101 |
Low-density Parity-Check decoding Algorithms / Low-density Parity-Check avkodare algoritmPirou, Florent January 2004 (has links)
Recently, low-density parity-check (LDPC) codes have attracted much attention because of their excellent error correcting performance and highly parallelizable decoding scheme. However, the effective VLSI implementation of and LDPC decoder remains a big challenge and is a crucial issue in determining how well we can exploit the benefits of the LDPC codes in the real applications. In this master thesis report, following a error coding background, we describe Low-Density Parity-Check codes and their decoding algorithm, and also requirements and architectures of LPDC decoder implementations.
|
102 |
Joint Compression and Digital Watermarking: Information-Theoretic Study and Algorithms DevelopmentSun, Wei January 2006 (has links)
In digital watermarking, a watermark is embedded into a covertext in such a way that the resulting watermarked signal is robust to certain distortion caused by either standard data processing in a friendly environment or malicious attacks in an unfriendly environment. The watermarked signal can then be used for different purposes ranging from copyright protection, data authentication,fingerprinting, to information hiding. In this thesis, digital watermarking will be investigated from both an information theoretic viewpoint and a numerical computation viewpoint. <br /><br /> From the information theoretic viewpoint, we first study a new digital watermarking scenario, in which watermarks and covertexts are generated from a joint memoryless watermark and covertext source. The configuration of this scenario is different from that treated in existing digital watermarking works, where watermarks are assumed independent of covertexts. In the case of public watermarking where the covertext is not accessible to the watermark decoder, a necessary and sufficient condition is determined under which the watermark can be fully recovered with high probability at the end of watermark decoding after the watermarked signal is disturbed by a fixed memoryless attack channel. Moreover, by using similar techniques, a combined source coding and Gel'fand-Pinsker channel coding theorem is established, and an open problem proposed recently by Cox et al is solved. Interestingly, from the sufficient and necessary condition we can show that, in light of the correlation between the watermark and covertext, watermarks still can be fully recovered with high probability even if the entropy of the watermark source is strictly above the standard public watermarking capacity. <br /><br /> We then extend the above watermarking scenario to a case of joint compression and watermarking, where the watermark and covertext are correlated, and the watermarked signal has to be further compressed. Given an additional constraint of the compression rate of the watermarked signals, a necessary and sufficient condition is determined again under which the watermark can be fully recovered with high probability at the end of public watermark decoding after the watermarked signal is disturbed by a fixed memoryless attack channel. <br /><br /> The above two joint compression and watermarking models are further investigated under a less stringent environment where the reproduced watermark at the end of decoding is allowed to be within certain distortion of the original watermark. Sufficient conditions are determined in both cases, under which the original watermark can be reproduced with distortion less than a given distortion level after the watermarked signal is disturbed by a fixed memoryless attack channel and the covertext is not available to the watermark decoder. <br /><br /> Watermarking capacities and joint compression and watermarking rate regions are often characterized and/or presented as optimization problems in information theoretic research. However, it does not mean that they can be calculated easily. In this thesis we first derive closed forms of watermarking capacities of private Laplacian watermarking systems with the magnitude-error distortion measure under a fixed additive Laplacian attack and a fixed arbitrary additive attack, respectively. Then, based on the idea of the Blahut-Arimoto algorithm for computing channel capacities and rate distortion functions, two iterative algorithms are proposed for calculating private watermarking capacities and compression and watermarking rate regions of joint compression and private watermarking systems with finite alphabets. Finally, iterative algorithms are developed for calculating public watermarking capacities and compression and watermarking rate regions of joint compression and public watermarking systems with finite alphabets based on the Blahut-Arimoto algorithm and the Shannon's strategy.
|
103 |
Lattice-Based Precoding And Decoding in MIMO Fading SystemsTaherzadeh, Mahmoud January 2008 (has links)
In this thesis, different aspects of lattice-based precoding and decoding for the transmission of digital and analog data over MIMO fading channels are investigated:
1) Lattice-based precoding in MIMO broadcast systems:
A new viewpoint for adopting the lattice reduction in communication over MIMO broadcast channels is introduced. Lattice basis reduction helps us to reduce the average transmitted energy by modifying the region which includes the constellation points. The new viewpoint helps us to generalize the idea of lattice-reduction-aided precoding for the case of unequal-rate transmission, and obtain analytic results for the asymptotic behavior of the symbol-error-rate for the lattice-reduction-aided precoding and the perturbation technique. Also, the outage probability for both cases of fixed-rate users and fixed sum-rate is analyzed. It is shown that the lattice-reduction-aided method, using LLL algorithm, achieves the optimum asymptotic slope of symbol-error-rate (called the precoding diversity).
