207 results
Search Results
2. Constructions of MDS, Near MDS and Almost MDS Codes From Cyclic Subgroups of F* q 2.
- Author
-
Heng, Ziling, Li, Chengju, and Wang, Xinran
- Subjects
CYCLIC codes ,LINEAR codes ,CYCLIC loads - Abstract
Linear codes achieving or nearly achieving the Singleton bound are interesting in both theory and practice. The objective of this paper is to construct several infinite families of MDS, near MDS and almost MDS codes from some special cyclic subgroups of ${\mathbb {F}}_{q^{2}}^{*}$. To this end, the augmentation and extension techniques are used. The codes in this paper have flexible parameters and their lengths could be large. The minimum linear locality of the codes constructed in this paper is also studied. Some infinite families of optimal linearly locally recoverable codes are obtained. Besides, some codes in this paper are proved to be proper for error detection. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
3. Linear Codes From Some 2-Designs.
- Author
-
Ding, Cunsheng
- Subjects
LINEAR codes ,INCIDENCE functions ,INFORMATION sharing ,HOUSEHOLD electronics ,INFORMATION storage & retrieval systems ,BOOLEAN functions - Abstract
A classical method of constructing a linear code over \mathrm GF(q) with a $t$ -design is to use the incidence matrix of the $t$ -design as a generator matrix over \mathrm GF(q) of the code. This approach has been extensively investigated in the literature. In this paper, a different method of constructing linear codes using specific classes of 2-designs is studied, and linear codes with a few weights are obtained from almost difference sets, difference sets, and a type of 2-designs associated to semibent functions. Two families of the codes obtained in this paper are optimal. The linear codes presented in this paper have applications in secret sharing and authentication schemes, in addition to their applications in consumer electronics, communication and data storage systems. A coding-theory approach to the characterization of highly nonlinear Boolean functions is presented. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
4. On the Trade-Off Between Bit Depth and Number of Samples for a Basic Approach to Structured Signal Recovery From $b$ -Bit Quantized Linear Measurements.
- Author
-
Slawski, Martin and Li, Ping
- Subjects
QUANTUM groups ,LINEAR statistical models ,GAUSSIAN measures ,QUANTIZATION (Physics) ,COMPRESSED sensing - Abstract
We consider the problem of recovering a high-dimensional structured signal from independent Gaussian linear measurements each of which is quantized to $b$ bits. The focus is on a specific method of signal recovery that extends a procedure originally proposed by Plan and Vershynin for one-bit quantization to a multi-bit setting. At the heart of this paper is a characterization of the optimal trade-off between the number of measurements m$ and the bit depth per measurement b$ given a total budget of B = m \cdot b -error in estimating the signal. It turns out that the choice b = 1$ is optimal for estimating the unit vector (direction) corresponding to the signal for any level of additive Gaussian noise before quantization as well as for a specific model of adversarial noise, whereas in a noiseless setting the choice b = 2$ is optimal for estimating the direction and the norm (scale) of the signal. Moreover, Lloyd–Max quantization is shown to be an optimal quantization scheme with respect to -estimation error. Our analysis is corroborated by the numerical experiments showing nearly perfect agreement with our theoretical predictions. This paper is complemented by an empirical comparison to alternative methods of signal recovery. The results of that comparison point to a regime change depending on the noise level: in a low-noise setting, the approach under study falls short of more sophisticated competitors while being competitive in moderate- and high-noise settings. [ABSTRACT FROM PUBLISHER]
- Published
- 2018
- Full Text
- View/download PDF
5. Minimum-Entropy Couplings and Their Applications.
- Author
-
Cicalese, Ferdinando, Gargano, Luisa, and Vaccaro, Ugo
- Subjects
ENTROPY minimization ,DISTRIBUTION (Probability theory) ,RANDOM variables ,BIVARIATE analysis ,MATHEMATICAL optimization - Abstract
Given two discrete random variables $X$ and $Y$ , with probability distributions $p=(p_{1}, \ldots , p_{n})$ and $q=(q_{1}, \ldots , q_{m})$ , respectively, let us denote by ${\mathcal{ C}}(p, q)$ the set of all couplings of $p$ and $q$ , that is, the set of all bivariate probability distributions that have $p$ and $q$ as marginals. In this paper, we study the problem of finding a joint probability distribution in ${\mathcal{ C}}(p, q)$ of minimum entropy (equivalently, a coupling that maximizes the mutual information between $X$ and $Y$), and we discuss several situations where the need for this kind of optimization naturally arises. Since the optimization problem is known to be NP-hard, we give an efficient algorithm to find a joint probability distribution in ${\mathcal{ C}}(p, q)$ with entropy exceeding the minimum possible at most by 1 bit, thus providing an approximation algorithm with an additive gap of at most 1 bit. Leveraging on this algorithm, we extend our result to the problem of finding a minimum-entropy joint distribution of arbitrary $k\geq {2}$ discrete random variables $X_{1}, \ldots , X_{k}$ , consistent with the known $k$ marginal distributions of the individual random variables $X_{1}, \ldots , X_{k}$. In this case, our algorithm has an additive gap of at most $\log k$ from optimum. We also discuss several related applications of our findings and extensions of our results to entropies different from the Shannon entropy. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
6. Constructions of Linear Codes With One-Dimensional Hull.
- Author
-
Li, Chengju and Zeng, Peng
- Subjects
LINEAR codes ,CYCLIC codes ,AUTOMORPHISMS ,POLYNOMIALS ,ABELIAN groups - Abstract
The hull of a linear code is defined to be the intersection of the code and its dual, and was originally introduced to classify finite projective planes. The hull plays an important role in determining the complexity of algorithms for checking permutation equivalence of two linear codes and computing the automorphism group of a linear code. It has been shown that these algorithms are very effective in general if the size of the hull is small. The objective of this paper is to present some sufficient and necessary conditions that linear codes and cyclic codes have one-dimensional hull. It is shown that there are no such binary or ternary cyclic codes. Based on these characterizations, some constructions of linear codes with one-dimensional hull were given by employing quadratic number fields, partial difference sets, and difference sets. We also construct cyclic codes with one-dimensional hull. Some optimal codes with one-dimensional hull are obtained. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
7. The Subfield Codes of Some [ q + 1, 2, q ] MDS Codes.
- Author
-
Heng, Ziling and Ding, Cunsheng
- Subjects
FINITE fields ,HAMMING weight ,LINEAR codes - Abstract
Recently, subfield codes of geometric codes over large finite fields ${\mathrm {GF}}(q)$ with dimension 3 and 4 were studied and distance-optimal subfield codes over ${\mathrm {GF}}(p)$ were obtained, where $q=p^{m}$. The key idea for obtaining very good subfield codes over small fields is to choose very good linear codes over an extension field with small dimension. This paper first presents a general construction of $[q+1, 2, q]$ MDS codes over ${\mathrm {GF}}(q)$ , and then studies the subfield codes over ${\mathrm {GF}}(p)$ of some of the $[q+1, 2,q]$ MDS codes over ${\mathrm {GF}}(q)$. Two families of dimension-optimal codes over ${\mathrm {GF}}(p)$ are obtained, and several families of nearly optimal codes over ${\mathrm {GF}}(p)$ are produced. Several open problems are also proposed in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
8. Shortened Linear Codes From APN and PN Functions.
- Author
-
Xiang, Can, Tang, Chunming, and Ding, Cunsheng
- Subjects
LINEAR codes ,BINARY codes ,CODING theory ,REED-Muller codes ,GENERATING functions ,NONLINEAR functions - Abstract
Linear codes generated by component functions of perfect nonlinear (PN for short) and almost perfect nonlinear (APN for short) functions and the first-order Reed-Muller codes have been an object of intensive study in coding theory. The objective of this paper is to investigate some binary shortened codes of two families of linear codes from APN functions and some $p$ -ary shortened codes associated with PN functions. The weight distributions of these shortened codes and the parameters of their duals are determined. The parameters of these binary codes and $p$ -ary codes are flexible. Many of the codes presented in this paper are optimal or almost optimal. The results of this paper show that the shortening technique is very promising for constructing good codes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
