30 research outputs found

    Construction and Applications of CRT Sequences

    Full text link
    Protocol sequences are used for channel access in the collision channel without feedback. Each user accesses the channel according to a deterministic zero-one pattern, called the protocol sequence. In order to minimize fluctuation of throughput due to delay offsets, we want to construct protocol sequences whose pairwise Hamming cross-correlation is as close to a constant as possible. In this paper, we present a construction of protocol sequences which is based on the bijective mapping between one-dimensional sequence and two-dimensional array by the Chinese Remainder Theorem (CRT). In the application to the collision channel without feedback, a worst-case lower bound on system throughput is derived.Comment: 16 pages, 5 figures. Some typos in Section V are correcte

    Constructions of binary constant-weight cyclic codes and cyclically permutable codes

    Full text link

    MOCZ for Blind Short-Packet Communication: Practical Aspects

    Get PDF
    We investigate practical aspects of a recently introduced blind (noncoherent) communication scheme, called modulation on conjugate-reciprocal zeros (MOCZ). MOCZ is suitable for a reliable transmission of sporadic and short-packets at ultra-low latency and high spectral efficiency via unknown multipath channels, which are assumed to be static over the receive duration of one packet. The information is modulated on the zeros of the transmitted discrete-time baseband signal’s z− transform. Because of ubiquitous impairments between the transmitter and receiver clocks, a carrier frequency offset occurs after down-conversion to the baseband. This results in a common rotation of the zeros. To identify fractional rotations of the base angle in the zero-pattern, we propose an oversampled direct zero-testing decoder to identify the most likely one. Integer rotations correspond to cyclic shifts of the binary message, which we determine by cyclically permutable codes (CPC). Additionally, the embedding of CPCs into cyclic codes, enables additive error-correction which reduces the bit-error-rate tremendously. Furthermore, we exploit the trident structure in the signal’s autocorrelation for an energy based detector to estimate timing offsets and the effective channel delay spread. We finally demonstrate how this joint data and channel estimation can be largely improved by receive antenna diversity at low SNR

    Mutually Uncorrelated Primers for DNA-Based Data Storage

    Full text link
    We introduce the notion of weakly mutually uncorrelated (WMU) sequences, motivated by applications in DNA-based data storage systems and for synchronization of communication devices. WMU sequences are characterized by the property that no sufficiently long suffix of one sequence is the prefix of the same or another sequence. WMU sequences used for primer design in DNA-based data storage systems are also required to be at large mutual Hamming distance from each other, have balanced compositions of symbols, and avoid primer-dimer byproducts. We derive bounds on the size of WMU and various constrained WMU codes and present a number of constructions for balanced, error-correcting, primer-dimer free WMU codes using Dyck paths, prefix-synchronized and cyclic codes.Comment: 14 pages, 3 figures, 1 Table. arXiv admin note: text overlap with arXiv:1601.0817

    Coded DNN Watermark: Robustness against Pruning Models Using Constant Weight Code

    Get PDF
    Deep Neural Network (DNN) watermarking techniques are increasingly being used to protect the intellectual property of DNN models. Basically, DNN watermarking is a technique to insert side information into the DNN model without significantly degrading the performance of its original task. A pruning attack is a threat to DNN watermarking, wherein the less important neurons in the model are pruned to make it faster and more compact. As a result, removing the watermark from the DNN model is possible. This study investigates a channel coding approach to protect DNN watermarking against pruning attacks. The channel model differs completely from conventional models involving digital images. Determining the suitable encoding methods for DNN watermarking remains an open problem. Herein, we presented a novel encoding approach using constant weight codes to protect the DNN watermarking against pruning attacks. The experimental results confirmed that the robustness against pruning attacks could be controlled by carefully setting two thresholds for binary symbols in the codeword
    corecore