Skip to main content

Showing 1–28 of 28 results for author: Dumer, I

.
  1. arXiv:2101.10145  [pdf, other

    cs.IT

    Codes approaching the Shannon limit with polynomial complexity per information bit

    Authors: Ilya Dumer, Navid Gharavi

    Abstract: We consider codes for channels with extreme noise that emerge in various low-power applications. Simple LDPC-type codes with parity checks of weight 3 are first studied for any dimension $m\rightarrow\infty.$ These codes form modulation schemes: they improve the original channel output for any $SNR>$ $-6$ dB (per information bit) and gain $3$ dB over uncoded modulation as $SNR$ grows. However, the… ▽ More

    Submitted 25 January, 2021; originally announced January 2021.

    Comments: 18 pages, 3 figures

  2. arXiv:1805.00644  [pdf, other

    math-ph cond-mat.stat-mech

    Duality and free energy analyticity bounds for few-body Ising models with extensive homology rank

    Authors: Yi Jiang, Ilya Dumer, Alexey A. Kovalev, Leonid P. Pryadko

    Abstract: We consider pairs of few-body Ising models where each spin enters a bounded number of interaction terms (bonds), such that each model can be obtained from the dual of the other after freezing $k$ spins on large-degree sites. Such a pair of Ising models can be interpreted as a two-chain complex with $k$ being the rank of the first homology group. Our focus is on the case where $k$ is extensive, tha… ▽ More

    Submitted 8 May, 2018; v1 submitted 2 May, 2018; originally announced May 2018.

    Comments: 18 pages, 6 figures

  3. Numerical and analytical bounds on threshold error rates for hypergraph-product codes

    Authors: Alexey A. Kovalev, Sanjay Prabhakar, Ilya Dumer, Leonid P. Pryadko

    Abstract: We study analytically and numerically decoding properties of finite rate hypergraph-product quantum LDPC codes obtained from random (3,4)-regular Gallager codes, with a simple model of independent X and Z errors. Several non-trival lower and upper bounds for the decodable region are constructed analytically by analyzing the properties of the homological difference, equal minus the logarithm of the… ▽ More

    Submitted 13 June, 2018; v1 submitted 5 April, 2018; originally announced April 2018.

    Comments: 14 pages, 5 figures

    Journal ref: Phys. Rev. A 97, 062320 (2018)

  4. arXiv:1706.06764   

    cs.IT

    An elementary description of polarization process

    Authors: Ilya Dumer

    Abstract: We analyze successive cancellation (SC) decoder by using two random functions. The first function is related to the likelihoods of 0 and 1 in each code position, while the second gives the difference between their posterior probabilities. We then study the second power moments of both functions. We show that these moments are being squared in channel transformations, while their product tends to 0… ▽ More

    Submitted 23 May, 2020; v1 submitted 21 June, 2017; originally announced June 2017.

    Comments: The paper employs wrong equation (14) in Section 5. This equation is then used in Sections 6 and 7. In particular, Theorem 1 of Section 6 contains incorrect proof

  5. arXiv:1703.05307  [pdf, ps, other

    cs.IT

    On decoding algorithms for polar codes

    Authors: Ilya Dumer

    Abstract: We survey the known list decoding algorithms for polar codes and compare their complexity. Index terms: Polar codes; Reed-Muller codes; successive cancellation decoding.

    Submitted 17 March, 2017; v1 submitted 14 March, 2017; originally announced March 2017.

    Comments: 4 pages, 2 figures

  6. arXiv:1703.05306  [pdf, ps, other

    cs.IT

    Recursive Decoding and Its Performance for Low-Rate Reed-Muller Codes

    Authors: Ilya Dumer

    Abstract: Recursive decoding techniques are considered for Reed-Muller (RM) codes of growing length $n$ and fixed order $r.$ An algorithm is designed that has complexity of order $n\log n$ and corrects most error patterns of weight up to $n(1/2-\varepsilon)$ given that $\varepsilon$ exceeds $n^{-1/2^{r}}.$ This improves the asymptotic bounds known for decoding RM codes with nonexponential complexity.

