36 results on '"Ashikhmin, A. A."'
Search Results
2. EXIT functions of Hadamard components in Repeat-Zigzag-Hadamard (RZH) codes with parallel decoding
- Author
-
Li, Kai, Wang, Xiaodong, and Ashikhmin, Alexei
- Subjects
Hadamard matrices -- Design and construction - Abstract
The extrinsic information transfer (EXIT) functions of Hadamard codes in the context of repeat-zigzag-Hadamard (RZH) codes with parallel decoding are investigated. EXIT functions over both the binary erasure channel (BEC) and the binary-input additive white Gaussian noise (BIAWGN) channel are derived. The application of these EXIT functions in the design of low-rate capacity-approaching irregular RZH (IRZH) codes is also considered. Using the EXIT functions, the bit error rate (BER) for a given code profile can be easily estimated and the differential evolution (DE) technique can be employed to find the optimal degree profile for given design parameters. The EXIT functions derived in this communication can serve as an effective tool for designing low-rate IRZH codes with parallel decoding in both BEC and BIAWGN channels. Index Terms--Extrinsic information transfer (EXIT) functions, Hadamard codes, irregular code design, low-rate codes.
- Published
- 2008
3. Extremal problems of information combining
- Author
-
Jiang, Yibo, Ashikhmin, Alexei, Koetter, Ralf, and Singer, Andrew C.
- Subjects
Binary-Coded Decimal -- Evaluation ,Information theory -- Research - Abstract
In this paper, we study moments of soft bits of binary-input symmetric-output channels and solve some extremal problems of the moments. We use these results to solve the extremal information combining problem. Further, we extend the information combining problem by adding a constraint on the second moment of soft bits, and find the extremal distributions for this new problem. The results for this extension problem are used to improve the prediction of convergence of the belief propagation decoding of low-density parity-check (LDPC) codes, provided that another extremal problem related to the variable nodes is solved. Index Terms--Extrinsic information transfer (EXIT) functions, information combining, low-density parity-check (LDPC) codes.
- Published
- 2008
4. Physical-Layer Security in TDD Massive MIMO
- Author
-
Yuksel Ozan Basciftci, Alexei Ashikhmin, and Can Emre Koksal
- Subjects
Pilot signal ,021110 strategic, defence & security studies ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,MIMO ,0211 other engineering and technologies ,Duplex (telecommunications) ,020206 networking & telecommunications ,Jamming ,Eavesdropping ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Library and Information Sciences ,Adversary ,Information-theoretic security ,Computer Science Applications ,Information leakage ,0202 electrical engineering, electronic engineering, information engineering ,business ,Information Systems ,Computer network - Abstract
We consider a single-cell downlink time-division duplex-based massive MIMO communication in the presence of an adversary capable of jamming and eavesdropping simultaneously. We show that the massive MIMO communication is naturally resilient to no training-phase jamming attack in which the adversary jams only the data communication and eavesdrops both the data communication and the training. Specifically, we show that the secure degrees of freedom (SDoF) attained in the presence of such an attack are identical to the maximum DoF attainable under no attack. Furthermore, we evaluate the number of base station (BS) antennas necessary in order to establish information theoretic security without even a need for Wyner encoding for a given rate of information leakage to the attacker. Next, we show that things are completely different once the adversary starts jamming the training phase. Specifically, we consider the pilot contamination attack, called training-phase jamming in which the adversary jams and eavesdrops both the training and the data communication. We show that under such an attack, the maximum achieved SDoF is identical to zero. Furthermore, the maximum achievable secure rates of users also vanish, even in the asymptotic regime in the number of the BS antennas. We finally address this attack and show that, under training-phase jamming , if the number of pilot signals is scaled in a certain way and the pilot signal assignments can be hidden from the adversary, the users achieve an SDoF identical to the maximum achievable DoF under no attack.