9. Two Families of Optimal Linear Codes and Their Subfield Codes.
- Author
-
Heng, Ziling, Wang, Qiuyan, and Ding, Cunsheng
- Subjects
LINEAR codes ,CYCLIC codes ,FAMILIES - Abstract
In this paper, a family of $[{q}^{2}-1, 4, {q}^{2}-{q}-2]$ cyclic codes over ${\mathbb F}_{{q}}$ meeting the Griesmer bound is presented. Their duals are $[{q}^{2}-1,{q}^{2}-5,4]$ almost MDS codes and are optimal with respect to the sphere-packing bound. The ${q}_{0}$ -ary subfield codes of this family of cyclic codes are also investigated, where ${q}_{0}$ is any prime power such that q is power of ${q}_{0}$. Some of the subfield codes are optimal and some have the best known parameters. It is shown that the subfield codes are equivalent to a family of primitive BCH codes and thus the parameters of the BCH codes are solved. The duals of the subfield codes are also optimal with respect to the sphere-packing bound. A family of $[{q}^{2}, 4, {q}^{2}-{q}-1]$ linear codes over ${\mathbb F}_{{q}}$ meeting the Griesmer bound is presented. Their duals are $[{q}^{2},{q}^{2}-4,4]$ almost MDS codes and are optimal with respect to the sphere-packing bound. The ${q}_{0}$ -ary subfield codes of this family of linear codes are also investigated, where ${q}_{0}$ is any prime power such that q is power of ${q}_{0}$. Five infinite families of 2-designs are also constructed with three families of linear codes of this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
10. A Construction of Optimal Frequency Hopping Sequence Set via Combination of Multiplicative and Additive Groups of Finite Fields.
- Author
-
Niu, Xianhua, Xing, Chaoping, Liu, Yang, and Zhou, Liang
- Subjects
FINITE groups ,FINITE fields ,SPREAD spectrum communications ,CONSTRUCTION - Abstract
In literatures, there are various constructions of frequency hopping sequence (FHS for short) sets with good Hamming correlations. Some papers employed only multiplicative groups of finite fields to construct FHS sets, while other papers implicitly used only additive groups of finite fields for construction of FHS sets. In this paper, we make use of both multiplicative and additive groups of finite fields simultaneously to present a construction of optimal FHS sets. The construction provides a new family of optimal $\left ({{q}^{{m}}-1,\frac {{q}^{{m}-{t}}-1}{{r}},{\it{ rq}}^{{t}};\frac {{q}^{{m}-{t}}-1}{{r}}+1}\right)$ frequency hopping sequence sets archiving the Peng-Fan bound. Thus, some FHS sets constructed in literatures using either multiplicative groups or additive groups of finite fields are included in our family. In addition, some other FHS sets can be obtained via the well-known recursive construction through one-coincidence sequence set. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
11. The Capacity Achieving Distribution for the Amplitude Constrained Additive Gaussian Channel: An Upper Bound on the Number of Mass Points.
- Author
-
Dytso, Alex, Yagli, Semih, Poor, H. Vincent, and Shamai Shitz, Shlomo
- Subjects
GAUSSIAN channels ,PROBABILITY density function ,RANDOM noise theory ,CHANNEL coding ,RANDOM variables - Abstract
This paper studies an $n$ -dimensional additive Gaussian noise channel with a peak-power-constrained input. It is well known that, in this case, when $n=1$ the capacity-achieving input distribution is discrete with finitely many mass points, and when $n>1$ the capacity-achieving input distribution is supported on finitely many concentric shells. However, due to the previous proof technique, not even a bound on the exact number of mass points/shells was available. This paper provides an alternative proof of the finiteness of the number mass points/shells of the capacity-achieving input distribution while producing the first firm bounds on the number of mass points and shells, paving an alternative way for approaching many such problems. The first main result of this paper is an order tight implicit bound which shows that the number of mass points in the capacity-achieving input distribution is within a factor of two from the number of zeros of the downward shifted capacity-achieving output probability density function. Next, this implicit bound is utilized to provide a first firm upper on the support size of optimal input distribution, an $O(\mathsf {A}^{2})$ upper bound where $\mathsf {A}$ denotes the constraint on the input amplitude. The second main result of this paper generalizes the first one to the case when $n>1$ , showing that, for each and every dimension $n\ge 1$ , the number of shells that the optimal input distribution contains is $O(\mathsf {A}^{2})$. Finally, the third main result of this paper reconsiders the case $n=1$ with an additional average power constraint, demonstrating a similar $O(\mathsf {A}^{2})$ bound. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
12. Interference as Noise: Friend or Foe?
- Author
-
Dytso, Alex, Tuninetti, Daniela, and Devroye, Natasha
- Subjects
INTERFERENCE channels (Telecommunications) ,LEBESGUE measure ,OPERATOR theory ,APPROXIMATION theory ,CONTROL theory (Engineering) - Abstract
This paper shows that for the two-user Gaussian interference channel (G-IC) treating interference as noise without time sharing (TINnoTS) achieves the closure of the capacity region to within either a constant gap, or to within a gap of the order O(\log (\ln (\min ( \mathsf S, \mathsf I))/\gamma )) up to a set of Lebesgue measure \gamma \in (0,1] , where {\mathsf {S}} is the largest signal to noise ratio on the direct links and {\mathsf {I}}$ is the largest interference to noise ratio on the cross links. As a consequence, TINnoTS is optimal from a generalized degrees of freedom (gDoF) perspective for all channel gains except for a subset of zero measure. TINnoTS with Gaussian inputs is known to be optimal within 1/2 bit for a subset of the weak interference regime. Rather surprisingly, this paper shows that TINnoTS is gDoF optimal in all parameter regimes, even in the strong and very strong interference regimes where joint decoding of Gaussian inputs is optimal. For approximate optimality of TINnoTS in all parameter regimes, it is critical to use non-Gaussian inputs. This paper thus proposes to use mixed inputs as channel inputs for the G-IC, where a mixed input is the sum of a discrete and a Gaussian random variable. Interestingly, with reference to the Han–Kobayashi achievable scheme, the discrete part of a mixed input is shown to effectively behave as a common message in the sense that, although treated as noise, its effect on the achievable rate region is as if it were jointly decoded together with the desired messages at a non-intended receiver. The practical implication is that a discrete interfering input is a friend, while an Gaussian interfering input is in general a foe. This paper also discusses other practical implications of the proposed TINnoTS scheme with mixed inputs. Since TINnoTS requires neither explicit joint decoding nor time sharing, the results of this paper are applicable to a variety of oblivious or asynchronous channels, such as the block asynchronous G-IC (which is not an information stable channel) and the G-IC with partial codebook knowledge at one or more receivers. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
13. A Class of Two-Weight and Three-Weight Codes and Their Applications in Secret Sharing.
- Author
-
Ding, Kelan and Ding, Cunsheng
- Subjects
LINEAR codes ,DISTRIBUTION (Probability theory) ,HAMMING weight ,FINITE fields ,GAUSSIAN distribution ,GAUSSIAN sums ,CODING theory - Abstract
In this paper, a class of two-weight and three-weight linear codes over \mathrm GF(p) is constructed, and their application in secret sharing is investigated. Some of the linear codes obtained are optimal in the sense that they meet certain bounds on linear codes. These codes have applications also in authentication codes, association schemes, and strongly regular graphs, in addition to their applications in consumer electronics, communication and data storage systems. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