    Submitted 14 March, 2017; originally announced March 2017.

    Journal ref: IEEE Trans. Info. Theory, vol. 50, pp. 811-823, 2004

  7. arXiv:1703.05305  [pdf, ps, other

    cs.IT

    Soft decision decoding of Reed-Muller codes: recursive lists

    Authors: Ilya Dumer, Kirill Shabunov

    Abstract: Recursive list decoding is considered for Reed-Muller (RM) codes. The algorithm repeatedly relegates itself to the shorter RM codes by recalculating the posterior probabilities of their symbols. Intermediate decodings are only performed when these recalculations reach the trivial RM codes. In turn, the updated lists of most plausible codewords are used in subsequent decodings. The algorithm is fur… ▽ More

    Submitted 14 March, 2017; originally announced March 2017.

    Journal ref: IEEE Trans. Info. Theory, vol. 52, no. 3, pp. 1260-1266, 2006

  8. arXiv:1703.05304  [pdf, other

    cs.IT

    Recursive List Decoding for Reed-Muller Codes

    Authors: Ilya Dumer, Kirill Shabunov

    Abstract: We consider recursive decoding for Reed-Muller (RM) codes and their subcodes. Two new recursive techniques are described. We analyze asymptotic properties of these algorithms and show that they substantially outperform other decoding algorithms with nonexponential complexity known for RM codes. Decoding performance is further enhanced by using intermediate code lists and permutation procedures. Fo… ▽ More

    Submitted 14 March, 2017; originally announced March 2017.

    Journal ref: "Information, Coding and Mathematics", ed. M. Blaum, P. Farrell, and H.C.A. van Tilborg, Kluwer, Boston, 2002, pp. 279-298

  9. arXiv:1703.05303  [pdf, ps, other

    cs.IT

    Recursive decoding of Reed-Muller codes

    Authors: Ilya Dumer

    Abstract: New soft- and hard decision decoding algorithms are presented for general Reed-Muller codes $\left\{\genfrac{}{}{0pt}{}{m}{r}\right\} $ of length $2^{m}$ and distance $2^{m-r}$. We use Plotkin $(u,u+v)$ construction and decompose code $\left\{\genfrac{}{}{0pt}{}{m}{r}\right\} $ onto subblocks $u\in\left\{\genfrac{}{}{0pt}{}{m-1}{r}\right\} $ and… ▽ More

    Submitted 14 March, 2017; originally announced March 2017.

    Journal ref: Proc. 37th Allerton Conf. on Commun., Control, and Computing, Monticello, IL, USA, 1999, pp. 61-69

  10. arXiv:1703.05302  [pdf, ps, other

    cs.IT

    Recursive constructions and their maximum likelihood decoding

    Authors: Ilya Dumer, Kirill Shabunov

    Abstract: We consider recursive decoding techniques for RM codes, their subcodes, and newly designed codes. For moderate lengths up to 512, we obtain near-optimum decoding with feasible complexity.

    Submitted 14 March, 2017; originally announced March 2017.

    Journal ref: Proc. 38th Allerton Conf. Communication, Control, and Computing, Monticello, IL, USA, 2000, pp. 71-80

  11. arXiv:1702.04886  [pdf, ps, other

    cs.IT

    Polar codes with a stepped boundary

    Authors: Ilya Dumer

    Abstract: We consider explicit polar constructions of blocklength $n\rightarrow\infty$ for the two extreme cases of code rates $R\rightarrow1$ and $R\rightarrow0.$ For code rates $R\rightarrow1,$ we design codes with complexity order of $n\log n$ in code construction, encoding, and decoding. These codes achieve the vanishing output bit error rates on the binary symmetric channels with any transition error p… ▽ More

    Submitted 16 February, 2017; originally announced February 2017.