- Published
- 2018
- Full Text
- View/download PDF
5. Interference Reduction in Multi-Cell Massive MIMO Systems With Large-Scale Fading Precoding
- Author
-
Alexei Ashikhmin, Liangbin Li, and Thomas L. Marzetta
- Subjects
Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,05 social sciences ,MIMO ,050801 communication & media studies ,020206 networking & telecommunications ,02 engineering and technology ,Spectral efficiency ,Library and Information Sciences ,Interference (wave propagation) ,Topology ,Upper and lower bounds ,Precoding ,Computer Science Applications ,Base station ,0508 media and communications ,Signal-to-noise ratio ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Fading ,business ,Computer Science::Information Theory ,Information Systems - Abstract
A wireless massive multiple-input multiple-output (MIMO) system entails a large number of base station antennas serving a much smaller number of users, with large gains in spectral efficiency and energy efficiency compared with the conventional MIMO technology. Until recently, it was believed that as the number of base station antennas tends to infinity, the performance of such systems is limited by directed inter-cellular interference caused by unavoidable re-use of training sequences (pilot contamination) by users in different cells. We devise a new concept of large-scale fading precoding (LSFP) that leads to the effective elimination of inter-cell interference. The main idea of LSFP is that base stations linearly combine messages aimed at users from different cells that re-use the same training sequence. Crucially, the combining coefficients depend only on the large-scale fading coefficients between the users and the base stations. These coefficients change slowly and their number does not depend on the number of base station antennas. Thus, the traffic between base stations stays constant even if the number of antennas tends to infinity. Furthermore, we derive a capacity lower bound for massive MIMO systems with LSFP and a finite number of base station antennas. In this regime, mitigation of all types of interference, not only the pilot contamination, is required. We consider optimal and suboptimal LSFP precodings that take into account all sources of interference. Our simulations results show that LSFP provides significant gain even for the case of moderate number of base station antennas.
- Published
- 2018
- Full Text
- View/download PDF
6. Decoding of expander codes at rates close to capacity
- Author
-
Ashikhmin, Alexei and Skachek, Vitaly
- Subjects
Digital signal processor ,Data compression -- Research ,Signal processing -- Research - Abstract
The decoding error probability of codes is studied as a function of their block length. It is shown that the existence of codes with a polynomially small decoding error probability implies the existence of codes with an exponentially small decoding error probability. Specifically, it is assumed that there exists a family of codes of length N and rate R = (1 - [epsilon]) C (C is a capacity of a binary-symmetric channel), whose decoding probability decreases inverse polynomially in N. It is shown that if the decoding probability decreases sufficiently fast, but still only inverse polynomially fast in N, then there exists another such family of codes whose decoding error probability decreases exponentially fast in N. Moreover, if the decoding time complexity of the assumed family of codes is polynomial in N and l/[epsilon], then the decoding time complexity of the presented family is linear in N and polynomial in 1/[epsilon]. These codes are compared to the recently presented codes of Barg and Zemor, "Error Exponents of Expander Codes" IEEE Transactions on Information Theory, 2002, and "Concatenated Codes: Serial and Parallel," IEEE Transactions on Information Theory, 2005. It is shown that the latter families cannot be tuned to have exponentially decaying (in N) error probability, and at the same time to have decoding time complexity linear in N and polynomial in 1/[epsilon]. Index Terms--Concatenated codes, decoding complexity, decoding error probability, error exponent, expander codes, irregular repeat accumulative (IRA) codes, iterative decoding, linear-time decoding, low-density parity-check (LDPC) codes.
- Published
- 2006
7. Bounds on distance distributions in codes of known size
- Author
-
Ashikhmin, Alexei E., Cohen, Gerard D., Krivelevich, Michael, and Litsyn, Simon N.
- Subjects
Information theory -- Research - Abstract
We treat the problem of bounding components of the possible distance distributions of codes given the knowledge of their size and possibly minimum distance. Using the Beckner inequality from harmonic analysis, we derive upper bounds on distance distribution components which are sometimes better than earlier ones due to Ashikhmin, Barg, and Litsyn. We use an alternative approach to derive upper bounds on distance distributions in linear codes. As an application of the suggested estimates we get an upper bound on the undetected error probability for an arbitrary code of given size. We also use the new bounds to derive better upper estimates on the covering radius, as well as a lower bound on the error-probability threshold, as a function of the code's size and minimum distance. Index Terms--Covering radius, distance distributions in codes, error probability threshold, undetected error probability.
