IEEE journal on selected areas in information theory最新文献

筛选
英文 中文
Spatio-Temporal Wildfire Prediction Using Multi-Modal Data 基于多模态数据的野火时空预测
IEEE journal on selected areas in information theory Pub Date : 2023-03-22 DOI: 10.1109/JSAIT.2023.3276054
Chen Xu;Yao Xie;Daniel A. Zuniga Vazquez;Rui Yao;Feng Qiu
{"title":"Spatio-Temporal Wildfire Prediction Using Multi-Modal Data","authors":"Chen Xu;Yao Xie;Daniel A. Zuniga Vazquez;Rui Yao;Feng Qiu","doi":"10.1109/JSAIT.2023.3276054","DOIUrl":"10.1109/JSAIT.2023.3276054","url":null,"abstract":"Due to severe societal and environmental impacts, wildfire prediction using multi-modal sensing data has become a highly sought-after data-analytical tool by various stakeholders (such as state governments and power utility companies) to achieve a more informed understanding of wildfire activities and plan preventive measures. A desirable algorithm should precisely predict fire risk and magnitude for a location in real time. In this paper, we develop a flexible spatio-temporal wildfire prediction framework using multi-modal time series data. We first predict the wildfire risk (the chance of a wildfire event) in real-time, considering the historical events using discrete mutually exciting point process models. Then we further develop a wildfire magnitude prediction set method based on the flexible distribution-free time-series conformal prediction (CP) approach. Theoretically, we prove a risk model parameter recovery guarantee, as well as coverage and set size guarantees for the CP sets. Through extensive real-data experiments with wildfire data in California, we demonstrate the effectiveness of our methods, as well as their flexibility and scalability in large regions.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"302-313"},"PeriodicalIF":0.0,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42615184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Voronoi Region of the Barnes–Wall Lattice Λ16 Barnes-Wall晶格的Voronoi区域Λ16
IEEE journal on selected areas in information theory Pub Date : 2023-03-16 DOI: 10.1109/JSAIT.2023.3276897
Daniel Pook-Kolb;Erik Agrell;Bruce Allen
{"title":"The Voronoi Region of the Barnes–Wall Lattice Λ16","authors":"Daniel Pook-Kolb;Erik Agrell;Bruce Allen","doi":"10.1109/JSAIT.2023.3276897","DOIUrl":"10.1109/JSAIT.2023.3276897","url":null,"abstract":"We give a detailed description of the Voronoi region of the Barnes–Wall lattice \u0000<inline-formula> <tex-math>$Lambda _{16}$ </tex-math></inline-formula>\u0000, including its vertices, relevant vectors, and symmetry group. The exact value of its quantizer constant is calculated, which was previously only known approximately. To verify the result, we estimate the same constant numerically and propose a new very simple method to quantify the variance of such estimates, which is far more accurate than the commonly used jackknife estimator.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"16-23"},"PeriodicalIF":0.0,"publicationDate":"2023-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/8700143/10153947/10126076.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42379813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Active Sensing for Two-Sided Beam Alignment and Reflection Design Using Ping-Pong Pilots 利用乒乓球飞行员进行双侧光束对准和反射设计的主动传感
IEEE journal on selected areas in information theory Pub Date : 2023-03-15 DOI: 10.1109/JSAIT.2023.3276296
Tao Jiang;Foad Sohrabi;Wei Yu
{"title":"Active Sensing for Two-Sided Beam Alignment and Reflection Design Using Ping-Pong Pilots","authors":"Tao Jiang;Foad Sohrabi;Wei Yu","doi":"10.1109/JSAIT.2023.3276296","DOIUrl":"10.1109/JSAIT.2023.3276296","url":null,"abstract":"Beam alignment is an important task for millimeter-wave (mmWave) communication, because constructing aligned narrow beams both at the transmitter (Tx) and the receiver (Rx) is crucial in terms of compensating the significant path loss in very high-frequency bands. However, beam alignment is also a highly nontrivial task because large antenna arrays typically have a limited number of radio-frequency chains, allowing only low-dimensional measurements of the high-dimensional channel. This paper considers a two-sided beam alignment problem based on an alternating ping-pong pilot scheme between Tx and Rx over multiple rounds without explicit feedback. We propose a deep active sensing framework in which two long