55 research outputs found
On the Construction of Polar Codes
We consider the problem of efficiently constructing polar codes over binary
memoryless symmetric (BMS) channels. The complexity of designing polar codes
via an exact evaluation of the polarized channels to find which ones are "good"
appears to be exponential in the block length. In \cite{TV11}, Tal and Vardy
show that if instead the evaluation if performed approximately, the
construction has only linear complexity. In this paper, we follow this approach
and present a framework where the algorithms of \cite{TV11} and new related
algorithms can be analyzed for complexity and accuracy. We provide numerical
and analytical results on the efficiency of such algorithms, in particular we
show that one can find all the "good" channels (except a vanishing fraction)
with almost linear complexity in block-length (except a polylogarithmic
factor).Comment: In ISIT 201
On the Construction of Polar Codes for Achieving the Capacity of Marginal Channels
Achieving security against adversaries with unlimited computational power is
of great interest in a communication scenario. Since polar codes are capacity
achieving codes with low encoding-decoding complexity and they can approach
perfect secrecy rates for binary-input degraded wiretap channels in symmetric
settings, they are investigated extensively in the literature recently. In this
paper, a polar coding scheme to achieve secrecy capacity in non-symmetric
binary input channels is proposed. The proposed scheme satisfies security and
reliability conditions. The wiretap channel is assumed to be stochastically
degraded with respect to the legitimate channel and message distribution is
uniform. The information set is sent over channels that are good for Bob and
bad for Eve. Random bits are sent over channels that are good for both Bob and
Eve. A frozen vector is chosen randomly and is sent over channels bad for both.
We prove that there exists a frozen vector for which the coding scheme
satisfies reliability and security conditions and approaches the secrecy
capacity. We further empirically show that in the proposed scheme for
non-symmetric binary-input discrete memoryless channels, the equivocation rate
achieves its upper bound in the whole capacity-equivocation region
Channel Upgradation for Non-Binary Input Alphabets and MACs
Consider a single-user or multiple-access channel with a large output
alphabet. A method to approximate the channel by an upgraded version having a
smaller output alphabet is presented and analyzed. The original channel is not
necessarily symmetric and does not necessarily have a binary input alphabet.
Also, the input distribution is not necessarily uniform. The approximation
method is instrumental when constructing capacity achieving polar codes for an
asymmetric channel with a non-binary input alphabet. Other settings in which
the method is instrumental are the wiretap setting as well as the lossy source
coding setting.Comment: 18 pages, 2 figure
Polar Coding for the Large Hadron Collider: Challenges in Code Concatenation
In this work, we present a concatenated repetition-polar coding scheme that
is aimed at applications requiring highly unbalanced unequal bit-error
protection, such as the Beam Interlock System of the Large Hadron Collider at
CERN. Even though this concatenation scheme is simple, it reveals significant
challenges that may be encountered when designing a concatenated scheme that
uses a polar code as an inner code, such as error correlation and unusual
decision log-likelihood ratio distributions. We explain and analyze these
challenges and we propose two ways to overcome them.Comment: Presented at the 51st Asilomar Conference on Signals, Systems, and
Computers, November 201
Information-Distilling Quantizers
Let and be dependent random variables. This paper considers the
problem of designing a scalar quantizer for to maximize the mutual
information between the quantizer's output and , and develops fundamental
properties and bounds for this form of quantization, which is connected to the
log-loss distortion criterion. The main focus is the regime of low ,
where it is shown that, if is binary, a constant fraction of the mutual
information can always be preserved using
quantization levels, and there exist distributions for which this many
quantization levels are necessary. Furthermore, for larger finite alphabets , it is established that an -fraction of the
mutual information can be preserved using roughly quantization levels
- …