- Published
- 2005
8. Extrinsic information transfer functions: model and erasure channel properties
- Author
-
Ashikhmin, Alexei, Kramer, Gerhard, and ten Brink, Stephan
- Subjects
Information theory ,Error-correcting codes - Abstract
Extrinsic information transfer (EXIT) charts are a tool for predicting the convergence behavior of iterative processors for a variety of communication problems. A model is introduced that applies to decoding problems, including the iterative decoding of parallel concatenated (turbo) codes, serially concatenated codes, low-density parity-check (LDPC) codes, and repent-accumulate (RA) codes. EXIT functions are defined using the model, and several properties of such functions are proved for erasure channels. One property expresses the area under an EXIT function in terms of a conditional entropy. A useful consequence of this result is that the design of capacity-approaching codes reduces to a curve-fitting problem for all the aforementioned codes. A second property relates the EXIT function of a code to its Helleseth-Klove--Levenshtein information functions, and thereby to the support weights of its subcodes. The relation is via a refinement of information functions called split information functions, and via a refinement of support weights called split support weights. Split information functions are used to prove a third property that relates the EXIT function of a linear code to the EXIT function of its dual. Index Terms--Concatenated codes, duality, error-correction coding, iterative decoding, mutual information.
- Published
- 2004
9. Simple MAP decoding of first-order reed-muller and hamming codes
- Author
-
Ashikhmin, Alexei and Litsyn, Simon
- Subjects
Information theory -- Research - Abstract
A maximum a posteriori (MAP) probability decoder of a block code minimizes the probability of error for each transmitted symbol separately. The standard way of implementing MAP decoding of a linear code is the Bahl-Cocke-Jelinek-Raviv (BCJR) algorithm, which is based on a trellis representation of the code. The complexity of the BCJR algorithm for the first-order Reed-Muller (RM-1) codes and Hamming codes is proportional to [n.sup.2], where n is the code's length. In this correspondence, we present new MAP decoding algorithms for binary and nonbinary RM-1 and Hamming codes. The proposed algorithms have complexities proportional to [q.sup.2]n [log.sub.q]n, where q is the alphabet size. In particular, for the binary codes this yields complexity of order n log n. Index Terms--Hamming codes, maximum a posteriori (MAP) decoding, Reed-Muller codes.
- Published
- 2004
10. On relations between covering radius and dual distance
- Author
-
Ashikhmin, Alexei E., Honkala, Iiro S., Laihonen, Tero K., and Litsyn, Simon N.
- Subjects
Hamming code -- Research ,Error-correcting codes -- Research ,Parameter estimation -- Research ,Coding theory -- Research - Abstract
The covering radius of a code tells us how far in the sense of Hamming distance an arbitrary word of the ambient space can be from the code. For a few decades this parameter has been widely studied. In this paper we estimate the covering radius of a code when the dual distance is known. We derive a new bound on covering radii of linear codes. It improves essentially on the previously known estimates in a certain wide range. We also study asymptotic bounds on the cardinality of constant weight codes. Index Terms - Constant weight codes, covering radius, dual distance, Krawtchouk polynomial.
- Published
- 1999
11. New upper bounds on generalized weights
- Author
-
Ashikhmin, Alexei, Barg, Alexander, and Litsyn, Simon
- Subjects
Information theory -- Models ,Codes -- Models ,Distributions, Theory of (Functional analysis) -- Usage ,Linear programming -- Usage - Abstract
We derive new asymptotic upper bounds on the generalized weights of a binary linear code of a given size. We also prove some asymptotic results on the distance distribution of binary codes. Index Terms - Constant-weight codes, distance distribution, generalized weights, linear programming.
- Published
- 1999
12. Fidelity Lower Bounds for Stabilizer and CSS Quantum Codes
- Author
-
Alexei Ashikhmin
- Subjects
FOS: Computer and information sciences ,Physics::Computational Physics ,Block code ,Quantum Physics ,Computer Science - Information Theory ,Information Theory (cs.IT) ,FOS: Physical sciences ,Quantum capacity ,Code rate ,Library and Information Sciences ,Upper and lower bounds ,Linear code ,Stabilizer code ,Computer Science Applications ,CSS code ,Combinatorics ,Quantum convolutional code ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Quantum Physics (quant-ph) ,Algorithm ,Computer Science::Information Theory ,Information Systems ,Mathematics - Abstract
In this paper, we estimate the fidelity of stabilizer and CSS codes. First, we derive a lower bound on the fidelity of a stabilizer code via its quantum enumerator. Next, we find the average quantum enumerators of the ensembles of finite length stabilizer and CSS codes. We use the average quantum enumerators for obtaining lower bounds on the average fidelity of these ensembles. We further improve the fidelity bounds by estimating the quantum enumerators of expurgated ensembles of stabilizer and CSS codes. Finally, we derive fidelity bounds in the asymptotic regime when the code length tends to infinity. These results tell us which code rate we can afford for achieving a target fidelity with codes of a given length. The results also show that in symmetric depolarizing channel a typical stabilizer code has better performance, in terms of fidelity and code rate, compared with a typical CSS codes, and that balanced CSS codes significantly outperform other CSS codes. Asymptotic results demonstrate that CSS codes have a fundamental performance loss compared with stabilizer codes.