short-term memory (LSTM) based neural networks are employed to learn the adaptive sensing strategies (i.e., measurement vectors) and to produce the final aligned beamformers at both sides. In the proposed ping-pong protocol, the Tx and the Rx alternately send pilots so that both sides can leverage local observations to sequentially design their respective sensing and data transmission beamformers. The proposed strategy can be extended to scenarios with a reconfigurable intelligent surface (RIS) for designing, in addition, the reflection coefficients at the RIS for both sensing and communications. Numerical experiments demonstrate significant and interpretable performance improvement. The proposed strategy works well even for the challenging multipath channel environments.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"24-39"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44233552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rate and Detection-Error Exponent Tradeoff for Joint Communication and Sensing of Fixed Channel States 固定信道状态联合通信和感知的速率和检测误差指数权衡
IEEE journal on selected areas in information theory Pub Date : 2023-03-12 DOI: 10.1109/JSAIT.2023.3275877
Meng-Che Chang;Shi-Yuan Wang;Tuna Erdoğan;Matthieu R. Bloch
{"title":"Rate and Detection-Error Exponent Tradeoff for Joint Communication and Sensing of Fixed Channel States","authors":"Meng-Che Chang;Shi-Yuan Wang;Tuna Erdoğan;Matthieu R. Bloch","doi":"10.1109/JSAIT.2023.3275877","DOIUrl":"10.1109/JSAIT.2023.3275877","url":null,"abstract":"We study the information-theoretic limits of joint communication and sensing when the sensing task is modeled as the estimation of a discrete channel state fixed during the transmission of an entire codeword. This setting captures scenarios in which the time scale over which sensing happens is significantly slower than the time scale over which symbol transmission occurs. The tradeoff between communication and sensing then takes the form of a tradeoff region between the rate of reliable communication and the state detection-error exponent. We investigate such tradeoffs for both mono-static and bi-static scenarios, in which the sensing task is performed at the transmitter or receiver, respectively. In the mono-static case, we develop an exact characterization of the tradeoff in open-loop, when the sensing is not used to assist the communication. We also show the strict improvement brought by a closed-loop operation, in which the sensing informs the communication. In the bi-static case, we develop an achievable tradeoff region that highlights the fundamentally different nature of the bi-static scenario. Specifically, the rate of communication plays a key role in the characterization of the tradeoff and we show how joint strategies, which simultaneously estimate message and state, outperform successive strategies, which only estimate the state after decoding the transmitted message.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"245-259"},"PeriodicalIF":0.0,"publicationDate":"2023-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48253199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure Integrated Sensing and Communication 安全集成传感和通信
IEEE journal on selected areas in information theory Pub Date : 2023-03-10 DOI: 10.1109/JSAIT.2023.3275048
Onur Günlü;Matthieu R. Bloch;Rafael F. Schaefer;Aylin Yener
{"title":"Secure Integrated Sensing and Communication","authors":"Onur Günlü;Matthieu R. Bloch;Rafael F. Schaefer;Aylin Yener","doi":"10.1109/JSAIT.2023.3275048","DOIUrl":"10.1109/JSAIT.2023.3275048","url":null,"abstract":"This work considers the problem of mitigating information leakage between communication and sensing in systems jointly performing both operations. Specifically, a discrete memoryless state-dependent broadcast channel model is studied in which (i) the presence of feedback enables a transmitter to convey information, while simultaneously performing channel state estimation; (ii) one of the receivers is treated as an eavesdropper whose state should be estimated but which should remain oblivious to part of the transmitted information. The model abstracts the challenges behind security for joint communication and sensing if one views the channel state as a key attribute, e.g., location. For independent and identically distributed states, perfect output feedback, and when part of the transmitted message should be kept secret, a partial characterization of the secrecy-distortion region is developed. The characterization is exact when the broadcast channel is either physically-degraded or reversely-physically-degraded. The partial characterization is also extended to the situation in which the entire transmitted message should be kept secret. The benefits of a joint approach compared to separation-based secure communication and state-sensing methods are illustrated with binary joint communication and sensing models.