16 research outputs found

    New Constructions of Zero-Correlation Zone Sequences

    Full text link
    In this paper, we propose three classes of systematic approaches for constructing zero correlation zone (ZCZ) sequence families. In most cases, these approaches are capable of generating sequence families that achieve the upper bounds on the family size (KK) and the ZCZ width (TT) for a given sequence period (NN). Our approaches can produce various binary and polyphase ZCZ families with desired parameters (N,K,T)(N,K,T) and alphabet size. They also provide additional tradeoffs amongst the above four system parameters and are less constrained by the alphabet size. Furthermore, the constructed families have nested-like property that can be either decomposed or combined to constitute smaller or larger ZCZ sequence sets. We make detailed comparisons with related works and present some extended properties. For each approach, we provide examples to numerically illustrate the proposed construction procedure.Comment: 37 pages, submitted to IEEE Transactions on Information Theor

    Design of sequences with good correlation properties

    Get PDF
    This thesis is dedicated to exploring sequences with good correlation properties. Periodic sequences with desirable correlation properties have numerous applications in communications. Ideally, one would like to have a set of sequences whose out-of-phase auto-correlation magnitudes and cross-correlation magnitudes are very small, preferably zero. However, theoretical bounds show that the maximum magnitudes of auto-correlation and cross-correlation of a sequence set are mutually constrained, i.e., if a set of sequences possesses good auto-correlation properties, then the cross-correlation properties are not good and vice versa. The design of sequence sets that achieve those theoretical bounds is therefore of great interest. In addition, instead of pursuing the least possible correlation values within an entire period, it is also interesting to investigate families of sequences with ideal correlation in a smaller zone around the origin. Such sequences are referred to as sequences with zero correlation zone or ZCZ sequences, which have been extensively studied due to their applications in 4G LTE and 5G NR systems, as well as quasi-synchronous code-division multiple-access communication systems. Paper I and a part of Paper II aim to construct sequence sets with low correlation within a whole period. Paper I presents a construction of sequence sets that meets the Sarwate bound. The construction builds a connection between generalised Frank sequences and combinatorial objects, circular Florentine arrays. The size of the sequence sets is determined by the existence of circular Florentine arrays of some order. Paper II further connects circular Florentine arrays to a unified construction of perfect polyphase sequences, which include generalised Frank sequences as a special case. The size of a sequence set that meets the Sarwate bound, depends on a divisor of the period of the employed sequences, as well as the existence of circular Florentine arrays. Paper III-VI and a part of Paper II are devoted to ZCZ sequences. Papers II and III propose infinite families of optimal ZCZ sequence sets with respect to some bound, which are used to eliminate interference within a single cell in a cellular network. Papers V, VI and a part of Paper II focus on constructions of multiple optimal ZCZ sequence sets with favorable inter-set cross-correlation, which can be used in multi-user communication environments to minimize inter-cell interference. In particular, Paper~II employs circular Florentine arrays and improves the number of the optimal ZCZ sequence sets with optimal inter-set cross-correlation property in some cases.Doktorgradsavhandlin

    A Direct Construction of Prime-Power-Length Zero-Correlation Zone Sequences for QS-CDMA System

    Full text link
    In recent years, zero-correlation zone (ZCZ) sequences are being studied due to their significant applications in quasi-synchronous code division multiple access (QS-CDMA) systems and other wireless communication domains. However, the lengths of most existing ZCZ sequences are limited, and their parameters are not flexible, which are leading to practical limitations in their use in QS-CDMA and other communication systems. The current study proposes a direct construction of ZCZ sequences of prime-power length with flexible parameters by using multivariable functions. In the proposed construction, we first present a multivariable function to generate a vector with specific properties; this is further used to generate another class of multivariable functions to generate the desired (pt,(p1)pn,pn+t+1)(p^t,(p-1)p^n,p^{n+t+1})-ZCZ sequence set, where pp is a prime number, t,nt,n are positive integers, and tnt\leq n. The constructed ZCZ sequence set is optimal for the binary case and asymptotically optimal for the non-binary case by the \emph{Tang-Fan-Matsufuji} bound. Moreover, a relation between the second-order cosets of first-order generalized Reed-Muller code and the proposed ZCZ sequences is also established. The proposed construction of ZCZ sequences is compared with existing constructions, and it is observed that the parameters of this ZCZ sequence set are a generalization of that of in some existing works. Finally, the performance of the proposed ZCZ-based QS-CDMA system is compared with the Walsh-Hadamard and Gold code-based QS-CDMA system

