32 research outputs found
Quantum wiretap channel with non-uniform random number and its exponent and equivocation rate of leaked information
A usual code for quantum wiretap channel requires an auxiliary random
variable subject to the perfect uniform distribution. However, it is difficult
to prepare such an auxiliary random variable. We propose a code that requires
only an auxiliary random variable subject to a non-uniform distribution instead
of the perfect uniform distribution. Further, we evaluate the exponential
decreasing rate of leaked information and derive its equivocation rate. For
practical constructions, we also discuss the security when our code consists of
a linear error correcting code
Universal Hashing for Information Theoretic Security
The information theoretic approach to security entails harnessing the
correlated randomness available in nature to establish security. It uses tools
from information theory and coding and yields provable security, even against
an adversary with unbounded computational power. However, the feasibility of
this approach in practice depends on the development of efficiently
implementable schemes. In this article, we review a special class of practical
schemes for information theoretic security that are based on 2-universal hash
families. Specific cases of secret key agreement and wiretap coding are
considered, and general themes are identified. The scheme presented for wiretap
coding is modular and can be implemented easily by including an extra
pre-processing layer over the existing transmission codes.Comment: Corrected an error in the proof of Lemma
Minimization on mixture family
Iterative minimization algorithms appear in various areas including machine
learning, neural network, and information theory. The em algorithm is one of
the famous one in the former area, and Arimoto-Blahut algorithm is a typical
one in the latter area. However, these two topics had been separately studied
for a long time. In this paper, we generalize an algorithm that was recently
proposed in the context of Arimoto-Blahut algorithm. Then, we show various
convergence theorems, one of which covers the case when each iterative step is
done approximately. Also, we apply this algorithm to the target problem in em
algorithm, and propose its improvement. In addition, we apply it to other
various problems in information theory
Analytical Characterization and Optimum Detection of Nonlinear Multicarrier Schemes
It is widely recognized that multicarrier systems such as orthogonal frequency division
multiplexing (OFDM) are suitable for severely time-dispersive channels. However, it is
also recognized that multicarrier signals have high envelope fluctuations which make them especially sensitive to nonlinear distortion effects. In fact, it is almost unavoidable to have nonlinear distortion effects in the transmission chain. For this reason, it is essential to have a theoretical, accurate characterization of nonlinearly distorted signals not only to evaluate the corresponding impact of these distortion effects on the system’s performance, but also to develop mechanisms to combat them. One of the goals of this thesis is to address these challenges and involves a theoretical characterization of nonlinearly distorted multicarrier signals in a simple, accurate way.
The other goal of this thesis is to study the optimum detection of nonlinearly distorted,
multicarrier signals. Conventionally, nonlinear distortion is seen as a noise term
that degrades the system’s performance, leading even to irreducible error floors. Even
receivers that try to estimate and cancel it have a poor performance, comparatively to the performance associated to a linear transmission, even with perfect cancellation of nonlinear distortion effects. It is shown that the nonlinear distortion should not be considered as a noise term, but instead as something that contains useful information for detection purposes. The adequate receiver to take advantage of this information is the optimum receiver, since it makes a block-by-block detection, allowing us to exploit the nonlinear distortion which is spread along the signal’s band. Although the optimum receiver for nonlinear multicarrier schemes is too complex, due to its necessity to compare the received signal with all possible transmitted sequences, it is important to study its potential performance gains. In this thesis, it is shown that the optimum receiver outperforms the conventional detection, presenting gains not only relatively to conventional receivers that deal with nonlinear multicarrier signals, but also relatively to conventional receivers that deal with linear, multicarrier signals. We also present sub-optimum receivers which are able to approach the performance gains associated to the optimum detection and that can even outperform the conventional linear, multicarrier schemes
Engineering evaluations and studies. Volume 3: Exhibit C
High rate multiplexes asymmetry and jitter, data-dependent amplitude variations, and transition density are discussed
Compression of digital images over local area networks. Appendix 1: Item 3
Differential Pulse Code Modulation (DPCM) has been used with speech for many years. It has not been as successful for images because of poor edge performance. The only corruption in DPC is quantizer error but this corruption becomes quite large in the region of an edge because of the abrupt changes in the statistics of the signal. We introduce two improved DPCM schemes; Edge correcting DPCM and Edge Preservation Differential Coding. These two coding schemes will detect the edges and take action to correct them. In an Edge Correcting scheme, the quantizer error for an edge is encoded using a recursive quantizer with entropy coding and sent to the receiver as side information. In an Edge Preserving scheme, when the quantizer input falls in the overload region, the quantizer error is encoded and sent to the receiver repeatedly until the quantizer input falls in the inner levels. Therefore these coding schemes increase the bit rate in the region of an edge and require variable rate channels. We implement these two variable rate coding schemes on a token wing network. Timed token protocol supports two classes of messages; asynchronous and synchronous. The synchronous class provides a pre-allocated bandwidth and guaranteed response time. The remaining bandwidth is dynamically allocated to the asynchronous class. The Edge Correcting DPCM is simulated by considering the edge information under the asynchronous class. For the simulation of the Edge Preserving scheme, the amount of information sent each time is fixed, but the length of the packet or the bit rate for that packet is chosen depending on the availability capacity. The performance of the network, and the performance of the image coding algorithms, is studied