2) Lattice-based decoding in MIMO multiaccess systems and MIMO point-to-point systems:
Diversity order and diversity-multiplexing tradeoff are two important measures for the performance of communication systems over MIMO fading channels. For the case of MIMO multiaccess systems (with single-antenna transmitters) or MIMO point-to-point systems with V-BLAST transmission scheme, it is proved that lattice-reduction-aided decoding achieves the maximum receive diversity (which is equal to the number of receive antennas). Also, it is proved that the naive lattice decoding (which discards the out-of-region decoded points) achieves the maximum diversity in V-BLAST systems. On the other hand, the inherent drawbacks of the naive lattice decoding for general MIMO fading systems is investigated. It is shown that using the naive lattice decoding for MIMO systems has considerable deficiencies in terms of the diversity-multiplexing tradeoff. Unlike the case of maximum-likelihood decoding, in this case, even the perfect lattice space-time codes which have the non-vanishing determinant property can not achieve the optimal diversity-multiplexing tradeoff.
3) Lattice-based analog transmission over MIMO fading channels:
The problem of finding a delay-limited schemes for sending an analog source over MIMO fading channels is investigated in this part. First, the problem of robust joint source-channel coding over an additive white Gaussian noise channel is investigated. A new scheme is proposed which achieves the optimal slope for the signal-to-distortion-ratio (SDR) curve (unlike the previous known coding schemes). Then, this idea is extended to MIMO channels to construct lattice-based codes for joint source-channel coding over MIMO channels. Also, similar to the diversity-multiplexing tradeoff, the asymptotic performance of MIMO joint source-channel coding schemes is characterized, and a concept called diversity-fidelity tradeoff is introduced in this thesis.
|
104 |
Coding for Cooperative CommunicationsUppal, Momin Ayub 2010 August 1900 (has links)
The area of cooperative communications has received tremendous research interest
in recent years. This interest is not unwarranted, since cooperative communications
promises the ever-so-sought after diversity and multiplexing gains typically
associated with multiple-input multiple-output (MIMO) communications, without
actually employing multiple antennas. In this dissertation, we consider several cooperative
communication channels, and for each one of them, we develop information
theoretic coding schemes and derive their corresponding performance limits. We next
develop and design practical coding strategies which perform very close to the information
theoretic limits.
The cooperative communication channels we consider are: (a) The Gaussian relay
channel, (b) the quasi-static fading relay channel, (c) cooperative multiple-access
channel (MAC), and (d) the cognitive radio channel (CRC). For the Gaussian relay
channel, we propose a compress-forward (CF) coding strategy based on Wyner-Ziv
coding, and derive the achievable rates specifically with BPSK modulation. The CF
strategy is implemented with low-density parity-check (LDPC) and irregular repeataccumulate
codes and is found to operate within 0.34 dB of the theoretical limit. For
the quasi-static fading relay channel, we assume that no channel state information
(CSI) is available at the transmitters and propose a rateless coded protocol which
uses rateless coded versions of the CF and the decode-forward (DF) strategy. We
implement the protocol with carefully designed Raptor codes and show that the implementation suffers a loss of less than 10 percent from the information theoretical limit. For
the MAC, we assume quasi-static fading, and consider cooperation in the low-power
regime with the assumption that no CSI is available at the transmitters. We develop
cooperation methods based on multiplexed coding in conjunction with rateless
codes and find the achievable rates and in particular the minimum energy per bit to
achieve a certain outage probability. We then develop practical coding methods using
Raptor codes, which performs within 1.1 dB of the performance limit. Finally, we
consider a CRC and develop a practical multi-level dirty-paper coding strategy using
LDPC codes for channel coding and trellis-coded quantization for source coding. The
designed scheme is found to operate within 0.78 dB of the theoretical limit.