    Comments: This article has been submitted to ISIT 2017

  12. arXiv:1611.07164  [pdf, other

    cs.IT quant-ph

    Distance verification for classical and quantum LDPC codes

    Authors: Ilya Dumer, Alexey A. Kovalev, Leonid P. Pryadko

    Abstract: The techniques of distance verification known for general linear codes are re-applied to quantum stabilizer codes. Then distance verification is addressed for classical and quantum LDPC codes. New complexity bounds for distance verification with provable performance are derived using the average weight spectra of the ensembles of LDPC codes. These bounds are expressed in terms of the erasure-corre… ▽ More

    Submitted 22 November, 2016; originally announced November 2016.

    Comments: 16 pages, 2 figures

  13. Distance verification for LDPC codes

    Authors: Ilya Dumer, Alexey A. Kovalev, Leonid P. Pryadko

    Abstract: The problem of finding code distance has been long studied for the generic ensembles of linear codes and led to several algorithms that substantially reduce exponential complexity of this task. However, no asymptotic complexity bounds are known for distance verification in other ensembles of linear codes. Our goal is to re-design the existing generic algorithms of distance verification and derive… ▽ More

    Submitted 8 May, 2016; originally announced May 2016.

    Comments: 5 pages, 1 figure, to appear in Proceedings of ISIT 2016 - IEEE International Symposium on Information Theory, Barcelona

  14. Thresholds for correcting errors, erasures, and faulty syndrome measurements in degenerate quantum codes

    Authors: Ilya Dumer, Alexey A. Kovalev, Leonid P. Pryadko

    Abstract: We suggest a technique for constructing lower (existence) bounds for the fault-tolerant threshold to scalable quantum computation applicable to degenerate quantum codes with sublinear distance scaling. We give explicit analytic expressions combining probabilities of erasures, depolarizing errors, and phenomenological syndrome measurement errors for quantum LDPC codes with logarithmic or larger dis… ▽ More

    Submitted 18 December, 2014; originally announced December 2014.

    Comments: 10 pages, 2 figures

    Journal ref: Phys. Rev. Lett. 115, 050502 (2015)

  15. arXiv:1405.0348  [pdf, other

    quant-ph cs.IT

    Numerical Techniques for Finding the Distances of Quantum Codes

    Authors: Ilya Dumer, Alexey A. Kovalev, Leonid P. Pryadko

    Abstract: We survey the existing techniques for calculating code distances of classical codes and apply these techniques to generic quantum codes. For classical and quantum LDPC codes, we also present a new linked-cluster technique. It reduces complexity exponent of all existing deterministic techniques designed for codes with small relative distances (which include all known families of quantum LDPC codes)… ▽ More

    Submitted 2 May, 2014; originally announced May 2014.

    Comments: 5 pages, 1 figure, to appear in Proceedings of ISIT 2014 - IEEE International Symposium on Information Theory, Honolulu

  16. arXiv:1302.1845  [pdf, other

    quant-ph cs.IT

    Linked-Cluster Technique for Finding the Distance of a Quantum LDPC Code

    Authors: Alexey A. Kovalev, Ilya Dumer, Leonid P. Pryadko

    Abstract: We present a linked-cluster technique for calculating the distance of a quantum LDPC code. It offers an advantage over existing deterministic techniques for codes with small relative distances (which includes all known families of quantum LDPC codes), and over the probabilistic technique for codes with sufficiently high rates.

    Submitted 7 February, 2013; originally announced February 2013.

    Comments: 5.5 pages

  17. Low-complexity quantum codes designed via codeword-stabilized framework

    Authors: Alexey A. Kovalev, Ilya Dumer, Leonid P. Pryadko

    Abstract: We consider design of the quantum stabilizer codes via a two-step, low-complexity approach based on the framework of codeword-stabilized (CWS) codes. In this framework, each quantum CWS code can be specified by a graph and a binary code. For codes that can be obtained from a given graph, we give several upper bounds on the distance of a generic (additive or non-additive) CWS code, and the lower Gi… ▽ More

    Submitted 27 August, 2011; originally announced August 2011.