14. Linear Programming Bounds for Entanglement-Assisted Quantum Error-Correcting Codes by Split Weight Enumerators.
- Author
-
Lai, Ching-Yi and Ashikhmin, Alexei
- Subjects
LINEAR programming ,CODING theory ,QUANTUM states ,MATHEMATICAL bounds ,HAMMING codes - Abstract
Linear programming approaches have been applied to derive upper bounds on the size of classical and quantum codes. In this paper, we derive similar results for general quantum codes with entanglement assistance by considering a type of split weight enumerator. After deriving the MacWilliams identities for these enumerators, we are able to prove algebraic linear programming bounds, such as the Singleton bound, the Hamming bound, and the first linear programming bound. Our Singleton bound and Hamming bound are more general than the previous bounds for entanglement-assisted quantum stabilizer codes. In addition, we show that the first linear programming bound improves the Hamming bound when the relative distance is sufficiently large. On the other hand, we obtain additional constraints on the size of Pauli subgroups for quantum codes, which allow us to improve the linear programming bounds on the minimum distance of quantum codes of small length. In particular, we show that there is no $[[27, 15, 5]]$ or $[[28, 14, 6]]$ stabilizer code. We also discuss the existence of some entanglement-assisted quantum stabilizer codes with maximal entanglement. As a result, the upper and lower bounds on the minimum distance of maximal-entanglement quantum stabilizer codes with length up to 20 are significantly improved. [ABSTRACT FROM PUBLISHER]
- Published
- 2018
- Full Text
- View/download PDF
15. Multigroup Testing for Items With Real-Valued Status Under Standard Arithmetic.
- Author
-
Chang, Fei-Huang, Chen, Hong-Bin, Guo, Jun-Yi, and Huang, Yu-Pei
- Subjects
GENOTYPES ,MATRICES (Mathematics) ,GROUP testing ,POOLINGS of interest ,MOLECULAR biology - Abstract
Motivated by applications in molecular biology and genotyping, this paper proposes a novel model of group testing for identifying items with real-valued status using nonbinary pooling designs under standard arithmetic observation. The purpose is to learn more information of each item to be tested rather than identify only which ones are defectives as was done in conventional group testing. This paper provides several efficiently decodable nonadaptive strategies for the considered problem. The major tool is a new structure called $q$ -ary additive $(w,d)$ -disjunct matrix, which is related to known structures: 1) the conventional disjunct matrix by Kautz and Singleton 1964 and 2) the SQ-disjunct matrix by Emad and Milenkovic 2012. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
16. A Class of Narrow-Sense BCH Codes.
- Author
-
Zhu, Shixin, Sun, Zhonghua, and Kai, Xiaoshan
- Subjects
TWO-dimensional bar codes ,CYCLIC codes ,LINEAR codes ,TELECOMMUNICATION satellites ,DVD-Video discs ,CIPHERS - Abstract
BCH codes are an important class of cyclic codes which have applications in satellite communications, DVDs, disk drives, and two-dimensional bar codes. Although BCH codes have been widely studied, their parameters are known for only a few special classes. Recently, Ding et al. made some new progress in BCH codes. However, we still have very limited knowledge on the dimension of BCH codes, not to mention the weight distribution of BCH codes. In this paper, we generalize the results on BCH codes from several previous papers. 1) The dimension of narrow-sense BCH codes of length $((q^{m}-1)/{\lambda })$ with designed distance $2\leq \delta \leq (({q^{\lceil (m+1)/2 \rceil }-1})/(\lambda)+1)$ is settled, where $\lambda $ is any factor of $(q-1)$. 2) The weight distributions of two classes of narrow-sense BCH codes of length $(({q^{m}-1})/2)$ with designed distance $\delta =(({(q-1)q^{m-1}-q^{\lfloor (m-1)/2\rfloor }-1})/2)$ and $\delta =(({(q-1)q^{m-1}-q^{\lfloor (m+1)/2\rfloor }-1})/2)$ are determined. 3) The weight distribution of a class of BCH codes of length $((q^{m}-1)/({q-1}))$ is determined. In particular, a subclass of this class of BCH codes is optimal with respect to the Griesmer bound. Some optimal linear codes obtained from this class of BCH codes are characterized. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
17. Superadditivity in Trade-Off Capacities of Quantum Channels.
- Author
-
Zhu, Elton Yechao, Zhuang, Quntao, Hsieh, Min-Hsiu, and Shor, Peter W.
- Subjects
CHANNEL capacity (Telecommunications) ,SUPERADDITIVITY ,QUANTUM communication ,QUANTUM entanglement ,SWITCHING theory - Abstract
In this paper, we investigate the additivity phenomenon in the quantum dynamic capacity region of a quantum channel for trading the resources of classical communication, quantum communication, and entanglement. Understanding such an additivity property is important if we want to optimally use a quantum channel for general communication purposes. However, in a lot of cases, the channel one will be using only has an additive single or double resource capacity region, and it is largely unknown if this could lead to a strictly superadditive double or triple resource capacity region, respectively. For example, if a channel has additive classical and quantum capacities, can the classical-quantum capacity region be strictly superadditive? In this paper, we answer such questions affirmatively. We give proof-of-principle requirements for these channels to exist. In most cases, we can provide an explicit construction of these quantum channels. The existence of these superadditive phenomena is surprising in contrast to the result that the additivity of both classical-entanglement and classical-quantum capacity regions imply the additivity of the triple resource capacity region for a given channel. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
18. On $Z_p Z_{p^k}$ -Additive Codes and Their Duality.
- Author
-
Shi, Minjia, Wu, Rongsheng, and Krotov, Denis S.
- Subjects
CIPHERS ,DUALITY theory (Mathematics) ,LINEAR codes ,IMAGE encryption ,INFORMATION theory - Abstract
In this paper, two different Gray-like maps from $Z_{p}^\alpha \times Z_{p^{k}}^\beta $ , where $p$ is prime, to $Z_{p}^{n}$ , $n={\alpha +\beta p^{k-1}}$ , denoted by $\varphi $ and $\Phi $ , respectively, are presented. We have determined the connection between the weight enumerators among the image codes under these two mappings. We show that if $C$ is a $Z_{p} Z_{p^{k}}$ -additive code, and $C^\bot $ is its dual, then the weight enumerators of the image $p$ -ary codes $\varphi (C)$ and $\Phi (C^\bot)$ are formally dual. This is a partial generalization of [D. S. Krotov, On $Z_{2^{k}}$ -dual binary codes, IEEE Transactions Information Theory 53 (2007), 1532–1537], and the result is generalized to odd characteristic $p$ and mixed alphabet. In addition, a construction of 1-perfect additive codes in the mixed $Z_{p} Z_{p^{2}}\ldots Z_{p^{k}}$ alphabet is given. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
19. Verifiably Multiplicative Secret Sharing.
- Author
-
Yoshida, Maki and Obana, Satoshi
- Subjects
ERROR probability ,DECODING algorithms ,POLYNOMIALS ,ARBITRARY constants ,GENERALIZATION - Abstract
A $d$ -multiplicative secret sharing ($d$ -MSS) scheme allows the players to multiply $d$ shared secrets without recovering the secrets by converting their shares locally into an additive sharing of the product. It has been proved that the $d$ -MSS among $n$ players is possible if and only if no $d$ unauthorized sets of players cover the whole set of players (type $Q_{d}$). Although this result implies some limitations on SS in the context of MPC, the $d$ -multiplicative property is still useful for simplifying complex tasks of MPC by computing the product of $d$ field elements directly and non-interactively without any setup. This paper aims to improve the usefulness of the $d$ -MSS by enhancing the security against malicious adversaries. First, we introduce the notion of verifiably multiplicative SS, verifiably MSS for short, which is mainly formalized for detecting malicious behaviors. Informally, an SS scheme is verifiably $d$ -multiplicative if the scheme is $d$ -multiplicative and further enables the players to locally generate a share of a proof that the summed value is correct (i.e., the product of $d$ shared secrets). Secondly, we prove that there is no error-free verifiably MSS scheme whose decoder of the proof is additive, and that by accepting an error probability that can be chosen arbitrarily, there exists a verifiably $d$ -MSS scheme realizing a given access structure if and only if the access structure is of type $Q_{d}$. In the proposed construction, each share of a proof consists of only two field elements. This result means that we can efficiently achieve the optimal resiliency of the standard $d$ -MSS even against malicious adversaries. We note that by allowing a general class of decoders that includes a linear one, there is an error-free verifiably $d$ -MSS scheme if the access structure is of type $Q_{d+1}$. Finally, we generalize the $d$ -multiplicative property to a $d$ -or-less version where the number $d'$ of multiplied secrets with $d'\leq d$ is not known in advance. We show that a $d$ -or-less MSS scheme can be constructed from any $d$ -MSS scheme of the same access structure with a constant overhead, and the feasibility of (verifiably) $d$ -MSS implies that of (verifiably) $d$ -or-less MSS. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