By developing practical coding strategies for several cooperative communication
channels which exhibit performance close to the information theoretic limits, we show
that cooperative communications not only provide great benefits in theory, but can
possibly promise the same benefits when put into practice. Thus, our work can be
considered a useful and necessary step towards the commercial realization of cooperative
communications.
|
105 |
Ανάλυση επιπτώσεων αριθμητικών προσεγγίσεων σε επαναληπτικούς αποκωδικοποιητές για γραμμικούς κώδικες διόρθωσης σφαλμάτωνΑστάρας, Στέφανος 21 February 2015 (has links)
Σε αυτή την εργασία μελετάμε τους αλγορίθμους που χρησιμοποιούνται
στην αποκωδικοποίηση των LDPC, με έμφαση στους κώδικες του
προτύπου 802.11n. Αντιμετωπίζουμε τις δυσκολίες που αντιμετωπίζουν
στην υλοποίηση στο υλικό, κυρίως στην εκτέλεση αριθμητικών πράξεων,
και προτείνουμε πρακτικές λύσεις. Χρησιμοποιώντας τα αποτελέσματα
εκτενών εξομοιώσεων, καταλήγουμε στις βέλτιστες παραμέτρους που θα
έχουν οι προτεινόμενες υλοποιήσεις. / In this thesis, we study the LDPC decoding algorithms, with emphasis on the 802.11n standard codes. We tackle the hardware implementation difficulties, especially those related to arithmetic computations, and propose practical solutions. Leveraging the results of extensive simulations, we find the optimal parameters of the proposed implementations.
|
106 |
Bit-interleaved coded modulation for hybrid rf/fso systemsHe, Xiaohui 05 1900 (has links)
In this thesis, we propose a novel architecture for hybrid radio frequency
(RF)/free–space optics (FSO) wireless systems. Hybrid RF/FSO systems
are attractive since the RF and FSO sub–systems are affected differently by
weather and fading phenomena. We give a thorough introduction to the RF
and FSO technology, respectively. The state of the art of hybrid RF/FSO systems
is reviewed. We show that a hybrid system robust to different weather
conditions is obtained by joint bit–interleaved coded modulation (BICM) of the
bit streams transmitted over the RF and FSO sub–channels. An asymptotic
performance analysis reveals that a properly designed convolutional code can
exploit the diversity offered by the independent sub–channels. Furthermore,
we develop code design and power assignment criteria and provide an efficient
code search procedure. The cut–off rate of the proposed hybrid system is also
derived and compared to that of hybrid systems with perfect channel state
information at the transmitter. Simulation results show that hybrid RF/FSO
systems with BICM outperform previously proposed hybrid systems employing
a simple repetition code and selection diversity.
|
107 |
Statistical analysis of multiuser and narrowband interference and superior system designs for impulse radio ultra-wide bandwidth wirelessShao, Hua Unknown Date
No description available.
|
108 |
Key Agreement over Wiretap Models with Non-Causal Side InformationZibaeenejad, Ali January 2012 (has links)
The security of information is an indispensable element of a communication system when transmitted signals are vulnerable to eavesdropping. This issue is a challenging problem in a wireless network as propagated signals can be easily captured by unauthorized receivers, and so achieving a perfectly secure communication is a desire in such a wiretap channel. On the other hand, cryptographic algorithms usually lack to attain this goal due to the following restrictive assumptions made for their design. First, wiretappers basically have limited computational power and time. Second, each authorized party has often access to a reasonably large sequence of uniform random bits concealed from wiretappers.
To guarantee the security of information, Information Theory (IT) offers the following two approaches based on physical-layer security.
First, IT suggests using wiretap (block) codes to securely and reliably transmit messages over a noisy wiretap channel. No confidential common key is usually required for the wiretap codes. The secrecy problem investigates an optimum wiretap code that achieves the secrecy capacity of a given wiretap channel.
Second, IT introduces key agreement (block) codes to exchange keys between legitimate parties over a wiretap model. The agreed keys are to be reliable, secure, and (uniformly) random, at least in an asymptotic sense, such that they can be finally employed in symmetric key cryptography for data transmission. The key agreement problem investigates an optimum key agreement code that obtains the key capacity of a given wiretap model.
