18 research outputs found
Conventional and manipulated growth of Cu-Cu(111)
Molecular beam epitaxy of Cu on Cu(111) was studied using thermal energy He scattering, in the temperature range between 100 and 450 K. Three-dimensional growth was observed in the whole temperature range. To determine the onset of various diffusion processes, submonolayer films formed by deposition at low temperature were annealed. Annealing proceeds in two steps. The first step is interpreted as a change in island shape, the second as Ostwald-ripening. A comparison with homoepitaxy on Pt(111) and Ag(111) is made. Growth manipulation was carried out by artificially increasing the island number density via intervention in the nucleation stage of each layer. The procedures applied were temperature reduction during nucleation as well as pulsed ion bombardment. These techniques enabled the convenient growth of good quality films consisting of a large number of monolayers. Finally, the use of oxygen as a surfactant modifying the growth mode was investigated. Under some growth conditions, pre-exposure of the surface to oxygen was found to induce weak He-intensity oscillations during deposition. The quality of the films grown in this way was, however, low
Efficient Computation of EXIT Functions for Nonbinary Iterative Decoding
The calculation of nonbinary extrinsic information transfer charts for the iterative decoding of concatenated index-based codes is addressed. We show that the extrinsic information at the output of a constituent a posteriori probability decoder can be calculated with very low complexity, where expensive histogram measurements are not required anymore. An example for turbo trellis-coded modulation demonstrates the capabilities of the proposed approach
Near-capacity turbo trellis coded modulation design based on EXIT charts and union bounds
Bandwidth efficient parallel-concatenated Turbo Trellis Coded Modulation (TTCM) schemes were designed for communicating over uncorrelated Rayleigh fading channels. A symbol-based union bound was derived for analysing the error floor of the proposed TTCM schemes. A pair of In-phase (I) and Quadrature-phase (Q) interleavers were employed for interleaving the I and Q components of the TTCM coded symbols, in order to attain an increased diversity gain. The decoding convergence of the IQ-TTCM schemes was analysed using symbol-based EXtrinsic Information Transfer (EXIT) charts. The best TTCM component codes were selected with the aid of both the symbol-based union bound and non-binary EXIT charts, for designing capacity-approaching IQ-TTCM schemes in the context of 8PSK, 16QAM, 32QAM and 64QAM modulation schemes
Private and Secure Distributed Matrix Multiplication with Flexible Communication Load
Large matrix multiplications are central to large-scale machine learning
applications. These operations are often carried out on a distributed computing
platform with a master server and multiple workers in the cloud operating in
parallel. For such distributed platforms, it has been recently shown that
coding over the input data matrices can reduce the computational delay,
yielding a trade-off between recovery threshold, i.e., the number of workers
required to recover the matrix product, and communication load, i.e., the total
amount of data to be downloaded from the workers. In this paper, in addition to
exact recovery requirements, we impose security and privacy constraints on the
data matrices, and study the recovery threshold as a function of the
communication load. We first assume that both matrices contain private
information and that workers can collude to eavesdrop on the content of these
data matrices. For this problem, we introduce a novel class of secure codes,
referred to as secure generalized PolyDot (SGPD) codes, that generalize
state-of-the-art non-secure codes for matrix multiplication. SGPD codes allow a
flexible trade-off between recovery threshold and communication load for a
fixed maximum number of colluding workers while providing perfect secrecy for
the two data matrices. We then study a connection between secure matrix
multiplication and private information retrieval. We specifically assume that
one of the data matrices is taken from a public set known to all the workers.
In this setup, the identity of the matrix of interest should be kept private
from the workers. For this model, we present a variant of generalized PolyDot
codes that can guarantee both secrecy of one matrix and privacy for the
identity of the other matrix for the case of no colluding servers.Comment: 12 pages, 9 figures, this submission subsumes arXiv:1901.07705. This
work has been submitted to the IEEE for possible publicatio
LDPC Coded Multiuser Shaping for the Gaussian Multiple Access Channel
The joint design of input constellation and low-density parity-check (LDPC) codes to approach the symmetric capacity of the two-user Gaussian multiple access channel is studied. More specifically, multilevel coding is employed at each user to construct a high-order input constellation and the constellations of the users are jointly designed so as to maximize the multiuser shaping gain. At the receiver, each layer of the multilevel coding is jointly decoded among users, while successive cancellation is employed across layers. The LDPC code employed by each user in each layer is designed using EXIT charts to support joint decoding among users for the prescribed per-layer rate and SNR. Numerical simulations are provided to validate the proposed constellation and LDPC code designs