20. Non-Parametric Sparse Additive Auto-Regressive Network Models.
- Author
-
Zhou, Hao Henry and Raskutti, Garvesh
- Subjects
TIME series analysis ,NEURONS ,AUTOREGRESSIVE models ,NEUROSCIENCES ,LINEAR models (Communication) - Abstract
Consider a multi-variate time series ${(X_{t})}_{t=0}^{T}$ , where $X_{t} \in \mathbb {R}^{d}$ which may represent spike train responses for multiple neurons in a brain, crime event data across multiple regions, and many others. An important challenge associated with these time series models is to estimate an influence network between the $d$ variables, especially when $d$ is large, meaning we are in the high-dimensional setting. Prior work has focused on parametric vector auto-regressive models. However, parametric approaches are somewhat restrictive in practice. In this paper, we use the non-parametric sparse additive model (SpAM) framework to address this challenge. Using a combination of $\beta $ and $\phi $ -mixing properties of Markov chains and empirical process techniques for reproducing kernel Hilbert spaces (RKHSs), we provide upper bounds on mean-squared error in terms of the sparsity $s$ , the logarithm of the dimension $\log ~d$ , the number of time points $T$ , and the smoothness of the RKHSs. Our rates are sharp up to logarithm factors in many cases. We also provide numerical experiments that support our theoretical results and display the potential advantages of using our non-parametric SpAM framework for a Chicago crime data set. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
21. Coding Theorem and Converse for Abstract Channels With Time Structure and Memory.
- Author
-
Mittelbach, Martin and Jorswieck, Eduard A.
- Subjects
CODING theory ,CAPACITY theory (Mathematics) ,DISCRETE-time systems ,CHANNEL coding ,GAUSSIAN channels - Abstract
A coding theorem and converse are proved for a large-class of abstract stationary channels with time structure including the result by Kadota and Wyner (1972) on continuous-time real-valued channels as special cases. As main contribution, the coding theorem is proved for a significantly weaker condition on the channel output memory – called total ergodicity with respect to finite alphabet block-memoryless input sources – and under a crucial relaxation of the measurability requirement for the channel. These improvements are achieved by introducing a suitable characterization of information rate capacity. It is shown that the $\psi$ -mixing output memory condition used by Kadota and Wyner is quite restrictive and excludes important channel models, in particular for the class of Gaussian channels. In fact, it is proved that for Gaussian (e.g., fading or additive noise) channels, the $\psi$ -mixing condition is equivalent to finite output memory. Furthermore, it is demonstrated that the measurability requirement of Kadota and Wyner is not satisfied for relevant continuous-time channel models such as linear filters, whereas the condition used in this paper is satisfied for these models. Moreover, a weak converse is derived for all stationary channels with time structure. Intersymbol interference as well as input constraints are taken into account in a general and flexible way, including amplitude and average power constraints as special case. Formulated in rigorous mathematical terms complete, explicit, and transparent proofs are presented. As a side product a gap in the proof of Kadota and Wyner – illustrated by a counterexample – is closed by providing a corrected proof of a lemma on the monotonicity of some sequence of normalized mutual information quantities. An operational perspective is taken, and an abstract framework is established, which allows to treat discrete- and continuous-time channels with (possibly infinite input and output) memory and arbitrary alphabets simultaneously in a unified way. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
22. Index Coding With Erroneous Side Information.
- Author
-
Kim, Jae-Won and No, Jong-Seon
- Subjects
ERROR-correcting codes ,ERROR correction (Information theory) ,CODING theory ,TELECOMMUNICATION satellites ,INTERFERENCE (Telecommunication) - Abstract
In this paper, new index coding problems are studied, where each receiver has erroneous side information. Although side information is a crucial part of index coding, the existence of erroneous side information has not been considered yet. We study an index code with receivers that have erroneous side information symbols in the error-free broadcast channel, which is called an index code with side information errors (ICSIE). The encoding and decoding procedures of the ICSIE are proposed, based on the syndrome decoding. Then, we derive the bounds on the optimal codelength of the proposed index code with erroneous side information. Furthermore, we introduce a special graph for the proposed index coding problem, called a \delta s -cycle whose properties are similar to those of the cycle in the conventional index coding problem. Properties of the ICSIE are also discussed in the \delta s -cycle and clique. Finally, the proposed ICSIE is generalized to an index code for the scenario having both additive channel errors and side information errors, called a generalized error correcting index code. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
23. Communication in the Presence of a State-Aware Adversary.
- Author
-
Budkuley, Amitalok J., Dey, Bikash Kumar, and Prabhakaran, Vinod M.
- Subjects
TELECOMMUNICATION channels ,GAUSSIAN channels ,RANDOM noise theory ,RANDOMIZATION (Statistics) ,ENCODING - Abstract
We study communication systems over the state-dependent channels in the presence of a malicious state-aware jamming adversary. The channel has a memoryless state with an underlying distribution. The adversary introduces a jamming signal into the channel. The message and the entire state sequence are known non-causally to both the encoder and the adversary. This state-aware adversary may choose an arbitrary jamming vector depending on the message and the state vector. Taking an arbitrarily varying channel (AVC) approach, we consider two setups, namely, the discrete memoryless Gel’fand–Pinsker AVC and the additive white Gaussian dirty paper (DP) AVC. We determine the randomized coding capacity of both the AVCs under a maximum probability of error criterion. Similar to other randomized coding setups, we show that the capacity is the same even under the average probability of error criterion. Though the adversary can choose an arbitrary vector jamming strategy, we prove that the adversary cannot affect the rate any worse than when it employs a memoryless strategy, which depends only on the instantaneous state. Thus, the AVC capacity characterization is given in terms of the capacity of the worst memoryless channels with state, induced by the adversary employing such memoryless jamming strategies. For the DP-AVC, it is further shown that among memoryless jamming strategies, none impact the communication more than a memoryless Gaussian jamming strategy which completely disregards the knowledge of the state. Thus, the capacity of the DP-AVC equals that of a standard additive white Gaussian noise (AWGN) channel with two independent sources of AWGN, i.e., the channel noise and the jamming noise. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
24. Approximate Unitary Designs Give Rise to Quantum Channels With Super Additive Classical Holevo Capacity.
- Author
-
Nema, Aditya and Sen, Pranab
- Subjects
MONOTONIC functions ,DIFFERENTIABLE functions ,BEHAVIORAL assessment ,ADDITIVES ,QUANTUM mechanics - Abstract
In a breakthrough, Hastings showed that there exist quantum channels whose classical Holevo capacity is superadditive i.e. more classical information can be transmitted by quantum encoding strategies entangled across multiple channel uses as compared to unentangled quantum encoding strategies. Hastings’ proof used Haar random unitaries to exhibit superadditivity. In this paper we show that a unitary chosen uniformly at random from an approximate $n^{2/3}$ -design gives rise to a quantum channel with superadditive classical Holevo capacity, where $n$ is the dimension of the unitary exhibiting the Stinespring dilation of the channel superoperator. We follow the geometric functional analytic approach of Aubrun, Szarek and Werner in order to prove our result. More precisely we prove a sharp Dvoretzky-like theorem stating that, with high probability under the choice of a unitary from an approximate $t$ -design, random subspaces of large dimension make a Lipschitz function take almost constant value. Such theorems were known earlier only for Haar random unitaries. We obtain our result by appealing to Low’s technique for proving concentration of measure for an approximate $t$ -design, combined with a stratified analysis of the variational behaviour of Lipschitz functions on the unit sphere in high dimension. The stratified analysis is the main technical advance of this work. Haar random unitaries require at least $\Omega (n^{2})$ random bits in order to describe them with good precision. In contrast, there exist exact $n^{2/3}$ -designs using only $O(n^{2/3} \log n)$ random bits. Thus, our work can be viewed as a partial derandomisation of Hastings’ result, and a step towards the quest of finding an explicit quantum channel with superadditive classical Holevo capacity. Finally we also show that for any $p > 1$ , approximate unitary $n^{1.7}$ -designs give rise to channels violating subadditivity of Rényi $p$ -entropy. In addition to stratified analysis, the proof of this result uses a new technique of approximating a monotonic differentiable function defined on a closed bounded interval and its derivative by moderate degree polynomials which should be of independent interest. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
