1,243 research outputs found

    Polynomial complexity of polar codes for non-binary alphabets, key agreement and Slepian-Wolf coding

    Full text link
    We consider polar codes for memoryless sources with side information and show that the blocklength, construction, encoding and decoding complexities are bounded by a polynomial of the reciprocal of the gap between the compression rate and the conditional entropy. This extends the recent results of Guruswami and Xia to a slightly more general setting, which in turn can be applied to (1) sources with non-binary alphabets, (2) key generation for discrete and Gaussian sources, and (3) Slepian-Wolf coding and multiple accessing. In each of these cases, the complexity scaling with respect to the number of users is also controlled. In particular, we construct coding schemes for these multi-user information theory problems which achieve optimal rates with an overall polynomial complexity.Comment: 6 pages; presented at CISS 201

    Modified Nonlinear Integral Sliding Mode Control for Satellite Attitude Stabilization Using Magnetically Suspended Gimbaled Momentum Wheel

    Get PDF
    This paper treats the attitude stabilization problem for satellite using only one MSGMW (Magnetically Suspended Gimbaled Momentum Wheel). To start, the coupled dynamic model of satellite and MSGMW is defined and simplified based on the fact that the attitude errors are small during the mission mode that the MSGMW services. In order to improve the dynamic performance, reduce the steady state error and avoid the chattering phenomenon, a modified integral chattering-free sliding mode controller with a nonlinear integral function and a saturation function is introduced. Lyapunov theory is employed to prove the convergence characteristic outside the boundary layer and the terminal convergence characteristic inside the boundary layer. A numerical simulation example is employed to show the effectiveness and suitability of the proposed controller

    Key Capacity with Limited One-Way Communication for Product Sources

    Full text link
    We show that for product sources, rate splitting is optimal for secret key agreement using limited one-way communication at two terminals. This yields an alternative proof of the tensorization property of a strong data processing inequality originally studied by Erkip and Cover and amended recently by Anantharam et al. We derive a `water-filling' solution of the communication-rate--key-rate tradeoff for two arbitrarily correlated vector Gaussian sources, for the case with an eavesdropper, and for stationary Gaussian processes.Comment: 5 pages, ISIT 201
    corecore