    Comments: 12 pages, 3 figures, 1 table

    Journal ref: Phys. Rev. A 84, 062319 (2011)

  18. Structured Error Recovery for Codeword-Stabilized Quantum Codes

    Authors: Yunfan Li, Ilya Dumer, Markus Grassl, Leonid P. Pryadko

    Abstract: Codeword stabilized (CWS) codes are, in general, non-additive quantum codes that can correct errors by an exhaustive search of different error patterns, similar to the way that we decode classical non-linear codes. For an n-qubit quantum code correcting errors on up to t qubits, this brute-force approach consecutively tests different errors of weight t or less, and employs a separate n-qubit meas… ▽ More

    Submitted 8 March, 2010; v1 submitted 16 December, 2009; originally announced December 2009.

    Comments: 13 pages, 9 eps figures

    Journal ref: Phys. Rev. A 81, 052337 (2010)

  19. Clustered Error Correction of Codeword-Stabilized Quantum Codes

    Authors: Yunfan Li, Ilya Dumer, Leonid P. Pryadko

    Abstract: Codeword stabilized (CWS) codes are a general class of quantum codes that includes stabilizer codes and many families of non-additive codes with good parameters. For such a non-additive code correcting all t-qubit errors, we propose an algorithm that employs a single measurement to test all errors located on a given set of t qubits. Compared with exhaustive error screening, this reduces the tota… ▽ More

    Submitted 8 March, 2010; v1 submitted 12 July, 2009; originally announced July 2009.

    Comments: 4 pages, 2 figures, revtex4; number of editorial changes in v4

  20. arXiv:cs/0612073  [pdf, ps, other

    cs.IT cs.CR

    On the Fingerprinting Capacity Under the Marking Assumption

    Authors: N. Prasanth Anthapadmanabhan, Alexander Barg, Ilya Dumer

    Abstract: We address the maximum attainable rate of fingerprinting codes under the marking assumption, studying lower and upper bounds on the value of the rate for various sizes of the attacker coalition. Lower bounds are obtained by considering typical coalitions, which represents a new idea in the area of fingerprinting and enables us to improve the previously known lower bounds for coalitions of size t… ▽ More

    Submitted 20 February, 2008; v1 submitted 14 December, 2006; originally announced December 2006.

    Comments: final version, 12 pages, 2 figures, to appear in IEEE Trans. on Inform. Theory - Special Issue on Information-theoretic Security, Jun 2008, simplified proofs in Sections II and III, changes in Theorem 4.1

  21. arXiv:math/0606002  [pdf, ps, other

    math.MG

    Covering spheres with spheres

    Authors: Ilya Dumer

    Abstract: Given a sphere of any radius $r$ in an $n$-dimensional Euclidean space, we study the coverings of this sphere with solid spheres of radius one. Our goal is to design a covering of the lowest covering density, which defines the average number of solid spheres covering a point in a bigger sphere. For a growing dimension $n,$ we design a covering that has covering density of order $(n\ln n)/2$ for th… ▽ More

    Submitted 20 May, 2018; v1 submitted 31 May, 2006; originally announced June 2006.

    Comments: 11 pages, 1 figure

    Journal ref: Discrete Computational Geometry, vol. 38, pp. 665--679, 2007

  22. Non-Holonomic Control IV : Coherence Protection in a Rubidium isotope

    Authors: E. Brion, V. M. Akulin, D. Comparat, I. Dumer, V. Gershkovich, G. Harel, G. Kurizki, I. Mazets, P. Pillet

    Abstract: In this paper, we present a realistic application of the coherence protection method proposed in the previous article. A qubit of information encoded on the two spin states of a Rubidium isotope is protected from the action of electric and magnetic fields.

    Submitted 16 July, 2005; originally announced July 2005.

