Low-density parity-check codes based on the independent subgroups 基于独立子群的低密度奇偶校验码
F. Ivanov, V. Zyablov, V. Potapov
{"title":"Low-density parity-check codes based on the independent subgroups","authors":"F. Ivanov, V. Zyablov, V. Potapov","doi":"10.1109/RED.2012.6338401","DOIUrl":"https://doi.org/10.1109/RED.2012.6338401","url":null,"abstract":"Two criteria of cyclic subgroups independence are proved. The ensemble of regular binary LDPC codes which are based on independent subgroups, is built. The condition of absence of the cycles of the length 4 is proved for the resulting code construction. The results of the received code constructions are presented for the iterative algorithm Sum-Product when the codeword is transmitted over channel with additive Gaussian white noise (AGWN).","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116697677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Steganographic method on weighted container 加权容器的隐写方法
S. Bezzateev, N. Voloshina, K. Zhidanov
{"title":"Steganographic method on weighted container","authors":"S. Bezzateev, N. Voloshina, K. Zhidanov","doi":"10.1109/RED.2012.6338396","DOIUrl":"https://doi.org/10.1109/RED.2012.6338396","url":null,"abstract":"This paper discusses the approach to construction of steganographic method for the weighted container. To find the efficient solution, concept of Penalty Function is introduced. The analysis of the efficiency of the weighted embedding for the simple model of weighted container is shown.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116018372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analytical evaluation of performance for harmonic and biharmonic methods of blind phase offset estimation 谐波和双谐波盲相位偏移估计方法的性能分析评价
A. Petrov, A. Sergienko
{"title":"Analytical evaluation of performance for harmonic and biharmonic methods of blind phase offset estimation","authors":"A. Petrov, A. Sergienko","doi":"10.1109/RED.2012.6338408","DOIUrl":"https://doi.org/10.1109/RED.2012.6338408","url":null,"abstract":"We presented a new algorithm for blind phase offset estimation for signals with quadrature amplitude modulation (QAM). The algorithm is based on a circular harmonic expansion of log-likelihood function (LLF). Retaining one or two most significant terms in this series gives a harmonic or biharmonic circular decomposition of the LLF, this approach leads to notable improvement of the estimation quality comparing to known versions of popular 4th power phase estimation algorithm. Computer simulation results justified the advantages of the proposed method. It was also shown that the simplified implementation of the algorithm with weighting functions independent of signal-to-noise ratio (SNR) does not lead to any notable performance loss. In this paper we present analytical evaluation of estimation variance for both harmonic and biharmonic methods. Computation is based on quadratic approximation of objective function in the neighborhood of the phase offset true value, Taylor expansion of analytical expression for estimation error, and retaining statistical moments of objective function derivatives up to second order. Analytical results demonstrate good agreement with computer simulation for moderate and high SNR values.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126337304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Upper bounds for a coded DHA FH OFDMA system with noncoherent threshold reception 具有非相干阈值接收的编码DHA跳频OFDMA系统的上界
D. Osipov
{"title":"Upper bounds for a coded DHA FH OFDMA system with noncoherent threshold reception","authors":"D. Osipov","doi":"10.1109/RED.2012.6338407","DOIUrl":"https://doi.org/10.1109/RED.2012.6338407","url":null,"abstract":"In what follows the problem of finding upper bounds on denial probability and probability of erroneous decoding in a coded Dynamic Hopset Allocation Frequency Hopping system with noncoherent threshold reception is considered.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131752133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of high rate run-length limited codes using arithmetic decoding 用算术译码构造高速率行长有限码
A. Fionov, B. Ryabko
{"title":"Construction of high rate run-length limited codes using arithmetic decoding","authors":"A. Fionov, B. Ryabko","doi":"10.1109/RED.2012.6338399","DOIUrl":"https://doi.org/10.1109/RED.2012.6338399","url":null,"abstract":"We suggest an approach to constructing low-redundant RLL (d; k)-codes whose complexity does not depend on the code length and is determined solely by the achievable redundancy r, the time and space complexity being O(log2(1/r)) and O(log(1/r)), respectively, as r → 0. First we select code-words whose combinations may constitute all (d; k)-constrained sequences of any length. Then we use arithmetic decoding to produce these codewords with (or close to) optimal probabilities from an input sequence. The coding algorithms and estimates of performance are provided.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133587127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of computer capacity for P5 intel processors P5英特尔处理器的计算机容量评估