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"40-53"},"PeriodicalIF":0.0,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48623002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of Large Market Data Using Neural Networks: A Causal Approach 使用神经网络分析大型市场数据:因果分析法
IEEE journal on selected areas in information theory Pub Date : 2023-01-01 DOI: 10.1109/JSAIT.2024.3351549
Marc-Aurèle Divernois;Jalal Etesami;Damir Filipovic;Negar Kiyavash
{"title":"Analysis of Large Market Data Using Neural Networks: A Causal Approach","authors":"Marc-Aurèle Divernois;Jalal Etesami;Damir Filipovic;Negar Kiyavash","doi":"10.1109/JSAIT.2024.3351549","DOIUrl":"https://doi.org/10.1109/JSAIT.2024.3351549","url":null,"abstract":"We develop a data-driven framework to identify the interconnections between firms using an information-theoretic measure. This measure generalizes Granger causality and is capable of detecting nonlinear relationships within a network. Moreover, we develop an algorithm using recurrent neural networks and the aforementioned measure to identify the interconnections of high-dimensional nonlinear systems. The outcome of this algorithm is the causal graph encoding the interconnections among the firms. These causal graphs can be used as preliminary feature selection for another predictive model or for policy design. We evaluate the performance of our algorithm using both synthetic linear and nonlinear experiments and apply it to the daily stock returns of U.S. listed firms and infer their interconnections.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"833-847"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139715152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Private Information Retrieval Without Storage Overhead: Coding Instead of Replication 没有存储开销的私有信息检索:编码而不是复制
IEEE journal on selected areas in information theory Pub Date : 2023-01-01 DOI: 10.1109/JSAIT.2023.3285665
Alexander Vardy;Eitan Yaakobi
{"title":"Private Information Retrieval Without Storage Overhead: Coding Instead of Replication","authors":"Alexander Vardy;Eitan Yaakobi","doi":"10.1109/JSAIT.2023.3285665","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3285665","url":null,"abstract":"Private information retrieval (PIR) protocols allow a user to retrieve a data item from a database without revealing any information about the identity of the item being retrieved. Specifically, in information-theoretic <inline-formula> <tex-math notation=\"LaTeX\">$k$ </tex-math></inline-formula>-server PIR, the database is replicated among <inline-formula> <tex-math notation=\"LaTeX\">$k$ </tex-math></inline-formula> non-communicating servers, and each server learns nothing about the item retrieved by the user. The effectiveness of PIR protocols is usually measured in terms of their communication complexity, which is the total number of bits exchanged between the user and the servers. However, another important cost parameter is storage overhead, which is the ratio between the total number of bits stored on all the servers and the number of bits in the database. Since single-server information-theoretic PIR is impossible, the storage overhead of all existing PIR protocols is at least 2 (or <inline-formula> <tex-math notation=\"LaTeX\">$k$ </tex-math></inline-formula>, in the case of <inline-formula> <tex-math notation=\"LaTeX\">$k$ </tex-math></inline-formula>-server PIR). In this work, we show that information-theoretic PIR can be achieved with storage overhead arbitrarily close to the optimal value of 1, without sacrificing the communication complexity asymptotically. Specifically, we prove that all known linear <inline-formula> <tex-math notation=\"LaTeX\">$k$ </tex-math></inline-formula>-server PIR protocols can be efficiently emulated, while preserving both privacy and communication complexity but significantly reducing the storage overhead. To