24,120 research outputs found
Blind identification of an unknown interleaved convolutional code
We give here an efficient method to reconstruct the block interleaver and
recover the convolutional code when several noisy interleaved codewords are
given. We reconstruct the block interleaver without assumption on its
structure. By running some experimental tests we show the efficiency of this
method even with moderate noise
Early Stopping for Interleaver Recovering of Turbo Codes
Parameter recovering of channel codes is important in applications such as
cognitive radio. The main task for that of a turbo code is to recover the
interleaver. The existing optimal algorithm recovers interleaver parameters
incrementally one by one. This algorithm continues till the end even if it has
failed in the halfway. And there would be lots of wasted computation, as well
as incorrectly recovered parameters that will badly deteriorate turbo decoding
performance. To address such drawbacks, this paper proposes an early stopping
method for the algorithm. Thresholds needed for the method are set through
theoretical analysis. Simulations show that the proposed method is able to stop
the algorithm in time after it has failed, while no significant degradation in
the correct recovering probability is observed
Unsupervised Linear and Nonlinear Channel Equalization and Decoding using Variational Autoencoders
A new approach for blind channel equalization and decoding, variational
inference, and variational autoencoders (VAEs) in particular, is introduced. We
first consider the reconstruction of uncoded data symbols transmitted over a
noisy linear intersymbol interference (ISI) channel, with an unknown impulse
response, without using pilot symbols. We derive an approximate maximum
likelihood estimate to the channel parameters and reconstruct the transmitted
data. We demonstrate significant and consistent improvements in the error rate
of the reconstructed symbols, compared to existing blind equalization methods
such as constant modulus, thus enabling faster channel acquisition. The VAE
equalizer uses a convolutional neural network with a small number of free
parameters. These results are extended to blind equalization over a noisy
nonlinear ISI channel with unknown parameters. We then consider coded
communication using low-density parity-check (LDPC) codes transmitted over a
noisy linear or nonlinear ISI channel. The goal is to reconstruct the
transmitted message from the channel observations corresponding to a
transmitted codeword, without using pilot symbols. We demonstrate improvements
compared to the expectation maximization (EM) algorithm using turbo
equalization. Furthermore, unlike EM, the computational complexity of our
method does not have exponential dependence on the size of the channel impulse
response.Comment: Submitted for publication. Includes 33 pages, 17 figures, 2 table
Identification of SM-OFDM and AL-OFDM Signals Based on Their Second-Order Cyclostationarity
Automatic signal identification (ASI) has important applications to both
commercial and military communications, such as software defined radio,
cognitive radio, spectrum surveillance and monitoring, and electronic warfare.
While ASI has been intensively studied for single-input single-output systems,
only a few investigations have been recently presented for multiple-input
multiple-output systems. This paper introduces a novel algorithm for the
identification of spatial multiplexing (SM) and Alamouti coded (AL) orthogonal
frequency division multiplexing (OFDM) signals, which relies on the
second-order signal cyclostationarity. Analytical expressions for the
second-order cyclic statistics of SM-OFDM and AL-OFDM signals are derived and
further exploited for the algorithm development. The proposed algorithm
provides a good identification performance with low sensitivity to impairments
in the received signal, such as phase noise, timing offset, and channel
conditions.Comment: 36 pages, 14 figures, TVT201
Reliable SVD based Semi-blind and Invisible Watermarking Schemes
A semi-blind watermarking scheme is presented based on Singular Value
Decomposition (SVD), which makes essential use of the fact that, the SVD
subspace preserves significant amount of information of an image and is a one
way decomposition. The principal components are used, along with the
corresponding singular vectors of the watermark image to watermark the target
image. For further security, the semi-blind scheme is extended to an invisible
hash based watermarking scheme. The hash based scheme commits a watermark with
a key such that, it is incoherent with the actual watermark, and can only be
extracted using the key. Its security is analyzed in the random oracle model
and shown to be unforgeable, invisible and satisfying the property of
non-repudiation.Comment: 11 Pages, 1 Figur
Toward Convolutional Blind Denoising of Real Photographs
While deep convolutional neural networks (CNNs) have achieved impressive
success in image denoising with additive white Gaussian noise (AWGN), their
performance remains limited on real-world noisy photographs. The main reason is
that their learned models are easy to overfit on the simplified AWGN model
which deviates severely from the complicated real-world noise model. In order
to improve the generalization ability of deep CNN denoisers, we suggest
training a convolutional blind denoising network (CBDNet) with more realistic
noise model and real-world noisy-clean image pairs. On the one hand, both
signal-dependent noise and in-camera signal processing pipeline is considered
to synthesize realistic noisy images. On the other hand, real-world noisy
photographs and their nearly noise-free counterparts are also included to train
our CBDNet. To further provide an interactive strategy to rectify denoising
result conveniently, a noise estimation subnetwork with asymmetric learning to