    Chip and Signature Interleaving in DS CDMA Systems

    Get PDF
    Siirretty Doriast

    Rich Words and Balanced Words

    Get PDF
    This thesis is mostly focused on palindromes. Palindromes have been studied extensively, in recent years, in the field of combinatorics on words.Our main focus is on rich words, also known as full words. These are words which have maximum number of distinct palindromes as factors.We shed some more light on these words and investigate certain restricted problems. Finite rich words are known to be extendable to infinite rich words. We study more closely how many different ways, and in which situations, rich words can be extended so that they remain rich.The defect of a ord is defined to be the number of palindromes the word is lacking.We will generalize the definition of defect with respect to extending the word to be infinite.The number of rich words, on an alphabet of size nn, is given an upper and a lower bound. Hof, Knill and Simon presented (Commun. Math. Phys. 174, 1995) a well-known question whether all palindromic subshifts which are enerated by primitive substitutions arise from substitutions which are in class P. Over the years, this question has transformed a bit and is nowadays called the class P conjecture. The main point of the conjecture is to attempt to explain how an infinite word can contain infinitely many palindromes.We will prove a partial result of the conjecture. Rich square-free words are known to be finite (Pelantov\'a and Sarosta, Discrete Math. 313, 2013). We will give another proof for that result. Since they are finite, there exists a longest such word on an nn-ary alphabet.We give an upper and a lower bound for the length of that word. We study also balanced words. Oliver Jenkinson proved (Discrete Math., Alg. and Appl. 1(4), 2009) that if we take the partial sum of the lexicographically ordered orbit of a binary word, then the balanced word gives the least partial sum. The balanced word also gives the largest product. We will show that, at the other extreme, there are the words of the form 0qp1p0^{q-p}1^p (pp and qq are integers with 1p<q1\leq p<q), which we call the most unbalanced words. They give the greatest partial sum and the smallest product.Tässä väitöskirjassa käsitellään pääasiassa palindromeja. Palindromeja on tutkittu viime vuosina runsaasti sanojen kombinatoriikassa.Suurin kiinnostuksen kohde tässä tutkielmassa on rikkaissa sanoissa. Nämä ovat sanoja joissa on maksimaalinen määrä erilaisia palindromeja tekijöinä.Näitä sanoja tutkitaan monesta eri näkökulmasta. Äärellisiä rikkaita sanoja voidaan tunnetusti jatkaa äärettömiksi rikkaiksi sanoiksi.Työssä tutkitaan tarkemmin sitä, miten monella tavalla ja missä eri tilanteissa rikkaita sanoja voidaan jatkaa siten, että ne pysyvät rikkaina.Sanan vajauksella tarkoitetaan puuttuvien palindromien lukumäärää.Vajauksen käsite yleistetään tapaukseen, jossa sanaa on jatkettava äärettömäksi sanaksi.Rikkaiden sanojen lukumäärälle annetaan myös ylä- ja alaraja. Hof, Knill ja Simon esittivät kysymyksen (Commun. Math. Phys. 174, 1995), saadaanko kaikki äärettömät sanat joissa on ääretön määrä palindromeja tekijöinä ja jotka ovat primitiivisen morfismin generoimia, morfismeista jotka kuuluvat luokkaan P. Nykyään tätä ongelmaa kutsutaan luokan P konjektuuriksi ja sen tarkoitus on saada selitys sille,millä tavalla äärettömässä sanassa voi olla tekijöinä äärettömän monta palindromia. Osittainen tulos tästä konjektuurista todistetaan. Rikkaiden neliövapaiden sanojen tiedetään olevan äärellisiä (Pelantov\'a ja Starosta, Discrete Math. 313, 2013). Tälle tulokselle annetaan uudenlainen todistus.Koska kyseiset sanat ovat äärellisiä, voidaan selvittää mikä niistä on pisin.Ylä- ja alaraja annetaan tällaisen pisimmän sanan pituudelle. Työssä tutkitaan myös tasapainotettuja sanoja.Tasapainotetut sanat antavat pienimmän osittaissumman binäärisille sanoille (Jenkinson, Discrete Math., Alg. and Appl. 1(4), 2009).Lisäksi ne antavat suurimman tulon.Muotoa 0qp1p0^{q-p}1^p (pp ja qq ovat kokonaislukuja joille 1p<q1\leq p<q) olevien sanojen todistetaan vastaavasti antavan suurimman osittaissumman ja pienimmän tulon.Ne muodostavat täten toisen ääripään tasapainotetuille sanoille, ja asettavat kaikki muut sanat näiden väliin.Siirretty Doriast