this end, we distribute the <inline-formula> <tex-math notation=\"LaTeX\">$n$ </tex-math></inline-formula> bits of the database among <inline-formula> <tex-math notation=\"LaTeX\">$s+r$ </tex-math></inline-formula> servers, each storing <inline-formula> <tex-math notation=\"LaTeX\">$n/s$ </tex-math></inline-formula> coded bits (rather than replicas). Notably, our coding scheme remains the same, regardless of the specific <inline-formula> <tex-math notation=\"LaTeX\">$k$ </tex-math></inline-formula>-server PIR protocol being emulated. For every fixed <inline-formula> <tex-math notation=\"LaTeX\">$k$ </tex-math></inline-formula>, the resulting storage overhead <inline-formula> <tex-math notation=\"LaTeX\">$(s+r)/s$ </tex-math></inline-formula> approaches 1 as <inline-formula> <tex-math notation=\"LaTeX\">$s$ </tex-math></inline-formula> grows; explicitly we have <inline-formula> <tex-math notation=\"LaTeX\">$r le k sqrt {s}(1 + o(1))$ </tex-math></inline-formula>. Moreover, in the special case <inline-formula> <tex-math notation=\"LaTeX\">$k = 2$ </tex-math></inline-formula>, the storage overhead is only <inline-formula> <tex-math notation=\"LaTeX\">$1 + {}frac {1}{s}$ </tex-math></inline-formula>. In order to achieve these results, we introduce and study a new kind of binary linear codes, called here <inline-formula> <tex-math no","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"286-301"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50354281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Capacity of Locally Recoverable Codes 本地可恢复代码的容量
IEEE journal on selected areas in information theory Pub Date : 2023-01-01 DOI: 10.1109/JSAIT.2023.3300901
Arya Mazumdar
{"title":"Capacity of Locally Recoverable Codes","authors":"Arya Mazumdar","doi":"10.1109/JSAIT.2023.3300901","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3300901","url":null,"abstract":"Motivated by applications in distributed storage, the notion of a locally recoverable code (LRC) was introduced a few years back. In an LRC, any coordinate of a codeword is recoverable by accessing only a small number of other coordinates. While different properties of LRCs have been well-studied, their performance on channels with random erasures or errors has been mostly unexplored. In this paper, we analyze the performance of LRCs over such stochastic channels. In particular, for input-symmetric discrete memoryless channels, we give a tight characterization of the gap to Shannon capacity when LRCs are used over the channel. Our results hold for a general notion of LRCs that correct multiple local erasures.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"276-285"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50354282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bee Identification Problem for DNA Strands 蜜蜂DNA链的识别问题
IEEE journal on selected areas in information theory Pub Date : 2023-01-01 DOI: 10.1109/JSAIT.2023.3294423
Johan Chrisnata;Han Mao Kiah;Alexander Vardy;Eitan Yaakobi
{"title":"Bee Identification Problem for DNA Strands","authors":"Johan Chrisnata;Han Mao Kiah;Alexander Vardy;Eitan Yaakobi","doi":"10.1109/JSAIT.2023.3294423","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3294423","url":null,"abstract":"Motivated by DNA-based applications, we generalize the bee identification problem proposed by Tandon et al. (2019). In this setup, we transmit all <inline-formula> <tex-math notation=\"LaTeX\">$M$ </tex-math></inline-formula> codewords from a codebook over some channel and each codeword results in <inline-formula> <tex-math notation=\"LaTeX\">$N$ </tex-math></inline-formula> noisy outputs. Then our task is to identify each codeword from this unordered set of <inline-formula> <tex-math notation=\"LaTeX\">$MN$ </tex-math></inline-formula> noisy outputs. First, via a reduction to a minimum-cost flow problem on a related bipartite flow network called the input-output flow network, we show that the problem can be solved in <inline-formula> <tex-math notation=\"LaTeX\">$O(M^{3})$ </tex-math></inline-formula> time in the worst case. Next, we consider the deletion and the insertion channels individually, and in both cases, we study the expected number of edges in their respective input-output networks. Specifically, we obtain closed expressions for this quantity for certain codebooks and when the codebook comprises all binary words, we show that this quantity is sub-quadratic when the deletion or insertion probability is less than 1/2. This then implies that the expected running time to perform joint decoding for this codebook is <inline-formula> <tex-math notation=\"LaTeX\">$o(M^{3})$ </tex-math></inline-formula>. For other codebooks, we develop methods to compute the expected number of edges efficiently. Finally, we adapt classical peeling-decoding techniques to reduce the number of nodes and edges in the input-output flow network.