suppress under-estimation of noise level is embedded into CBDNet. Extensive
experimental results on three datasets of real-world noisy photographs clearly
demonstrate the superior performance of CBDNet over state-of-the-arts in terms
of quantitative metrics and visual quality. The code has been made available at
https://github.com/GuoShi28/CBDNet
Feedback inhibition shapes emergent computational properties of cortical microcircuit motifs
Cortical microcircuits are very complex networks, but they are composed of a
relatively small number of stereotypical motifs. Hence one strategy for
throwing light on the computational function of cortical microcircuits is to
analyze emergent computational properties of these stereotypical microcircuit
motifs. We are addressing here the question how spike-timing dependent
plasticity (STDP) shapes the computational properties of one motif that has
frequently been studied experimentally: interconnected populations of pyramidal
cells and parvalbumin-positive inhibitory cells in layer 2/3. Experimental
studies suggest that these inhibitory neurons exert some form of divisive
inhibition on the pyramidal cells. We show that this data-based form of
feedback inhibition, which is softer than that of winner-take-all models that
are commonly considered in theoretical analyses, contributes to the emergence
of an important computational function through STDP: The capability to
disentangle superimposed firing patterns in upstream networks, and to represent
their information content through a sparse assembly code.Comment: 25 pages, 6 figure
Extreme Channel Prior Embedded Network for Dynamic Scene Deblurring
Recent years have witnessed the significant progress on convolutional neural
networks (CNNs) in dynamic scene deblurring. While CNN models are generally
learned by the reconstruction loss defined on training data, incorporating
suitable image priors as well as regularization terms into the network
architecture could boost the deblurring performance. In this work, we propose
an Extreme Channel Prior embedded Network (ECPeNet) to plug the extreme channel
priors (i.e., priors on dark and bright channels) into a network architecture
for effective dynamic scene deblurring. A novel trainable extreme channel prior
embedded layer (ECPeL) is developed to aggregate both extreme channel and
blurry image representations, and sparse regularization is introduced to
regularize the ECPeNet model learning. Furthermore, we present an effective
multi-scale network architecture that works in both coarse-to-fine and
fine-to-coarse manners for better exploiting information flow across scales.
Experimental results on GoPro and Kohler datasets show that our proposed
ECPeNet performs favorably against state-of-the-art deep image deblurring
methods in terms of both quantitative metrics and visual quality.Comment: 10 page
A Journey from Improper Gaussian Signaling to Asymmetric Signaling
The deviation of continuous and discrete complex random variables from the
traditional proper and symmetric assumption to a generalized improper and
asymmetric characterization (accounting correlation between a random entity and
its complex conjugate), respectively, introduces new design freedom and various
potential merits. As such, the theory of impropriety has vast applications in
medicine, geology, acoustics, optics, image and pattern recognition, computer
vision, and other numerous research fields with our main focus on the
communication systems. The journey begins from the design of improper Gaussian
signaling in the interference-limited communications and leads to a more
elaborate and practically feasible asymmetric discrete modulation design. Such
asymmetric shaping bridges the gap between theoretically and practically
achievable limits with sophisticated transceiver and detection schemes in both
coded/uncoded wireless/optical communication systems. Interestingly,
introducing asymmetry and adjusting the transmission parameters according to
some design criterion render optimal performance without affecting the
bandwidth or power requirements of the systems. This dual-flavored article
initially presents the tutorial base content covering the interplay of
reality/complexity, propriety/impropriety and circularity/noncircularity and
then surveys majority of the contributions in this enormous journey.Comment: IEEE COMST (Early Access
Blind Image Deblurring via Reweighted Graph Total Variation
Blind image deblurring, i.e., deblurring without knowledge of the blur
kernel, is a highly ill-posed problem. The problem can be solved in two parts:
i) estimate a blur kernel from the blurry image, and ii) given estimated blur
kernel, de-convolve blurry input to restore the target image. In this paper, by
interpreting an image patch as a signal on a weighted graph, we first argue
that a skeleton image---a proxy that retains the strong gradients of the target
but smooths out the details---can be used to accurately estimate the blur
kernel and has a unique bi-modal edge weight distribution. We then design a
reweighted graph total variation (RGTV) prior that can efficiently promote
bi-modal edge weight distribution given a blurry patch. However, minimizing a
blind image deblurring objective with RGTV results in a non-convex
non-differentiable optimization problem. We propose a fast algorithm that
solves for the skeleton image and the blur kernel alternately. Finally with the
computed blur kernel, recent non-blind image deblurring algorithms can be
applied to restore the target image. Experimental results show that our
algorithm can robustly estimate the blur kernel with large kernel size, and the
reconstructed sharp image is competitive against the state-of-the-art methods.Comment: 5 pages, submitted to IEEE International Conference on Acoustics,
Speech and Signal Processing, Calgary, Alberta, Canada, April, 201
- …