Adaptive data acquisition for communication networks
In an increasing number of communication systems, such as sensor networks or local area networks within medical, financial or military institutions, nodes communicate information sources (e.g., video, audio) over multiple hops. Moreover, nodes have, or can acquire, correlated information sources from the environment, e.g., from data bases or from measurements. Among the new design problems raised by the outlined scenarios, two key issues are addressed in this dissertation: 1) How to preserve the consistency of sensitive information across multiple hops; 2) How to incorporate the design of actuation in the form of data acquisition and network probing in the optimization of the communication network. These aspects are investigated by using information-theoretic (source and channel coding) models, obtaining fundamental insights that have been corroborated by various illustrative examples. To address point 1), the problem of cascade source coding with side information is investigated. The motivating observation is that, in this class of problems, the estimate of the source obtained at the decoder cannot be generally reproduced at the encoder if it depends directly on the side information. In some applications, such as the one mentioned above, this lack of consistency may be undesirable, and a so called Common Reconstruction (CR) requirement, whereby one imposes that the encoder be able to agree on the decoder’s estimate, may be instead in order. The rate-distortion region is here derived for some special cases of the cascade source coding problem and of the related Heegard-Berger (HB) problem under the CR constraint. As for point 2), the work is motivated by the fact that, in order to enable, or to facilitate, the exchange of information, nodes of a communication network routinely take various types of actions, such as data acquisition or network probing. For instance, sensor nodes schedule the operation of their sensing devices to measure given physical quantities of interest, and wireless nodes probe the state of the channel via training. The problem of optimal data acquisition is studied for a cascade source coding problem, a distributed source coding problem and a two-way source coding problem assuming that the side information sequences can be controlled via the selection of cost-constrained actions. It is shown that a joint design of the description of the source and of the control signals used to guide the selection of the actions at downstream nodes is generally necessary for an efficient use of the available communication links. Instead, the problem of optimal channel probing is studied for a broadcast channel and a point-to-point link in which the decoder is interested in estimating not only the message, but also the state sequence. Finally, the problem of embedding information on the actions is studied for both the source and the channel coding set-ups described above
Recommended from our members
Operational support systems for satellite communications
The role of satellite communications is changing from providing bandwidth linking network operators interconnections towards providing IP enabled communications to end users. This migration from few high-value routes towards many low-value routes means that integration and automation of processes with terrestrial networks becomes critical in driving down unit costs. Integration and automation is necessary on all planes: user, control and management. In satellite communications, management aspects, underpinned by Operational Support Systems (OSS) have received the least research attention, making this a valuable topic for study. In most areas, OSS for satellite systems are similar to other domains. However there are some notable areas of difference which have been the focus of this research. The eTOM business framework, developed by the TMF, has been used to highlight aspects of OSS unique to satellite. Since satellite capacity represents the highest operational cost of a satellite route, effective management while minimising the overhead traffic is critical. The transmission of IP packets is assumed and the real-time measurement of QoS parameters such as packet delay and loss emerged as the most important differences. A number of approaches to QoS measurement are feasible, however the use of trace packets is most promising especially for high network loads. An experiment compares the results from simulations, mathematical models and from a test network, using Poisson and self-similar traffic flows. The relationship between measurement accuracy and trace packet intensity is explored and the measurement response time to steps in traffic load is estimated. It is discovered that measurement accuracy improves as the queue load increases, in contrast to alternative approaches such as sampling of user packets. The response time to steps depends upon the degree of self-similarity and is generally longer than the times recommended by standards. A pragmatic approach to management of different modes is proposed where the measurement method is changed depending on the load