- Published
- 2014
- Full Text
- View/download PDF
13. Physical-Layer Security in TDD Massive MIMO
- Author
-
Basciftci, Yuksel Ozan, primary, Koksal, Can Emre, additional, and Ashikhmin, Alexei, additional
- Published
- 2018
- Full Text
- View/download PDF
14. Interference Reduction in Multi-Cell Massive MIMO Systems With Large-Scale Fading Precoding
- Author
-
Ashikhmin, Alexei, primary, Li, Liangbin, additional, and Marzetta, Thomas L., additional
- Published
- 2018
- Full Text
- View/download PDF
15. Linear Programming Bounds for Entanglement-Assisted Quantum Error-Correcting Codes by Split Weight Enumerators
- Author
-
Lai, Ching-Yi, primary and Ashikhmin, Alexei, additional
- Published
- 2018
- Full Text
- View/download PDF
16. Grassmannian Packings From Operator Reed–Muller Codes
- Author
-
Alexei Ashikhmin and A.R. Calderbank
- Subjects
Discrete mathematics ,Pauli matrices ,Reed–Muller code ,Data_CODINGANDINFORMATIONTHEORY ,Library and Information Sciences ,Projection (linear algebra) ,Computer Science Applications ,Combinatorics ,symbols.namesake ,Quantum error correction ,Grassmannian ,symbols ,Binary code ,Error detection and correction ,Decoding methods ,Computer Science::Information Theory ,Information Systems ,Mathematics - Abstract
This paper introduces multidimensional generalizations of binary Reed-Muller codes where the codewords are projection operators, and the corresponding subspaces are widely separated with respect to the chordal distance on Grassmannian space. Parameters of these Grassmannian packings are derived and a low complexity decoding algorithm is developed by modifying standard decoding algorithms for binary Reed-Muller codes. The subspaces are associated with projection operators determined by Pauli matrices appearing in the theory of quantum error correction and this connection with quantum stabilizer codes may be of independent interest. The Grassmannian packings constructed here find application in noncoherent wireless communication with multiple antennas, where separation with respect to the chordal distance on Grassmannian space guarantees closeness to the channel capacity. It is shown that the capacity of the noncoherent multiple-input-multiple-output (MIMO) channel at both low and moderate signal-to-noise ratio (SNR) (under the constraint that only isotropically distributed unitary matrices are used for information transmission) is closely approximated by these packings.
- Published
- 2010
- Full Text
- View/download PDF
17. EXIT Functions of Hadamard Components in Repeat–Zigzag–Hadamard (RZH) Codes With Parallel Decoding
- Author
-
Alexei Ashikhmin, Xiaodong Wang, and Kai Li
- Subjects
Theoretical computer science ,Context (language use) ,Data_CODINGANDINFORMATIONTHEORY ,Library and Information Sciences ,Binary erasure channel ,Computer Science Applications ,symbols.namesake ,Additive white Gaussian noise ,Hadamard transform ,Bit error rate ,symbols ,Turbo code ,Error detection and correction ,Algorithm ,Decoding methods ,Computer Science::Information Theory ,Information Systems ,Mathematics - Abstract
The extrinsic information transfer (EXIT) functions of Hadamard codes in the context of repeat-zigzag-Hadamard (RZH) codes with parallel decoding are investigated. EXIT functions over both the binary erasure channel (BEC) and the binary-input additive white Gaussian noise (BIAWGN) channel are derived. The application of these EXIT functions in the design of low-rate capacity-approaching irregular RZH (IRZH) codes is also considered. Using the EXIT functions, the bit error rate (BER) for a given code profile can be easily estimated and the differential evolution (DE) technique can be employed to find the optimal degree profile for given design parameters. The EXIT functions derived in this communication can serve as an effective tool for designing low-rate IRZH codes with parallel decoding in both BEC and BIAWGN channels.