    Efficient Security Protocols for Constrained Devices

    Get PDF
    During the last decades, more and more devices have been connected to the Internet.Today, there are more devices connected to the Internet than humans.An increasingly more common type of devices are cyber-physical devices.A device that interacts with its environment is called a cyber-physical device.Sensors that measure their environment and actuators that alter the physical environment are both cyber-physical devices.Devices connected to the Internet risk being compromised by threat actors such as hackers.Cyber-physical devices have become a preferred target for threat actors since the consequence of an intrusion disrupting or destroying a cyber-physical system can be severe.Cyber attacks against power and energy infrastructure have caused significant disruptions in recent years.Many cyber-physical devices are categorized as constrained devices.A constrained device is characterized by one or more of the following limitations: limited memory, a less powerful CPU, or a limited communication interface.Many constrained devices are also powered by a battery or energy harvesting, which limits the available energy budget.Devices must be efficient to make the most of the limited resources.Mitigating cyber attacks is a complex task, requiring technical and organizational measures.Constrained cyber-physical devices require efficient security mechanisms to avoid overloading the systems limited resources.In this thesis, we present research on efficient security protocols for constrained cyber-physical devices.We have implemented and evaluated two state-of-the-art protocols, OSCORE and Group OSCORE.These protocols allow end-to-end protection of CoAP messages in the presence of untrusted proxies.Next, we have performed a formal protocol verification of WirelessHART, a protocol for communications in an industrial control systems setting.In our work, we present a novel attack against the protocol.We have developed a novel architecture for industrial control systems utilizing the Digital Twin concept.Using a state synchronization protocol, we propagate state changes between the digital and physical twins.The Digital Twin can then monitor and manage devices.We have also designed a protocol for secure ownership transfer of constrained wireless devices. Our protocol allows the owner of a wireless sensor network to transfer control of the devices to a new owner.With a formal protocol verification, we can guarantee the security of both the old and new owners.Lastly, we have developed an efficient Private Stream Aggregation (PSA) protocol.PSA allows devices to send encrypted measurements to an aggregator.The aggregator can combine the encrypted measurements and calculate the decrypted sum of the measurements.No party will learn the measurement except the device that generated it

    Modified Gravity and Cosmology

    Get PDF
    In this review we present a thoroughly comprehensive survey of recent work on modified theories of gravity and their cosmological consequences. Amongst other things, we cover General Relativity, Scalar-Tensor, Einstein-Aether, and Bimetric theories, as well as TeVeS, f(R), general higher-order theories, Horava-Lifschitz gravity, Galileons, Ghost Condensates, and models of extra dimensions including Kaluza-Klein, Randall-Sundrum, DGP, and higher co-dimension braneworlds. We also review attempts to construct a Parameterised Post-Friedmannian formalism, that can be used to constrain deviations from General Relativity in cosmology, and that is suitable for comparison with data on the largest scales. These subjects have been intensively studied over the past decade, largely motivated by rapid progress in the field of observational cosmology that now allows, for the first time, precision tests of fundamental physics on the scale of the observable Universe. The purpose of this review is to provide a reference tool for researchers and students in cosmology and gravitational physics, as well as a self-contained, comprehensive and up-to-date introduction to the subject as a whole.Comment: 312 pages, 15 figure

    Sample Path Analysis of Integrate-and-Fire Neurons

    Get PDF
    Computational neuroscience is concerned with answering two intertwined questions that are based on the assumption that spatio-temporal patterns of spikes form the universal language of the nervous system. First, what function does a specific neural circuitry perform in the elaboration of a behavior? Second, how do neural circuits process behaviorally-relevant information? Non-linear system analysis has proven instrumental in understanding the coding strategies of early neural processing in various sensory modalities. Yet, at higher levels of integration, it fails to help in deciphering the response of assemblies of neurons to complex naturalistic stimuli. If neural activity can be assumed to be primarily driven by the stimulus at early stages of processing, the intrinsic activity of neural circuits interacts with their high-dimensional input to transform it in a stochastic non-linear fashion at the cortical level. As a consequence, any attempt to fully understand the brain through a system analysis approach becomes illusory. However, it is increasingly advocated that neural noise plays a constructive role in neural processing, facilitating information transmission. This prompts to gain insight into the neural code by studying the stochasticity of neuronal activity, which is viewed as biologically relevant. Such an endeavor requires the design of guiding theoretical principles to assess the potential benefits of neural noise. In this context, meeting the requirements of biological relevance and computational tractability, while providing a stochastic description of neural activity, prescribes the adoption of the integrate-and-fire model. In this thesis, founding ourselves on the path-wise description of neuronal activity, we propose to further the stochastic analysis of the integrate-and fire model through a combination of numerical and theoretical techniques. To begin, we expand upon the path-wise construction of linear diffusions, which offers a natural setting to describe leaky integrate-and-fire neurons, as inhomogeneous Markov chains. Based on the theoretical analysis of the first-passage problem, we then explore the interplay between the internal neuronal noise and the statistics of injected perturbations at the single unit level, and examine its implications on the neural coding. At the population level, we also develop an exact event-driven implementation of a Markov network of perfect integrate-and-fire neurons with both time delayed instantaneous interactions and arbitrary topology. We hope our approach will provide new paradigms to understand how sensory inputs perturb neural intrinsic activity and accomplish the goal of developing a new technique for identifying relevant patterns of population activity. From a perturbative perspective, our study shows how injecting frozen noise in different flavors can help characterize internal neuronal noise, which is presumably functionally relevant to information processing. From a simulation perspective, our event-driven framework is amenable to scrutinize the stochastic behavior of simple recurrent motifs as well as temporal dynamics of large scale networks under spike-timing-dependent plasticity

    Vol. 15, No. 1 (Full Issue)

    Get PDF
    corecore