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"190-204"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50426686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Bounds on the Size of Binary Codes With Large Minimum Distance 具有大最小距离的二进制码大小的新界
IEEE journal on selected areas in information theory Pub Date : 2023-01-01 DOI: 10.1109/JSAIT.2023.3295836
James Chin-Jen Pang;Hessam Mahdavifar;S. Sandeep Pradhan
{"title":"New Bounds on the Size of Binary Codes With Large Minimum Distance","authors":"James Chin-Jen Pang;Hessam Mahdavifar;S. Sandeep Pradhan","doi":"10.1109/JSAIT.2023.3295836","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3295836","url":null,"abstract":"Let <inline-formula> <tex-math notation=\"LaTeX\">$A(n, d)$ </tex-math></inline-formula> denote the maximum size of a binary code of length <inline-formula> <tex-math notation=\"LaTeX\">$n$ </tex-math></inline-formula> and minimum Hamming distance <inline-formula> <tex-math notation=\"LaTeX\">$d$ </tex-math></inline-formula>. Studying <inline-formula> <tex-math notation=\"LaTeX\">$A(n, d)$ </tex-math></inline-formula>, including efforts to determine it as well to derive bounds on <inline-formula> <tex-math notation=\"LaTeX\">$A(n, d)$ </tex-math></inline-formula> for large <inline-formula> <tex-math notation=\"LaTeX\">$n$ </tex-math></inline-formula>’s, is one of the most fundamental subjects in coding theory. In this paper, we explore new lower and upper bounds on <inline-formula> <tex-math notation=\"LaTeX\">$A(n, d)$ </tex-math></inline-formula> in the large-minimum distance regime, in particular, when <inline-formula> <tex-math notation=\"LaTeX\">$d = n/2 - Omega (sqrt {n})$ </tex-math></inline-formula>. We first provide a new construction of cyclic codes, by carefully selecting specific roots in the binary extension field for the check polynomial, with length <inline-formula> <tex-math notation=\"LaTeX\">$n= 2^{m} -1$ </tex-math></inline-formula>, distance <inline-formula> <tex-math notation=\"LaTeX\">$d geq n/2 - 2^{c-1}sqrt {n}$ </tex-math></inline-formula>, and size <inline-formula> <tex-math notation=\"LaTeX\">$n^{c+1/2}$ </tex-math></inline-formula>, for any <inline-formula> <tex-math notation=\"LaTeX\">$mgeq 4$ </tex-math></inline-formula> and any integer <inline-formula> <tex-math notation=\"LaTeX\">$c$ </tex-math></inline-formula> with <inline-formula> <tex-math notation=\"LaTeX\">$0 leq c leq m/2 - 1$ </tex-math></inline-formula>. These code parameters are slightly worse than those of the Delsarte–Goethals (DG) codes that provide the previously known best lower bound in the large-minimum distance regime. However, using a similar and extended code construction technique we show a sequence of cyclic codes that improve upon DG codes and provide the best lower bound in a narrower range of the minimum distance <inline-formula> <tex-math notation=\"LaTeX\">$d$ </tex-math></inline-formula>, in particular, when <inline-formula> <tex-math notation=\"LaTeX\">$d = n/2 - Omega (n^{2/3})$ </tex-math></inline-formula>. Furthermore, by leveraging a Fourier-analytic view of Delsarte’s linear program, upper bounds on <inline-formula> <tex-math notation=\"LaTeX\">$A(n, left lceil{ n/2 - rho sqrt {n}, }right rceil)$ </tex-math></inline-formula> with <inline-formula> <tex-math notation=\"LaTeX\">$rho in (0.5, 9.5)$ </tex-math></inline-formula> are obtained that scale polynomially in <inline-formula> <tex-math notation=\"LaTeX\">$n$ </tex-math></inline-formula>. To the best of authors’ knowledge, the upper bound due to Barg and Nogin (2006) is the only previously known upper bound that scale polynomially in <inline-formula> <tex-math notation=\"LaTeX\">$n$ </tex-math></inline-formula> in this","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"219-231"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50354353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信