- Published
- 2008
- Full Text
- View/download PDF
18. Extremal Problems of Information Combining
- Author
-
Yibo Jiang, Andrew C. Singer, Alexei Ashikhmin, and Ralf Koetter
- Subjects
Discrete mathematics ,Method of moments (probability theory) ,Library and Information Sciences ,Computer Science Applications ,Constraint (information theory) ,Convergence (routing) ,Applied mathematics ,Binary code ,Low-density parity-check code ,Error detection and correction ,Decoding methods ,Information Systems ,Variable (mathematics) ,Mathematics - Abstract
In this paper, we study moments of soft bits of binary-input symmetric-output channels and solve some extremal problems of the moments. We use these results to solve the extremal information combining problem. Further, we extend the information combining problem by adding a constraint on the second moment of soft bits, and find the extremal distributions for this new problem. The results for this extension problem are used to improve the prediction of convergence of the belief propagation decoding of low-density parity-check (LDPC) codes, provided that another extremal problem related to the variable nodes is solved.
- Published
- 2008
- Full Text
- View/download PDF
19. Bounds on Distance Distributions in Codes of Known Size
- Author
-
Michael Krivelevich, Alexei Ashikhmin, Gérard D. Cohen, and Simon Litsyn
- Subjects
Discrete mathematics ,Function (mathematics) ,Library and Information Sciences ,Linear code ,Upper and lower bounds ,Computer Science Applications ,Combinatorics ,Distribution (mathematics) ,Bounding overwatch ,Total variation distance of probability measures ,Code (cryptography) ,Error detection and correction ,Information Systems ,Mathematics - Abstract
We treat the problem of bounding components of the possible distance distributions of codes given the knowledge of their size and possibly minimum distance. Using the Beckner inequality from harmonic analysis, we derive upper bounds on distance distribution components which are sometimes better than earlier ones due to Ashikhmin, Barg, and Litsyn. We use an alternative approach to derive upper bounds on distance distributions in linear codes. As an application of the suggested estimates we get an upper bound on the undetected error probability for an arbitrary code of given size. We also use the new bounds to derive better upper estimates on the covering radius, as well as a lower bound on the error-probability threshold, as a function of the code's size and minimum distance.
- Published
- 2005
- Full Text
- View/download PDF
20. Estimates of the Distance Distribution of Codes and Designs
- Author
-
Ashikhmin, Alexei, Barg, Alexander, and Litsyn, Simon
- Subjects
Codes -- Measurement ,Distances -- Measurement ,Binomial distribution -- Analysis ,Polynomials -- Analysis - Abstract
We consider the problem of bounding the distance distribution for unrestricted block codes with known distance and/or dual distance. Applying the polynomial method, we provide a general framework for previously known results. We derive several upper and lower bounds both for finite length and for sequences of codes of growing length. Asymptotic results in the paper improve previously known estimates. In particular, we prove the best known bounds on the binomiality range of the distance spectrum of codes with a known dual distance. Index Terms--Binomial spectrum, constant weight codes, distance distribution, Krawtchouk polynomials, polynomial method.
- Published
- 2001
21. Extrinsic information transfer functions: model and erasure channel properties
- Author
-
Alexei Ashikhmin, Gerhard Kramer, and S. ten Brink
- Subjects
Block code ,Concatenated error correction code ,Data_CODINGANDINFORMATIONTHEORY ,Serial concatenated convolutional codes ,Library and Information Sciences ,EXIT chart ,Linear code ,Computer Science Applications ,Turbo code ,Low-density parity-check code ,Error detection and correction ,Algorithm ,Computer Science::Information Theory ,Information Systems ,Mathematics - Abstract
Extrinsic information transfer (EXIT) charts are a tool for predicting the convergence behavior of iterative processors for a variety of communication problems. A model is introduced that applies to decoding problems, including the iterative decoding of parallel concatenated (turbo) codes, serially concatenated codes, low-density parity-check (LDPC) codes, and repeat-accumulate (RA) codes. EXIT functions are defined using the model, and several properties of such functions are proved for erasure channels. One property expresses the area under an EXIT function in terms of a conditional entropy. A useful consequence of this result is that the design of capacity-approaching codes reduces to a curve-fitting problem for all the aforementioned codes. A second property relates the EXIT function of a code to its Helleseth-Klove-Levenshtein information functions, and thereby to the support weights of its subcodes. The relation is via a refinement of information functions called split information functions, and via a refinement of support weights called split support weights. Split information functions are used to prove a third property that relates the EXIT function of a linear code to the EXIT function of its dual.
