1,403 research outputs found

    Polar Codes with Dynamic Frozen Symbols and Their Decoding by Directed Search

    Full text link
    A novel construction of polar codes with dynamic frozen symbols is proposed. The proposed codes are subcodes of extended BCH codes, which ensure sufficiently high minimum distance. Furthermore, a decoding algorithm is proposed, which employs estimates of the not-yet-processed bit channel error probabilities to perform directed search in code tree, reducing thus the total number of iterations.Comment: Accepted to ITW201

    Towards Optimal Decoding for Polar Codes

    Full text link
    In the conventional successive cancellation (SC) decoder for polar codes, all the future bits to be estimated later are treated as random variables. However, polar codes inevitably involve frozen bits, and their concatenated coding schemes also include parity bits causally generated from the past bits estimated earlier. We refer to the frozen and parity bits located behind a target decoding bit as its future constraints (FCs). Although the values of FCs are deterministic given the past estimates, they have not been exploited in the conventional SC-based decoders, not leading to optimality. In this paper, we propose SC-check (SCC) and belief-propagation SCC (BP-SCC) decoding algorithms in order to leverage FCs in decoding.We further devise a tree search technique based on stack-based backjumping (SBJ) to solve dynamic constraint satisfaction problems (CSPs) formulated by FCs. Over the binary erasure channel (BEC), numerical results show that a combination of the BP-SCC algorithm and the SBJ tree search technique achieves the erasure recovery performance close to the dependence testing (DT) bound, a bound of achievable finite-length performance

    A DETAILED ANALYSIS AND OPTIMIZATION OF THE MODIFIED POLAR DECODING RNTI RECOVERY METHOD TO TRACK USER ACTIVITY IN 5G NETWORKS

    Get PDF
    In this thesis, we analyze and optimize the modified polar decoding and syndrome matching radio network temporary identifier (RNTI) recovery method to de-anonymize the physical downlink control channel (PDCCH) in 5G networks. We present the impact on RNTI recovery of payload length, codeword length, signal-to-noise ratio (SNR) and the Hamming and longest common substring (LCS) recovery methods. Further, we consider the full set of RNTIs and downlink control information (DCI) fields that can be examined for user activity data and propose methods to track user activity within radio networks from the recovered data. Finally, we optimize the RNTI recovery method for different attacker scenarios to demonstrate how an attacker can recover RNTIs, track UEs, and aggregate data about the UE usage patterns and/or metadata about the user.DOD Space, Chantilly, VA 20151Lieutenant Commander, United States NavyApproved for public release. Distribution is unlimited

    Polar coding for optical wireless communication

    Get PDF

    Polar coding for optical wireless communication

    Get PDF
    • …
    corecore