25. On Z8-Linear Hadamard Codes: Rank and Classification.
- Author
-
Fernandez-Cordoba, Cristina, Vela, Carlos, and Villanueva, Merce
- Subjects
HADAMARD codes ,LINEAR codes ,BINARY codes ,CLASSIFICATION ,ERROR correction (Information theory) ,LINEAR algebraic groups - Abstract
The Z
2 s -additive codes are subgroups of Zn 2 s , and can be seen as a generalization of linear codes over Z2 and Z4 . A Z2 s -linear Hadamard code is a binary Hadamard code which is the Gray map image of a Z2 s -additive code. It is known that either the rank or the dimension of the kernel can be used to give a complete classification for the Z4 -linear Hadamard codes. However, when s > 2, the dimension of the kernel of Z2 s -linear Hadamard codes of length 2t only provides a complete classification for some values of t and s. In this paper, the rank of these codes is computed for s = 3. Moreover, it is proved that this invariant, along with the dimension of the kernel, provides a complete classification, once t ≥ 3 is fixed. In this case, the number of nonequivalent such codes is also established. [ABSTRACT FROM AUTHOR]- Published
- 2020
- Full Text
- View/download PDF
26. Overflow Probability of Variable-Length Codes With Codeword Cost.
- Author
-
Nomura, Ryo
- Subjects
CODING theory ,PROBABILITY theory ,SOURCE code ,COST ,CHANNEL coding ,CIPHERS - Abstract
Lossless variable-length source coding with codeword cost is considered for general sources. The problem setting, where we impose on unequal costs on code symbols, is called the variable-length coding with codeword cost. In this problem, the infimum of average codeword cost have already been determined for general sources. On the other hand, the overflow probability, which is defined as the probability of codeword cost being above a threshold, have not been considered yet. In this paper, we first determine the infimum of achievable threshold in the first-order sense and the second-order sense for general sources with additive memoryless codeword cost. Then, we compute it for some special sources such as i.i.d. sources and mixed sources. A generalization of the codeword cost is also discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
27. New Constructions of Asymptotically Optimal Codebooks With Multiplicative Characters.
- Author
-
Heng, Ziling, Ding, Cunsheng, and Yue, Qin
- Subjects
CODE division multiple access ,CHARACTERS of groups ,FINITE fields ,MATHEMATICAL bounds ,ALGEBRAIC coding theory ,ALGEBRAIC codes ,MATHEMATICAL models - Abstract
In practical applications, such as direct spread code division multiple access communications, space-time codes and compressed sensing, and codebooks with small inner-product correlation are required. It is extremely difficult to construct codebooks achieving the Levenshtein bound. In this paper, two new constructions of infinitely many codebooks with multiplicative characters of finite fields are presented. These constructions produce complex codebooks asymptotically achieving the Levenshtein bound and codebooks asymptotically achieving the Welch bound. The codebooks presented in this paper have new parameters. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
28. \mathbb Z2\mathbb Z2[u] ?Cyclic and Constacyclic Codes.
- Author
-
Aydogdu, Ismail, Abualrub, Taher, and Siap, Irfan
- Subjects
CYCLIC codes ,LINEAR codes ,ORDERED algebraic structures ,MODULES (Algebra) ,MATHEMATICAL bounds - Abstract
Following the very recent studies on \mathbb Z2\mathbb Z4 -additive codes, \mathbb Z2\mathbb Z2[u] -linear codes have been introduced by Aydogdu et al. In this paper, we introduce and study the algebraic structure of cyclic, constacyclic codes and their duals over the R -module \mathbb {Z}_{2}^\alpha R^\beta where R=\mathbb {Z}_{2}+u\mathbb {Z}_{2}=\left \{{0,1,u,u+1}\right \} is the ring with four elements and u^2=0 . We determine the generating independent sets and the types and sizes of both such codes and their duals. Finally, we present a bound and an optimal family of codes attaining this bound and also give some illustrative examples of binary codes that have good parameters which are obtained from the cyclic codes in \mathbb Z_2^\alpha R^\beta . [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
29. Meta-Fibonacci Codes:Efficient Universal Coding of Natural Numbers.
- Author
-
Avila, Bruno T. and Campello De Souza, Ricardo M.
- Subjects
NATURAL numbers ,FIBONACCI sequence ,NUMBER systems ,MATHEMATICAL bounds ,DATA compression - Abstract
In this paper, we address the problem of the universal coding of natural numbers. A new numeration system is introduced, which is based on variable- $r$ meta-Fibonacci sequences and it is a generalization of the Zeckendorf numeration system. This new numeration system is used to construct binary, prefix-free, uniquely decodable universal codes called meta-Fibonacci codes. The main advantage of these codes is that they are parametrized by a sequence of numbers, the sequence o. By controlling the growth of the values of this sequence, we can control the length of the code word. This means that we can provide a general framework for building efficient universal coders for natural numbers. Such framework is applied to the upper bounds of the code word length defined by Leung-Yan-Cheong and Cover (1978), Levenshtein (1968), and Ahlswede (1997). There is no other code meeting these bounds. In each case, we build meta-Fibonacci codes and demonstrate that the upper bound of their code word length is satisfied up to an additive constant, thereby solving these open problems. The framework may be applied to other upper bounds that satisfy Kraft inequality. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
30. Distributed Structure: Joint Expurgation for the Multiple-Access Channel.
- Author
-
Haim, Eli, Kochman, Yuval, and Erez, Uri
- Subjects
ERROR probability ,ERROR-correcting codes ,INFORMATION filtering ,LINEAR codes ,MULTIPLE access protocols (Computer network protocols) - Abstract
In this paper, we obtain an improved lower bound on the error exponent of the memoryless multiple-access channel via the use of linear codes, thus demonstrating that structure can be beneficial even when capacity may be achieved via random codes. We show that if the multiple-access channel is additive over a finite field, then any error probability, and hence any error exponent, achievable by a linear code for the associated single-user channel, is also achievable for the multiple-access channel. In particular, linear codes allow to attain joint expurgation, and hence, attain the single-user expurgated exponent of the single-user channel, whenever the latter is achieved by a uniform distribution. Thus, for additive channels, at low rates, where expurgation is needed, our approach strictly improves performance over previous results, where expurgation was used for at most one of the users. Even when the multiple-access channel is not additive, it may be transformed into such a channel. While the transformation is information-lossy, we show that the distributed structure gain in some “nearly additive” cases outweighs the loss. Finally, we apply a similar approach to the Gaussian multiple-access channel. While we believe that due to the power constraints, it is impossible to attain the single-user error exponent, we do obtain an improvement over the best known achievable error exponent, given by Gallager, for certain parameters. This is accomplished using a nested lattice triplet with judiciously chosen parameters. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
31. Network Simplification in Half-Duplex: Building on Submodularity.
- Author
-
Ezzeldin, Yahya H., Cardone, Martina, Fragouli, Christina, and Tuninetti, Daniela
- Subjects
SUBMODULAR functions ,MODULAR construction ,DIAMONDS ,INTELLIGENT buildings ,APPROXIMATION algorithms - Abstract
This paper explores the network simplification problem in the context of Gaussian half-duplex diamond networks. Specifically, given an N-relay diamond network, this problem seeks to derive fundamental guarantees on the capacity of the best N-relay subnetwork, as a function of the full network capacity. Simplification guarantees are presented in terms of a particular approximate capacity, termed Independent-Gaussian (IG) approximate capacity, that characterizes the network capacity to within an additive gap, which is independent of the channel coefficients and operating SNR. The main focus of this work is when k = N-1 relays are selected out of N relays in a diamond network. First, a simple algorithm is proposed which selects all relays except the one with the minimum IG approximate half-duplex capacity. It is shown that the selected (N-1) -relay subnetwork has an IG approximate half-duplex capacity that is at least 1/2 of the IG approximate half-duplex capacity of the full network and that for the proposed algorithm, this guarantee is tight. Furthermore, this work proves the following tight fundamental guarantee: there always exists a subnetwork of k = N-1 relays that have an IG approximate half-duplex capacity that is at least equal to (N-1)/N of the IG approximate half-duplex capacity of the full network. Finally, these results are extended to derive lower bounds on the fraction guarantee when k ∈ [1:N] relays are selected. The key steps in the proofs lie in the derivation of properties of submodular functions, which provide a combinatorial handle on the network simplification problem for Gaussian half-duplex diamond networks. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