- Published
- 2004
- Full Text
- View/download PDF
22. Simple MAP Decoding of First-Order Reed–Muller and Hamming Codes
- Author
-
Simon Litsyn and Alexei Ashikhmin
- Subjects
Block code ,Hamming bound ,BCJR algorithm ,Concatenated error correction code ,Data_CODINGANDINFORMATIONTHEORY ,Library and Information Sciences ,Linear code ,Computer Science Applications ,Combinatorics ,Cyclic code ,Hamming(7,4) ,Hamming code ,Computer Science::Information Theory ,Information Systems ,Mathematics - Abstract
A maximum a posteriori (MAP) probability decoder of a block code minimizes the probability of error for each transmitted symbol separately. The standard way of implementing MAP decoding of a linear code is the Bahl-Cocke-Jelinek-Raviv (BCJR) algorithm, which is based on a trellis representation of the code. The complexity of the BCJR algorithm for the first-order Reed-Muller (RM-1) codes and Hamming codes is proportional to n/sup 2/, where n is the code's length. In this correspondence, we present new MAP decoding algorithms for binary and nonbinary RM-1 and Hamming codes. The proposed algorithms have complexities proportional to q/sup 2/n log/sub q/n, where q is the alphabet size. In particular, for the binary codes this yields complexity of order n log n.
- Published
- 2004
- Full Text
- View/download PDF
23. A New Upper Bound on the Reliability Function of the Gaussian Channel
- Author
-
Ashikhmin, Alexei E., Barg, Alexander, and Litsyn, Simon N.
- Subjects
Gaussian processes -- Research ,Systems theory -- Asymptotic theory ,Polynomials -- Analysis - Abstract
We derive a new upper bound on the exponent of error probability of decoding for the best possible codes in the Gaussian channel. This bound is tighter than the known upper bounds (the sphere-packing and minimum-distance bounds proved in Shannon's classical 1959 paper and their low-rate improvement by Kabatiansky and Levenshtein). The proof is accomplished by studying asymptotic properties of codes on the sphere [S.sup.n-1](R) First we prove a general lower bound on the distance distribution of codes of large size. To derive specific estimates of the distance distribution, we study the asymptotic behavior of Jacobi polynomials [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] as K [direction] [infinity]. Since on the average there are many code vectors in the vicinity of the transmitted vector [Chi] one can show that the probability of confusing [Chi] and one of these vectors cannot be too small. This proves a lower bound on the error probability of decoding and the upper bound announced in the title. Index Terms--Distance distribution, error probability of decoding, Jacobi polynomials, spherical codes.
- Published
- 2000
24. Quantum Error Detection I: Statement of the Problem
- Author
-
Ashikhmin, Alexei E., Barg, Alexander M., Knill, Emanuel, and Litsyn, Simon N.
- Subjects
Information theory -- Research ,Coding theory -- Research ,Error -- Measurement - Abstract
This paper is devoted to the problem of error detection with quantum codes. We show that it is possible to give a consistent definition of the undetected error event. To prove this, we examine possible problem settings for quantum error detection. Our goal is to derive a functional that describes the probability of undetected error under natural physical assumptions concerning transmission with error detection with quantum codes. We discuss possible transmission protocols with stabilizer and unrestricted quantum codes. The set of results proved in the paper shows that in all the cases considered the average probability of undetected error for a given code is essentially given by one and the same function of its weight enumerators. In the final section of the paper we examine polynomial invariants of quantum codes and show that coefficients of Rains's "unitary weight enumerators" [17] are known for classical codes under the name of binomial moments of the distance distribution. As in the classical situation, these enumerators provide an alternative expression for the probability of undetected error. In a companion paper (part II) we use the relation of the probability of undetected error and weight enumerators to derive bounds on this probability for quantum codes. Index Terms--Measurement, quantum code, Shor-Laflamme enumerators, undetected error.
- Published
- 2000
25. Quantum Error Detection II: Bounds
- Author
-
Ashikhmin, Alexei E., Barg, Alexander M., Knill, Emanuel, and Litsyn, Simon N.
- Subjects
Information theory -- Research ,Coding theory -- Research ,Error -- Measurement - Abstract
In Part I of this paper we formulated the problem of error detection with quantum codes on the depolarizing channel and gave an expression for the probability of undetected error via the weight enumerators of the code. In this part we show that there exist quantum codes whose probability of undetected error falls exponentially with the length of the code and derive bounds on this exponent. The lower (existence) bound is proved for stabilizer codes by a counting argument for classical self-orthogonal quaternary codes. Upper bounds are proved by linear programming. First we formulate two linear programming problems that are convenient for the analysis of specific short codes. Next we give a relaxed formulation of the problem in terms of optimization on the cone of polynomials in the Krawtchouk basis. We present two general solutions of the problem. Together they give an upper bound on the exponent of undetected error. The upper and lower asymptotic bounds coincide for a certain interval of code rates close to 1. Index Terms--Polynomial method, probability of undetected error, quantum code, self-orthogonal codes.
