1,243 research outputs found
Polynomial complexity of polar codes for non-binary alphabets, key agreement and Slepian-Wolf coding
We consider polar codes for memoryless sources with side information and show
that the blocklength, construction, encoding and decoding complexities are
bounded by a polynomial of the reciprocal of the gap between the compression
rate and the conditional entropy. This extends the recent results of Guruswami
and Xia to a slightly more general setting, which in turn can be applied to (1)
sources with non-binary alphabets, (2) key generation for discrete and Gaussian
sources, and (3) Slepian-Wolf coding and multiple accessing. In each of these
cases, the complexity scaling with respect to the number of users is also
controlled. In particular, we construct coding schemes for these multi-user
information theory problems which achieve optimal rates with an overall
polynomial complexity.Comment: 6 pages; presented at CISS 201
Modified Nonlinear Integral Sliding Mode Control for Satellite Attitude Stabilization Using Magnetically Suspended Gimbaled Momentum Wheel
This paper treats the attitude stabilization problem for satellite using only one MSGMW (Magnetically Suspended Gimbaled Momentum Wheel). To start, the coupled dynamic model of satellite and MSGMW is defined and simplified based on the fact that the attitude errors are small during the mission mode that the MSGMW services. In order to improve the dynamic performance, reduce the steady state error and avoid the chattering phenomenon, a modified integral chattering-free sliding mode controller with a nonlinear integral function and a saturation function is introduced. Lyapunov theory is employed to prove the convergence characteristic outside the boundary layer and the terminal convergence characteristic inside the boundary layer. A numerical simulation example is employed to show the effectiveness and suitability of the proposed controller
Key Capacity with Limited One-Way Communication for Product Sources
We show that for product sources, rate splitting is optimal for secret key
agreement using limited one-way communication at two terminals. This yields an
alternative proof of the tensorization property of a strong data processing
inequality originally studied by Erkip and Cover and amended recently by
Anantharam et al. We derive a `water-filling' solution of the
communication-rate--key-rate tradeoff for two arbitrarily correlated vector
Gaussian sources, for the case with an eavesdropper, and for stationary
Gaussian processes.Comment: 5 pages, ISIT 201
- …