32. Symmetric Private Information Retrieval from MDS Coded Distributed Storage With Non-Colluding and Colluding Servers.
- Author
-
Wang, Qiwen and Skoglund, Mikael
- Subjects
INFORMATION retrieval ,STORAGE ,FILES (Records) ,LINEAR network coding - Abstract
A user wants to retrieve a file from a database without revealing the identity of the file retrieved to the operator of the database (server), which is known as the problem of private information retrieval (PIR). If it is further required that the user obtains no information about the other files in the database, the concept of symmetric PIR (SPIR) is introduced to guarantee privacy for both parties. For SPIR, the server(s) need to access some randomness independent of the database, to protect the content of undesired files from the user. The information-theoretic capacity of SPIR is defined as the maximum number of information bits of the desired file retrieved per downloaded bit. In this paper, the problem of SPIR is studied for a distributed storage system with $N$ servers (nodes), where all data (including the files and the randomness) are stored in a distributed way. Specifically, the files are stored by an $(N,K_{C})$ -MDS storage code. The randomness is distributedly stored such that any $K_{C}$ servers store independent randomness information. We consider two scenarios regarding to the ability of the storage nodes to cooperate. In the first scenario considered, the storage nodes do not communicate or collude. It is shown that the SPIR capacity for MDS-coded storage (hence called MDS-SPIR) is $1-\frac {K_{C}}{N}$ , when the amount of the total randomness of distributed nodes (unavailable at the user) is at least $\frac {K_{C}}{N - K_{\vphantom {R_{l}}C}}$ times the file size. Otherwise, the MDS-SPIR capacity equals zero. The second scenario considered is the $T$ -colluding SPIR problem (hence called TSPIR). Specifically, any $T$ out of $N$ servers may collude, that is, they may communicate their interactions with the user to guess the identity of the requested file. In the special case with $K_{C}=1$ , i.e., the database is replicated at each node, the capacity of TSPIR is shown to be $1-\frac {T}{N}$ , with the ratio of the total randomness size relative to the file size be at least $\frac {T}{\vphantom {R_{l}}N - T}$. For TSPIR with MDS-coded storage (called MDS-TSPIR for short), when restricted to schemes with additive randomness where the servers add the randomness to the answers regardless of the queries received, the capacity is proved to equal $1-\frac {K_{C} + T - 1}{N}$ , with total randomness at least $\frac {K_{C} + T - 1}{N - K_{\vphantom {R_{l}}C} - T + 1}$ times the file size. The MDS-TSPIR capacity for general schemes remains an open problem. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
33. Improved Upper Bounds and Structural Results on the Capacity of the Discrete-Time Poisson Channel.
- Author
-
Cheraghchi, Mahdi and Ribeiro, Joao
- Subjects
POISSON distribution ,RANDOM variables ,LOGICAL prediction - Abstract
New capacity upper bounds are presented for the discrete-time Poisson channel with no dark current and an average-power constraint. These bounds are a consequence of techniques developed for the seemingly unrelated problem of upper bounding the capacity of binary deletion and repetition channels. Previously, the best known capacity upper bound in the regime where the average-power constraint does not approach zero was due to Martinez (JOSA B, 2007), which is re-derived as a special case of the framework developed in this paper. Furthermore, this framework is carefully instantiated in order to obtain a closed-form bound that improves the result of Martinez everywhere. Finally, capacity-achieving distributions for the discrete-time Poisson channel are studied under an average-power constraint and/or a peak-power constraint and arbitrary dark current. In particular, it is shown that the support of the capacity-achieving distribution under an average-power constraint must only be countably infinite. This settles a conjecture of Shamai (IEE Proceedings I, 1990) in the affirmative. Previously, it was only known that the support must be an unbounded set. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
34. Quantum Query Complexity of Entropy Estimation.
- Author
-
Li, Tongyang and Wu, Xiaodi
- Subjects
QUANTUM mechanics ,QUANTUM information theory ,DECODING algorithms ,INFORMATION theory ,DATA compression - Abstract
Estimation of Shannon and Rényi entropies of unknown discrete distributions is a fundamental problem in statistical property testing. In this paper, we give the first quantum algorithms for estimating $\alpha $ -Rényi entropies (Shannon entropy being 1-Rényi entropy). In particular, we demonstrate a quadratic quantum speedup for Shannon entropy estimation and a generic quantum speedup for $\alpha $ -Rényi entropy estimation for all $\alpha \geq 0$ values, including tight bounds for the Shannon entropy, the Hartley entropy ($\alpha =0$), and the collision entropy ($\alpha =2$). We also provide quantum upper bounds for estimating min-entropy ($\alpha =+\infty $) as well as the Kullback–Leibler divergence. We complement our results with quantum lower bounds on $\alpha $ -Rényi entropy estimation for all $\alpha \geq 0$ values. Our approach is inspired by the pioneering work of Bravyi, Harrow, and Hassidim (BHH); however, with many new technical ingredients: 1) we improve the error dependence of the BHH framework by a fine-tuned error analysis together with Montanaro’s approach to estimating the expected output of quantum subroutines for $\alpha =0,1$ ; 2) we develop a procedure, similar to cooling schedules in simulated annealing, for general $\alpha \geq 0$ , and 3) in the cases of integer $\alpha \geq 2$ and $\alpha =+\infty $ , we reduce the entropy estimation problem to the $\alpha $ -distinctness and $\lceil \log n\rceil $ -distinctness problems, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
35. Decoding Reed–Solomon Skew-Differential Codes.
- Author
-
Gomez-Torrecillas, Jose, Navarro, Gabriel, and Sanchez-Hernandez, Jose Patricio
- Subjects
REED-Solomon codes ,LINEAR codes ,NONCOMMUTATIVE rings ,DECODING algorithms ,PARITY-check matrix ,LINEAR operators ,POLYNOMIAL rings - Abstract
A large class of MDS linear codes is constructed. These codes are endowed with an efficient decoding algorithm. Both the definition of the codes and the design of their decoding algorithm only require from Linear Algebra methods, making them fully accessible for everyone. Thus, the first part of the paper develops a direct presentation of the codes by means of parity-check matrices, and the decoding algorithm rests upon matrix and linear maps manipulations. The somewhat more sophisticated mathematical context (non-commutative rings) needed for the proof of the correctness of the decoding algorithm is postponed to the second part. A final section locates the Reed-Solomon skew-differential codes introduced here within the general context of codes defined by means of skew polynomial rings. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
36. The Two-Modular Fourier Transform of Binary Functions.
- Author
-
Hong, Yi, Viterbo, Emanuele, and Belfiore, Jean-Claude
- Subjects
CODING theory ,BROADCAST data systems ,MULTIPLEXING ,LINEAR network coding ,BROADCAST channels ,SIGNAL theory ,INFORMATION theory ,TELECOMMUNICATION channels - Abstract
In this paper, we provide a solution to the open problem of computing the Fourier transform of a binary function defined over n -bit vectors taking m -bit vector values. In particular, we introduce the two-modular Fourier transform (TMFT) of a binary function f:G\rightarrow \mathcal R , where G = (\mathbb F2^{n},+) is the group of n bit vectors with bitwise modulo two addition +, and {\mathcal{ R}} is a finite commutative ring of characteristic 2. Using the specific group structure of G and a sequence of nested subgroups of G , we define the fast TMFT and its inverse. Since the image {\mathcal{ R}} of the binary functions is a ring, we can define the convolution between two functions f:G\rightarrow {\mathcal{ R}}$ . We then provide the TMFT properties, including the convolution theorem, which can be used to efficiently compute convolutions. Finally, we derive the complexity of the fast TMFT and the inverse fast TMFT. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
37. Matched Metrics and Channels.
- Author
-
Firer, Marcelo and Walker, Judy L.