- Published
- 2000
26. Upper bounds on the size of quantum codes
- Author
-
Simon Litsyn and Alexei Ashikhmin
- Subjects
Discrete mathematics ,Block code ,Quantum Physics ,Lieb-Robinson bounds ,TheoryofComputation_GENERAL ,FOS: Physical sciences ,Quantum capacity ,Library and Information Sciences ,Linear code ,Computer Science Applications ,Classical capacity ,Combinatorics ,ComputerSystemsOrganization_MISCELLANEOUS ,Quantum convolutional code ,Quantum operation ,Quantum algorithm ,Quantum Physics (quant-ph) ,Information Systems ,Mathematics - Abstract
Several upper bounds on the size of quantum codes are derived using the linear programming approach. These bounds are strengthened for the linear quantum codes., Comment: 20 pages, 2 figures
- Published
- 1999
- Full Text
- View/download PDF
27. New upper bounds on generalized weights
- Author
-
A. Ashikhmin, Simon Litsyn, and Alexander Barg
- Subjects
Block code ,Discrete mathematics ,Library and Information Sciences ,Linear code ,Binary symmetric channel ,Expander code ,Computer Science Applications ,Combinatorics ,Gray code ,Binary code ,Constant-weight code ,Decoding methods ,Information Systems ,Mathematics - Abstract
We derive new asymptotic upper bounds on the generalized weights of a binary linear code of a given size. We also prove some asymptotic results on the distance distribution of binary codes.
- Published
- 1999
- Full Text
- View/download PDF
28. Binomial moments of the distance distribution: bounds and applications
- Author
-
Alexander Barg and Alexei Ashikhmin
- Subjects
Block code ,Discrete mathematics ,Binomial approximation ,Negative binomial distribution ,Library and Information Sciences ,Gaussian binomial coefficient ,Linear code ,Computer Science Applications ,Binomial distribution ,Combinatorics ,symbols.namesake ,symbols ,Multinomial distribution ,Low-density parity-check code ,Information Systems ,Mathematics - Abstract
We study a combinatorial invariant of codes which counts the number of ordered pairs of codewords in all subcodes of restricted support in a code. This invariant can be expressed as a linear form of the components of the distance distribution of the code with binomial numbers as coefficients. For this reason we call it a binomial moment of the distance distribution. Binomial moments appear in the proof of the MacWilliams (1963) identities and in many other problems of combinatorial coding theory. We introduce a linear programming problem for bounding these linear forms from below. It turns out that some known codes (1-error-correcting perfect codes, Golay codes, Nordstrom-Robinson code, etc.) yield optimal solutions of this problem, i.e., have minimal possible binomial moments of the distance distribution. We derive several general feasible solutions of this problem, which give lower bounds on the binomial moments of codes with given parameters, and derive the corresponding asymptotic bounds. Applications of these bounds include new lower bounds on the probability of undetected error for binary codes used over the binary-symmetric channel with crossover probability p and optimality of many codes for error detection. Asymptotic analysis of the bounds enables us to extend the range of code rates in which the upper bound on the undetected error exponent is tight.
- Published
- 1999
- Full Text
- View/download PDF
29. On relations between covering radius and dual distance
- Author
-
A. Ashikhmin, T.K. Laibonen, Simon Litsyn, and Iiro S. Honkala
- Subjects
Block code ,Discrete mathematics ,Polynomial code ,Hamming distance ,Covering code ,Library and Information Sciences ,Linear code ,Computer Science Applications ,Combinatorics ,Cyclic code ,Constant-weight code ,Hamming code ,Information Systems ,Mathematics - Abstract
The covering radius of a code tells us how far in the sense of Hamming distance an arbitrary word of the ambient space can be from the code. For a few decades this parameter has been widely studied. We estimate the covering ratios of a code when the dual distance is known. We derive a new bound on covering radii of linear codes. It improves essentially on the previously known estimates in a certain wide range. We also study asymptotic bounds on the cardinality of constant weight codes.