In this thesis, we study the key agreement problem for two wiretap models: a Discrete Memoryless (DM) model and a Gaussian model. Each model consists of a wiretap channel
paralleled with an authenticated public channel. The wiretap channel is from a transmitter, called Alice, to an authorized receiver, called Bob, and to a wiretapper, called Eve. The Probability Transition Function (PTF) of the wiretap channel is controlled by a random sequence of Channel State Information (CSI), which is assumed to be non-causally available at Alice. The capacity of the public channel is C_P₁∈[0,∞) in the forward direction from Alice to Bob and C_P₂∈[0,∞) in the backward direction from Bob to Alice. For each model, the key capacity as a function of the pair (C_P₁, C_P₂) is denoted by C_K(C_P₁, C_P₂). We investigate the forward key capacity of each model, i.e., C_K(C_P₁, 0) in this thesis. We also study the key generation over the Gaussian model when Eve's channel is less noisy than Bob's.
In the DM model, the wiretap channel is a Discrete Memoryless State-dependent Wiretap Channel (DM-SWC) in which Bob and Eve each may also have access to a sequence of Side Information (SI) dependent on the CSI. We establish a Lower Bound (LB) and an Upper Bound (UB) on the forward key capacity of the DM model. When the model is less noisy in Bob's favor, another UB on the forward key capacity is derived. The achievable key agreement code is asymptotically optimum as C_P₁→ ∞. For any given DM model, there also exists a finite capacity C⁰_P₁, which is determined by the DM-SWC, such that the forward key capacity is achievable if C_P₁≥ C⁰_P₁. Moreover, the key generation is saturated at capacity C_P₁= C⁰_P₁, and thus increasing the public channel capacity beyond C⁰_P₁ makes no improvement on the forward key capacity of the DM model. If the CSI is fully known at Bob in addition to Alice, C⁰_P₁=0, and so the public channel has no contribution in key generation when the public channel is in the forward direction.
The achievable key agreement code of the DM model exploits both a random generator and the CSI as resources for key generation at Alice. The randomness property of channel states can be employed for key generation, and so the agreed keys depend on the CSI in general. However, a message is independent of the CSI in a secrecy problem. Hence, we justify that the forward key capacity can exceed both the main channel capacity and the secrecy capacity of the DM-SWC.
In the Gaussian model, the wiretap channel is a Gaussian State-dependent Wiretap Channel (G-SWC) with Additive White Gaussian Interference (AWGI) having average power Λ. For simplicity, no side information is assumed at Bob and Eve.
Bob's channel and Eve's channel suffer from Additive White Gaussian Noise (AWGN), where the correlation coefficient between noise of Bob's channel and that of Eve's channel is given by ϱ.
We prove that the forward key capacity of the Gaussian model is independent of ϱ. Moreover, we establish that the forward key capacity is positive unless Eve's channel is less noisy than Bob's. We also prove that the key capacity of the Gaussian model vanishes if the G-SWC is physically degraded in Eve's favor. However, we justify that obtaining a positive key capacity is feasible even if Eve's channel is less noisy than Bob's according to our achieved LB on the key capacity for case (C_P₁, C_P₂)→ (∞, ∞). Hence, the key capacity of the Gaussian model is a function of ϱ.
In this thesis, an LB on the forward key capacity of the Gaussian model is achieved. For a fixed Λ, the achievable key agreement code is optimum for any C_P₁∈[0,∞) in both low Signal-to-Interference Ratio (SIR) and high SIR regimes. We show that the forward key capacity is asymptotically independent of C_P₁ and Λ as the SIR goes to infinity, and thus the public channel and the interference have negligible contributions in key generation in the high SIR regime. On the other hand, the forward key capacity is a function of C_P₁ and Λ in the low SIR regime. Contributions of the interference and the public channel in key generation are significant in the low SIR regime that will be illustrated by simulations.
The proposed key agreement code asymptotically achieves the forward key capacity of the Gaussian model for any SIR as C_P₁→ ∞. Hence, C_K(∞,0) is calculated, and it is suggested as a UB on C_K(C_P₁,0). Using simulations, we also compute the minimum required C_P₁ for which the forward key capacity is upper bounded within a given tolerance.
The achievable key agreement code is designed based on a generalized version of the Dirty Paper Coding (DPC) in which transmitted signals are correlated with the CSI. The correlation coefficient is to be determined by C_P₁. In contrast to the DM model, the LB on the forward key capacity of a Gaussian model is a strictly increasing function of C_P₁ according to our simulations. This fact is an essential difference between this model and the DM model.