A. Rakitskiy, B. Ryabko, A. Fionov
{"title":"Evaluation of computer capacity for P5 intel processors","authors":"A. Rakitskiy, B. Ryabko, A. Fionov","doi":"10.1109/RED.2012.6338411","DOIUrl":"https://doi.org/10.1109/RED.2012.6338411","url":null,"abstract":"We propose application of method, based on notion of computer capacity, for evaluating the performance of computer systems. Computer capacity is based on the number of different tasks that can be executed in a given time. This characteristic determined only by the computer architecture, and it can be easily computed at the design stage and used for optimizing architectural decisions.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134117305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of side information generation impact on distributed video coding performance 边信息生成对分布式视频编码性能的影响分析
M. Gilmutdinov, A. Veselov, B. Filippov
{"title":"Analysis of side information generation impact on distributed video coding performance","authors":"M. Gilmutdinov, A. Veselov, B. Filippov","doi":"10.1109/RED.2012.6338400","DOIUrl":"https://doi.org/10.1109/RED.2012.6338400","url":null,"abstract":"Distributed video coding (DVC) is a relatively new video coding paradigm based on distributed source coding ideas. This approach does not use motion estimation at the encoder side and allows implementing low-complexity encoding schemes. In the DVC decoding procedure turns to generation of side information using key frames and further side information refinement using the principles of error correction coding. The basic approaches to side information generation for DVC are considered in the paper. A new algorithm of side information generation is proposed. An evaluation of rate-distortion performance of the new DVC scheme based on the described algorithm is given.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125052742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secret sharing in continuous access control system, using heart sounds 秘密共享在连续访问控制系统中,使用心音
E. Andreeva
{"title":"Secret sharing in continuous access control system, using heart sounds","authors":"E. Andreeva","doi":"10.1109/RED.2012.6338394","DOIUrl":"https://doi.org/10.1109/RED.2012.6338394","url":null,"abstract":"User's identification and authentication procedures realize access control to information. But with development of information technology become important not only authenticate user in the beginning of work with system, but also control his authenticity during working. The solution of this problem may be a system with continuous authentication. Continuous authentication it is such type of authentication when system control user access at each time interval. In this paper I propose model of continuous authentication system using human heart sound signals to access control and show the method of secret sharing in such system.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125441062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the error-erasure-decoder of the Chinese remainder codes 中文余码的纠错解码器研究
Wenhui Li, V. Sidorenko
{"title":"On the error-erasure-decoder of the Chinese remainder codes","authors":"Wenhui Li, V. Sidorenko","doi":"10.1109/RED.2012.6338403","DOIUrl":"https://doi.org/10.1109/RED.2012.6338403","url":null,"abstract":"The Chinese remainder codes has been studied when only errors occur. We propose an error-erasure-decoder for the Chinese remainder codes and analyze the decoding radius.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130785395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Channel capacity prediction for femtocell-macrocell deployment strategies in dense urban environments with high layout of users 高密度城市环境下飞蜂窝-宏蜂窝部署策略的信道容量预测
N. Blaunstein, Michail Sergeev
{"title":"Channel capacity prediction for femtocell-macrocell deployment strategies in dense urban environments with high layout of users","authors":"N. Blaunstein, Michail Sergeev","doi":"10.1109/RED.2012.6338397","DOIUrl":"https://doi.org/10.1109/RED.2012.6338397","url":null,"abstract":"The optimization of the channel capacity in the new fourth generation (4G) wireless networks became a key issue during the last decade. In this work, the co-existence of macrocell Base Stations (MBSs) and Femtocell Access Points (FAPs) or home base stations (HBS) with shared and dedicated carrier frequency allocations is considered. The simulation framework for analysis of channel capacity improvement in complex urban environment is introduced. The analysis of heterogeneous network consisting of dedicated femtocells for home coverage in a presence of traditional macrocell pattern is presented. The advantages and drawbacks for different deployment strategies are investigated using the proposed simulation framework.","PeriodicalId":403644,"journal":{"name":"2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127921656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信