- Subjects
MAXIMUM likelihood decoding ,EUCLIDEAN distance ,CHANNEL coding ,BINARY codes ,NEAREST neighbor analysis (Statistics) - Abstract
The most common decision criteria for decoding are maximum likelihood decoding and nearest neighbor decoding. It is well known that maximum likelihood decoding coincides with nearest neighbor decoding with respect to the Hamming metric on the binary symmetric channel. In this paper, we study channels and metrics for which those two criteria do and do not coincide for general codes. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
38. On the Capacity Enlargement of Gaussian Broadcast Channels With Passive Noisy Feedback.
- Author
-
Ravi, Aditya Narayan, Pillai, Sibi Raj B., Prabhakaran, Vinod M., and Wigger, Michele
- Subjects
GAUSSIAN channels ,BROADCAST channels ,RANDOM noise theory ,GAUSSIAN processes ,CHANNEL coding ,PSYCHOLOGICAL feedback - Abstract
It is well known that the capacity region of an average transmit power constrained Gaussian Broadcast Channel (GBC) with independent noise realizations at the receivers is enlarged by the presence of causal noiseless feedback. When the noise variances at the receivers are identical, even passive feedback via independent memoryless Gaussian links can lead to a capacity region enlargement. The last fact remains true even when the feedback noise variance is very high, and available only from one of the receivers. While such capacity enlargements are feasible for several other feedback models in the Gaussian BC setting, it is also known that feedback does not change the capacity region for physically degraded broadcast channels. In this paper, we consider a two user GBC with independent noise realizations at the receivers, where the feedback links from the receivers are corrupted by independent additive Gaussian noise processes. We investigate the set of four noise variances, two forward and two feedback, for which no capacity enlargement is possible. A sharp characterization of this region is derived, i.e., any quadruple outside the presented region will lead to a capacity enlargement, whereas quadruples inside will leave the capacity region unchanged. Our results lead to the conclusion that when the forward noise variances are different, too noisy a feedback from one of the receivers alone is not always beneficial for enlarging the capacity region, be it from the stronger user or the weaker one, in sharp contrast to the case of equal forward noise variances. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
39. Three New Constructions of Asymptotically Optimal Periodic Quasi-Complementary Sequence Sets With Small Alphabet Sizes.
- Author
-
Luo, Gaojun, Cao, Xiwang, Shi, Minjia, and Helleseth, Tor
- Subjects
HADAMARD codes ,CODE division multiple access ,FINITE fields - Abstract
Quasi-complementary sequence sets (QCSSs) play an important role in multi-carrier code-division multiple-access (MC-CDMA) systems. They can support more users than perfect complementary sequence sets in MC-CDMA systems. It is desirable to design QCSSs with good parameters that are a trade-off of large set size, small periodic maximum magnitude correlation and small alphabet size. The main results are to construct new infinite families of QCSSs that all have small alphabet size and asymptotically optimal periodic maximum magnitude correlation. In this paper, we propose three new constructions of QCSSs using additive characters over finite fields. Notably, these QCSSs have new parameters and small alphabet sizes. Using the properties of characters and character sums, we determine their maximum periodic correlation magnitudes and prove that these QCSSs are asymptotically optimal with respect to the lower bound. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
40. Efficient and Compact Representations of Prefix Codes.
- Author
-
Gagie, Travis, Navarro, Gonzalo, Nekrich, Yakov, and Ordonez, Alberto
- Subjects
PREFIX codes (Coding system) ,DECODING algorithms ,RANDOM access memory ,HUFFMAN codes ,DATA compression - Abstract
Most of the attention in statistical compression is given to the space used by the compressed sequence, a problem completely solved with optimal prefix codes. However, in many applications, the storage space used to represent the prefix code itself can be an issue. In this paper, we introduce and compare several techniques to store prefix codes. Let N be the sequence length and n be the alphabet size. Then, a naive storage of an optimal prefix code uses \mathcal O \hspace -.5ex \left ( n\log n \right ) bits. Our first technique shows how to use \mathcal O \hspace -.5ex \left ( n\log \log (N/n) \right ) bits to store the optimal prefix code. Then, we introduce an approximate technique that, for any 0<\epsilon <1/2 , takes {\mathcal {O} \hspace {-.5ex} \left ({ {n \log \log (1 / \epsilon )} }\right )} bits to store a prefix code with an average codeword length within an additive \epsilon of the minimum. Finally, a second approximation takes, for any constant c > 1 , \vphantom {\sum ^{R^{R}}}\mathcal {O}(n^{1 / c} \log n) bits to store a prefix code with an average codeword length at most c$ times the minimum. In all cases, our data structures allow encoding and decoding of any symbol in {\mathcal {O} \hspace {-.5ex} \left ({ {1} }\right )} time. We experimentally compare our new techniques with the state of the art, showing that we achieve sixfold-to-eightfold space reductions, at the price of a slower encoding (2.5–8 times slower) and decoding (12–24 times slower). The approximations further reduce this space and improve the time significantly, up to recovering the speed of classical implementations, for a moderate penalty in the average code length. As a byproduct, we compare various heuristic, approximate, and optimal algorithms to generate length-restricted codes, showing that the optimal ones are clearly superior and practical enough to be implemented. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
41. Optimal Cyclic Codes With Generalized Niho-Type Zeros and the Weight Distribution.
- Author
-
Xiong, Maosheng and Li, Nian
- Subjects
CYCLIC codes ,HAMMING weight ,LINEAR codes ,POLYNOMIALS ,VANDERMONDE matrices ,EMAIL systems - Abstract
In this paper, we extend two earlier works further in two directions and compute the weight distribution of these cyclic codes under more relaxed conditions. It is interesting to note that many cyclic codes in the family are optimal and have only a few non-zero weights. Besides using similar ideas, we carry out some subtle manipulation of certain exponential sums. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
42. Achieving the Capacity of the $N$ -Relay Gaussian Diamond Network Within log $N$ Bits.
- Author
-
Chern, Bobbie and Ozgur, Ayfer
- Subjects
BIT rate ,WIRELESS communications ,BROADCAST channels ,CHANNEL capacity (Telecommunications) ,GAUSSIAN processes ,SIGNAL-to-noise ratio ,ANTENNAS (Electronics) ,APPROXIMATION theory - Abstract
We consider the $N$ -relay Gaussian diamond network where a source node communicates to a destination node via $N$ parallel relays through a cascade of a Gaussian broadcast (BC) and a multiple access (MAC) channel. Introduced in 2000 by Schein and Gallager, the capacity of this relay network is unknown in general. The best currently available capacity approximation, independent of the coefficients and the SNRs of the constituent channels, is within an additive gap of $1.3 N$ bits, which follows from the recent capacity approximations for general Gaussian relay networks with arbitrary topology. In this paper, we approximate the capacity of this network within 2 log $N$ bits. We show that two strategies can be used to achieve the information-theoretic cut-set upper bound on the capacity of the network up to an additive gap of $O(\log N)$ bits, independent of the channel configurations and the SNRs. The first of these strategies is simple partial decode-and-forward. Here, the source node uses a superposition codebook to broadcast independent messages to the relays at appropriately chosen rates; each relay decodes its intended message and then forwards it to the destination over the MAC channel. A similar performance can be also achieved with compress-and-forward type strategies (such as quantize-map-and-forward and noisy network coding) that provide the $1.3 N$ -bit approximation for general Gaussian networks, but only if the relays quantize their observed signals at a resolution inversely proportional to the number of relay nodes $N$ . This suggests that the rule-of-thumb to quantize the received signals at the noise level in the current literature can be highly suboptimal. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