For C_P₁=0 and a fixed Λ, the forward key capacity of the Gaussian model exceeds the main channel capacity of the G-SWC in the low SIR regime. By simulations, we show that the interference enhances key generation in the low SIR regime. In this regime, we also justify that the positive effect of the interference on the (forward) key capacity is generally more than its positive effect on the secrecy capacity of the G-SWC, while the interference has no influence on the main channel capacity of the G-SWC.
|
109 |
Coding Theorems via Jar DecodingMeng, Jin January 2013 (has links)
In the development of digital communication and information theory, every channel decoding rule has resulted in a revolution at the time when it was invented. In the area of information theory, early channel coding theorems were established mainly by maximum likelihood decoding, while the arrival of typical sequence decoding signaled the era of multi-user information theory, in which achievability proof became simple and intuitive. Practical channel code design, on the other hand, was based on minimum distance decoding at the early stage. The invention of belief propagation decoding with soft input and soft output, leading to the birth of turbo codes and low-density-parity check (LDPC) codes which are indispensable coding techniques in current communication systems, changed the whole research area so dramatically that people started to use the term "modern coding theory'' to refer to the research based on this decoding rule. In this thesis, we propose a new decoding rule, dubbed jar decoding, which would be expected to bring some new thoughts to both the code performance analysis and the code design.
Given any channel with input alphabet X and output alphabet Y, jar decoding rule can be simply expressed as follows: upon receiving the channel output y^n ∈ Y^n, the decoder first forms a set (called a jar) of sequences x^n ∈ X^n considered to be close to y^n and pick any codeword (if any) inside this jar as the decoding output. The way how the decoder forms the jar is defined independently with the actual channel code and even the channel statistics in certain cases. Under this jar decoding, various coding theorems are proved in this thesis. First of all, focusing on the word error probability, jar decoding is shown to be near optimal by the achievabilities proved via jar decoding and the converses proved via a proof technique, dubbed the outer mirror image of jar, which is also quite related to jar decoding. Then a Taylor-type expansion of optimal channel coding rate with finite block length is discovered by combining those achievability and converse theorems, and it is demonstrated that jar decoding is optimal up to the second order in this Taylor-type expansion. Flexibility of jar decoding is then illustrated by proving LDPC coding theorems via jar decoding, where the bit error probability is concerned. And finally, we consider a coding scenario, called interactive encoding and decoding, and show that jar decoding can be also used to prove coding theorems and guide the code design in the scenario of two-way communication.
|
110 |
[en] JOINT SOURCE/CHANNEL CODING USING LAPPED TRANSFORMS / [pt] CODIFICAÇÃO CONJUNTA FONTE/CANAL UTILIZANDO TRANSFORMADASARTHUR LUIZ AMARAL DA CUNHA 15 July 2002 (has links)
[pt] Neste trabalho é feito um estudo sobre compressão de
imagens para canal ruidoso.Inicialmente, esquemas de
complexidade moderada sem a utilização do princípio da
separação de Shannon são investigados e simulados. Com
isso, mostra-se que esquemas eficientes de codificação
conjunta fonte/canal existem e podem eventualmente
apresentar melhor performance do que esquemas separados de
codificação e canal e fonte. São também investigados,
algoritmos de codificação de imagens visando a transmissão
num capital ruidoso. Nesse contexto, é proposto um esquema
utilizando transformadas com superposição com boa
performance, como mostram as simulações realizadas. O
esquema posteriormente estendido para imagens multi-
espectrais mostrando-se igualmente eficiente. / [en] In the present dissertation we investigate image
compression techniques for transmission over binary
symmetric channels poluted with noise. Frist we simulate
some known techniques for joint source/channel coding that
dispenses with the use of error correcting codes. These
techiniques may exhibit better performance when complexity
and delay constraits are at stake. We further propose an
image compression algorithm for noisy channels based on
lapped/block transforms and block source/channel coding. We
simulate the proposed scheme for various channel
situations. The algorithm is further extented to handle
compression and transmission of multiepectral remote
sensing satellite imagery. Results for natural and
multiespectral images are presented showing the good
performance attained by the proposed schemes.
|
Page generated in 0.084 seconds