- Published
- 1999
- Full Text
- View/download PDF
30. Minimal vectors in linear codes
- Author
-
Alexei Ashikhmin and Alexander Barg
- Subjects
Block code ,Discrete mathematics ,Concatenated error correction code ,List decoding ,Reed–Muller code ,Sequential decoding ,Library and Information Sciences ,Luby transform code ,Linear code ,Hamming code ,Computer Science Applications ,Information Systems ,Mathematics - Abstract
Minimal vectors in linear codes arise in numerous applications, particularly, in constructing decoding algorithms and studying linear secret sharing schemes. However, properties and structure of minimal vectors have been largely unknown. We prove basic properties of minimal vectors in general linear codes. Then we characterize minimal vectors of a given weight and compute their number in several classes of codes, including the Hamming codes and second-order Reed-Muller codes. Further, we extend the concept of minimal vectors to codes over rings and compute them for several examples. Turning to applications, we introduce a general gradient-like decoding algorithm of which minimal-vectors decoding is an example. The complexity of minimal-vectors decoding for long codes is determined by the size of the set of minimal vectors. Therefore, we compute this size for long randomly chosen codes. Another example of algorithms in this class is given by zero-neighbors decoding. We discuss relations between the two decoding methods. In particular, we show that for even codes the set of zero neighbors is strictly optimal in this class of algorithms. This also implies that general asymptotic improvements of the zero-neighbors algorithm in the frame of gradient-like approach are impossible. We also discuss a link to secret-sharing schemes.
- Published
- 1998
- Full Text
- View/download PDF
31. Fidelity Lower Bounds for Stabilizer and CSS Quantum Codes
- Author
-
Ashikhmin, Alexei, primary
- Published
- 2014
- Full Text
- View/download PDF
32. Nonbinary quantum stabilizer codes. (Correspondence)
- Author
-
Ashikhmin Alexei and Knill, Emanuel
- Subjects
Information theory -- Models ,Coding theory -- Analysis - Abstract
We define and show how to construct nonbinary quantum stabilizer codes. Our approach is based on nonbinary error bases. It generalizes the relationship between self-orthogonal codes over [F.sub.4] and binary quantum codes to one between self-orthogonal codes over [F.sub.q]2 and q-ary quantum codes for any prime power q. Index Terms--Nonbinary quantum codes, quantum stabilizer codes, self-orthogonal codes.
- Published
- 2001
33. Upper bounds on the size of quantum codes
- Author
-
Ashikhmin, Alexei and Litsyn, Simon
- Subjects
Information theory -- Models ,Quantum theory -- Models ,Codes -- Models ,Coding theory -- Models ,Linear programming -- Usage - Abstract
This paper is concerned with bounds for quantum error-correcting codes. Using the quantum MacWilliams identities, we generalize the linear programming approach from classical coding theory to the quantum case. Using this approach, we obtain Singleton-type, Hamming-type, and the first linear-programming-type bounds for quantum codes. Using the special structure of linear quantum codes, we derive an upper bound that is better than both Hamming and the first linear programming bounds on some subinterval of rates. Index Terms - Linear programming, quantum codes, upper bounds.
- Published
- 1999
34. Binomial moments of the distance distribution: bounds and applications
- Author
-
Ashikhmin, A., primary and Barg, A., additional
- Published
- 1999
- Full Text
- View/download PDF
35. Minimal vectors in linear codes
- Author
-
Ashikhmin, A., primary and Barg, A., additional
- Published
- 1998
- Full Text
- View/download PDF
36. EXIT Functions of Hadamard Components in Repeat--Zigzag--Hadamard (RZH) Codes With Parallel Decoding.
- Author
-
Kai Li, Xiaodong Wang, and Ashikhmin, Alexei
- Subjects
INFORMATION theory ,ERROR rates ,CODING theory ,RANDOM noise theory ,SIGNAL theory ,TELECOMMUNICATION - Abstract
The extrinsic information transfer (EXIT) functions of Hadamard codes in the context of repeat-zigzag-Hadamard (RZH) codes with parallel decoding are investigated. EXIT functions over both the binary erasure channel (BEC) and the binary-input additive white Gaussian noise (BIAWGN) channel are derived. The application of these EXIT functions in the design of low-rate capacity-approaching irregular RZH (IRZH) codes is also considered. Using the EXIT functions, the bit error rate (BER) for a given code profile can be easily estimated and the differential evolution (DE) technique can be employed to find the optimal degree profile for given design parameters. The EXIT functions derived in this communication can serve as an effective tool for designing low-rate IRZH codes with parallel decoding in both BEC and BIAWGN channels. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.