  23. Non-Holonomic Control III : Coherence Protection by the Quantum Zeno Effect and Non-Holonomic Control

    Authors: E. Brion, V. M. Akulin, D. Comparat, I. Dumer, V. Gershkovich, G. Harel, G. Kurizki, I. Mazets, P. Pillet

    Abstract: In this paper, we present a coherence protection method based upon a multidimensional generalization of the Quantum Zeno Effect, as well as ideas from the coding theory. The non-holonomic control technique is employed as a physical tool which allows its effective implementation. The two limiting cases of small and large quantum systems are considered.

    Submitted 16 July, 2005; originally announced July 2005.

  24. Non-holonomic Control II : Non-holonomic Quantum Devices

    Authors: E. Brion, V. M. Akulin, D. Comparat, I. Dumer, V. Gershkovich, G. Harel, G. Kurizki, I. Mazets, P. Pillet

    Abstract: In this paper, we show how the non-holonomic control technique can be employed to build completely controlled quantum devices. Examples of such controlled structures are provided.

    Submitted 16 July, 2005; originally announced July 2005.

  25. Non-Holonomic Control I

    Authors: E. Brion, V. M. Akulin, D. Comparat, I. Dumer, V. Gershkovich, G. Harel, G. Kurizki, I. Mazets, P. Pillet

    Abstract: In this paper, we present a universal control technique, the non-holonomic control, which allows us to impose any arbitrarily prescribed unitary evolution to any quantum system through the alternate application of two well-chosen perturbations.

    Submitted 16 July, 2005; originally announced July 2005.

  26. arXiv:cs/0406039  [pdf, ps, other

    cs.IT

    Long Nonbinary Codes Exceeding the Gilbert - Varshamov Bound for any Fixed Distance

    Authors: Sergey Yekhanin, Ilya Dumer

    Abstract: Let A(q,n,d) denote the maximum size of a q-ary code of length n and distance d. We study the minimum asymptotic redundancy ρ(q,n,d)=n-log_q A(q,n,d) as n grows while q and d are fixed. For any d and q<=d-1, long algebraic codes are designed that improve on the BCH codes and have the lowest asymptotic redundancy ρ(q,n,d) <= ((d-3)+1/(d-2)) log_q n known to date. Prior to this work, codes of fixe… ▽ More

    Submitted 23 June, 2004; v1 submitted 21 June, 2004; originally announced June 2004.

    Comments: Submitted to IEEE Trans. on Info. Theory

  27. Coherence protection by the quantum Zeno effect and non-holonomic control in a Rydberg Rubidium isotope

    Authors: E. Brion, V. M. Akulin, D. Comparat, I. Dumer, G. Harel, N. Kebaili, G. Kurizki, I. Mazets, P. Pillet

    Abstract: The protection of the coherence of open quantum systems against the influence of their environment is a very topical issue. A scheme is proposed here which protects a general quantum system from the action of a set of arbitrary uncontrolled unitary evolutions. This method draws its inspiration from ideas of standard error-correction (ancilla adding, coding and decoding) and the Quantum Zeno Effe… ▽ More

    Submitted 3 October, 2005; v1 submitted 30 March, 2004; originally announced March 2004.

    Comments: 17 pages, 6 figures

    Journal ref: Phys. Rev. A 71, 052311 (2005)

  28. Decoherence Correction by the Zeno Effect and Non-Holonomic Control

    Authors: E. Brion, G. Harel, N. Kebaili, V. M. Akulin, I. Dumer

    Abstract: We show that multidimensional Zeno effect combined with non-holonomic control allows to efficiently protect quantum systems from decoherence by a method similar to classical coding. Contrary to the conventional approach, our method is applicable to arbitrary error-inducing Hamiltonians and general quantum systems. We also propose algorithms of finding encoding that approaches the Hamming upper b… ▽ More

    Submitted 31 October, 2002; originally announced November 2002.

    Comments: 4 revtex pages

    Journal ref: Europhys. Lett. 66, 157 (2004); J. Opt. B: Quantum Semiclass. Opt. 7, S353 (2005)