43. On a Question of Babadi and Tarokh.
- Author
-
Xia, Jing and Xiong, Maosheng
- Subjects
RANDOM matrices ,BLOCK codes ,NUMERICAL calculations ,GOLD codes (Coding theory) ,INFORMATION theory - Abstract
In a series of remarkable papers, Babadi and Tarokh proved the randomness of matrices and product of two matrices arising from binary linear block codes with respect to the empirical spectral distribution, provided that their dual distances are sufficiently large. However, numerical experiments conducted by Babadi and Tarokh revealed that Gold codes, which have a dual distance of 5, also possess such a randomness property. Hence, the interesting question was raised as to whether or not the stringent requirement of large dual distances can be relaxed in the theorems in order to explain the mysterious randomness of Gold sequences. In this paper, we improve the results of Babadi and Tarokh on several fronts and provide an affirmative answer to this question. [ABSTRACT FROM PUBLISHER]
- Published
- 2014
- Full Text
- View/download PDF
44. Two Constructions of Asymptotically Optimal Codebooks via the Hyper Eisenstein Sum.
- Author
-
Luo, Gaojun and Cao, Xiwang
- Subjects
EISENSTEIN series ,ASYMPTOTIC efficiencies ,FOURIER transforms ,CODE division multiple access ,ABELIAN groups ,STEINER systems - Abstract
Codebooks with low-coherence have wide utilization in many fields, such as direct spread code division multiple access communications, compressed sensing and so on. There are two major ingredients in this paper. The first is to present a new character sum, the hyper Eisenstein sum and study the properties of this character sum. As an application, the second ingredient is to propose two constructions of codebooks with the hyper Eisenstein sum. The codebooks generated by these constructions asymptotically meet the Welch bound. The parameters of these codebooks are new. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
45. Equivalence of Additive-Combinatorial Linear Inequalities for Shannon Entropy and Differential Entropy.
- Author
-
Makkuva, Ashok Vardhan and Wu, Yihong
- Subjects
DIFFERENTIAL entropy ,LINEAR matrix inequalities ,MATHEMATICAL equivalence ,SIGNAL quantization ,ABELIAN groups ,RANDOM variables - Abstract
This paper addresses the correspondence between linear inequalities for Shannon entropy and differential entropy for sums of independent group-valued random variables. We show that any balanced (with the sum of coefficients being zero) linear inequality for Shannon entropy holds if and only if its differential entropy counterpart also holds; moreover, any linear inequality for differential entropy must be balanced. In particular, our result shows that recently proved differential entropy inequalities by Kontoyiannis and Madiman can be deduced from their discrete counterparts due to Tao in a unified manner. Generalizations to certain abelian groups are also obtained. Our proof of extending inequalities for Shannon entropy to differential entropy relies on a result of Rényi which relates the Shannon entropy of a finely discretized random variable to its differential entropy and also helps in establishing that the entropy of the sum of quantized random variables is asymptotically equal to that of the quantized sum; the converse uses the asymptotics of the differential entropy of convolutions with weak additive noise. [ABSTRACT FROM PUBLISHER]
- Published
- 2018
- Full Text
- View/download PDF
46. Minimax Lower Bounds for Noisy Matrix Completion Under Sparse Factor Models.
- Author
-
Sambasivan, Abhinav V. and Haupt, Jarvis D.
- Subjects
ADDITIVE white Gaussian noise ,MATHEMATICAL bounds ,SPARSE matrices ,RANDOM noise theory ,ESTIMATION theory - Abstract
This paper examines fundamental error characteristics for a general class of matrix completion problems, where the matrix of interest is a product of two a priori unknown matrices, one of which is sparse, and the observations are noisy. Our main contributions come in the form of minimax lower bounds for the expected per-element squared error for this problem under several common noise models. Specifically, we analyze scenarios where the corruptions are characterized by additive Gaussian noise or additive heavier-tailed (Laplace) noise, Poisson-distributed observations, and highly-quantized (e.g., one bit) observations, as instances of our general result. Our results establish that the error bounds derived in (Soni et al., 2016) for complexity-regularized maximum likelihood estimators achieve, up to multiplicative constants and logarithmic factors, the minimax error rates in each of these noise scenarios, provided that the nominal number of observations is large enough, and the sparse factor has (on an average) at least one non-zero per column. [ABSTRACT FROM PUBLISHER]
- Published
- 2018
- Full Text
- View/download PDF
47. New Constructions of Optimal Locally Recoverable Codes via Good Polynomials.
- Author
-
Liu, Jian, Mesnager, Sihem, and Chen, Lusheng
- Subjects
POLYNOMIALS ,ALGEBRA ,TECHNICAL literature ,ENGINEERING standards - Abstract
In recent literature, a family of optimal linear locally recoverable codes (LRC codes) that attain the maximum possible distance (given code length, cardinality, and locality) is presented. The key ingredient for constructing such optimal linear LRC codes is the so-called $r$ -good polynomials, where r$ is equal to the locality of the LRC code. However, given a prime p$ , known constructions of r exist only for some special integers r$ , and the problem of constructing optimal LRC codes over small field for any given locality is still open. In this paper, by using function composition, we present two general methods of designing good polynomials, which lead to three new constructions of r$ -good polynomials. Such polynomials bring new constructions of optimal LRC codes. In particular, our constructed polynomials as well as the power functions yield optimal (n,k,r) for all positive integers $r$ as localities, where $q$ is near the code length $n$ . [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
48. Coded Caching Under Arbitrary Popularity Distributions.
- Author
-
Zhang, Jinbei, Lin, Xiaojun, and Wang, Xinbing
- Subjects
WIRELESS communications ,MULTIPOINT distribution service ,CODING theory ,ERROR-correcting codes ,DECODING algorithms - Abstract
Caching plays an important role in reducing the backbone traffic when serving high-volume multimedia content. Recently, a new class of coded caching schemes have received significant interest, because they can exploit coded multi-cast opportunities to further reduce backbone traffic. Without considering file popularity, prior works have characterized the fundamental performance limits of coded caching through a deterministic worst-case analysis. However, when heterogeneous file popularity is considered, there remain open questions regarding the fundamental limits of coded caching performance. In this paper, for an arbitrary popularity distribution, we first derive a new information-theoretic lower bound on the expected transmission rate of any coded caching schemes. We then show that a simple coded-caching scheme attains an expected transmission rate that is at most a constant factor away from the lower bound. Unlike other existing studies, the constant factor that we derived is independent of the popularity distribution. [ABSTRACT FROM PUBLISHER]
- Published
- 2018
- Full Text
- View/download PDF
49. Optimal Anticodes, Diameter Perfect Codes, Chains and Weights.
- Author
-
Panek, Luciano and Panek, Nayene Michele Paiao
- Subjects
METRIC spaces ,VECTOR spaces ,FINITE fields ,MAXIMUM likelihood detection ,HAMMING weight - Abstract
Let P be a partial order on [n] = 1,2, . . . , n, F
q n be the linear space of n-tuples over a finite field Fq and w be a weight on Fq . In this paper, we consider metrics on Fq n induced by chain orders P over [n] and weights w over Fq , and we determine the cardinality of all optimal anticodes and completely classify them. Moreover, we determine all diameter perfect codes for a set of relevant instances on the aforementioned metric spaces. [ABSTRACT FROM AUTHOR]- Published
- 2021
- Full Text
- View/download PDF
50. A Construction of Minimal Linear Codes From Partial Difference Sets.
- Author
-
Tao, Ran, Feng, Tao, and Li, Weicong
- Subjects
DIFFERENCE sets ,FINITE fields ,LINEAR codes ,CHARACTERISTIC functions ,BOOLEAN functions ,HAMMING weight - Abstract
In this paper, we study a class of linear codes defined by characteristic functions of certain subsets of a finite field. We derive a sufficient and necessary condition for such a code to be a minimal linear code by a character-theoretical approach. We obtain new three-weight or four-weight minimal linear codes that do not satisfy the Ashikhmin-Barg condition by using partial difference sets. We show that our construction yields minimal linear codes that do not arise from cutting vectorial blocking sets, and also discuss their applications in secret sharing schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.