Skip to main content

Showing 51–63 of 63 results for author: Mahdavifar, H

.
  1. Relaxed Polar Codes

    Authors: Mostafa El-Khamy, Hessam Mahdavifar, Gennady Feygin, Jungwon Lee, Inyup Kang

    Abstract: Polar codes are the latest breakthrough in coding theory, as they are the first family of codes with explicit construction that provably achieve the symmetric capacity of discrete memoryless channels. Arıkan's polar encoder and successive cancellation decoder have complexities of $N \log N$, for code length $N$. Although, the complexity bound of $N \log N$ is asymptotically favorable, we report in… ▽ More

    Submitted 16 July, 2015; v1 submitted 24 January, 2015; originally announced January 2015.

    Comments: Conference version,Relaxed Channel Polarization for Reduced Complexity Polar Coding, accepted for presentation at IEEE Wireless Communications and Networking Conference WCNC 2015

    Journal ref: IEEE Transactions on Information Theory, 2017

  2. Achieving the Uniform Rate Region of General Multiple Access Channels by Polar Coding

    Authors: Hessam Mahdavifar, Mostafa El-Khamy, Jungwon Lee, Inyup Kang

    Abstract: We consider the problem of polar coding for transmission over $m$-user multiple access channels. In the proposed scheme, all users encode their messages using a polar encoder, while a joint successive cancellation decoder is deployed at the receiver. The encoding is done separately across the users and is independent of the target achievable rate, in the sense that the encoder core is the regular… ▽ More

    Submitted 10 July, 2014; originally announced July 2014.

    Comments: submitted to IEEE Transactions on Communications, July 9, 2014. arXiv admin note: substantial text overlap with arXiv:1307.2889

  3. Performance Limits and Practical Decoding of Interleaved Reed-Solomon Polar Concatenated Codes

    Authors: Hessam Mahdavifar, Mostafa El-Khamy, Jungwon Lee, Inyup Kang

    Abstract: A scheme for concatenating the recently invented polar codes with non-binary MDS codes, as Reed-Solomon codes, is considered. By concatenating binary polar codes with interleaved Reed-Solomon codes, we prove that the proposed concatenation scheme captures the capacity-achieving property of polar codes, while having a significantly better error-decay rate. We show that for any $ε> 0$, and total fra… ▽ More

    Submitted 5 August, 2013; originally announced August 2013.

    Comments: Submitted to IEEE Transactions on Communications. arXiv admin note: substantial text overlap with arXiv:1301.7491

  4. Achieving the Uniform Rate Region of General Multiple Access Channels by Polar Coding

    Authors: Hessam Mahdavifar, Mostafa El-Khamy, Jungwon Lee, Inyup Kang

    Abstract: We consider the problem of polar coding for transmission over $m$-user multiple access channels. In the proposed scheme, all users encode their messages using a polar encoder, while a multi-user successive cancellation decoder is deployed at the receiver. The encoding is done separately across the users and is independent of the target achievable rate. For the code construction, the positions of i… ▽ More

    Submitted 28 August, 2016; v1 submitted 10 July, 2013; originally announced July 2013.

    Journal ref: IEEE Transactions on Communications 64.2 (2016): 467-478

  5. arXiv:1302.0265  [pdf, other

    cs.IT

    Compound Polar Codes

    Authors: Hessam Mahdavifar, Mostafa El-Khamy, Jungwon Lee, Inyup Kang

    Abstract: A capacity-achieving scheme based on polar codes is proposed for reliable communication over multi-channels which can be directly applied to bit-interleaved coded modulation schemes. We start by reviewing the ground-breaking work of polar codes and then discuss our proposed scheme. Instead of encoding separately across the individual underlying channels, which requires multiple encoders and decode… ▽ More

    Submitted 1 February, 2013; originally announced February 2013.

  6. arXiv:1301.7491  [pdf, other

    cs.IT

    On the Construction and Decoding of Concatenated Polar Codes

    Authors: Hessam Mahdavifar, Mostafa El-Khamy, Jungwon Lee, Inyup Kang

    Abstract: A scheme for concatenating the recently invented polar codes with interleaved block codes is considered. By concatenating binary polar codes with interleaved Reed-Solomon codes, we prove that the proposed concatenation scheme captures the capacity-achieving property of polar codes, while having a significantly better error-decay rate. We show that for any $ε> 0$, and total frame length $N$, the pa… ▽ More

    Submitted 30 January, 2013; originally announced January 2013.

  7. arXiv:1212.5577  [pdf

    cs.IT

    A Structured Construction of Optimal Measurement Matrix for Noiseless Compressed Sensing via Analog Polarization

    Authors: Linbo Li, Hessam Mahdavifar, Inyup Kang

    Abstract: In this paper, we propose a method of structured construction of the optimal measurement matrix for noiseless compressed sensing (CS), which achieves the minimum number of measurements which only needs to be as large as the sparsity of the signal itself to be recovered to guarantee almost error-free recovery, for sufficiently large dimension. To arrive at the results, we employ a duality between n… ▽ More

    Submitted 29 December, 2014; v1 submitted 21 December, 2012; originally announced December 2012.

    Comments: 26 pages. Rev5 added new results of Theorem 2 (proving that analog polar encoding achieves vanishing P_e while achieving the dimension rate (1-p) across SANC(p)) and other modifications/additions. Revision 1 done. Revision 0: Revised Appendix I, added Appendix IV, and other minor changes. Manuscript has been submitted to IEEE Transactions on Information Theory

  8. arXiv:1210.7515  [pdf, ps, other

    cs.IT

    Rewriting Codes for Flash Memories

    Authors: Eitan Yaakobi, Hessam Mahdavifar, Paul H. Siegel, Alexander Vardy, Jack K. Wolf

    Abstract: Flash memory is a non-volatile computer memory comprising blocks of cells, wherein each cell can take on q different values or levels. While increasing the cell level is easy, reducing the level of a cell can be accomplished only by erasing an entire block. Since block erasures are highly undesirable, coding schemes - known as floating codes (or flash codes) and buffer codes - have been designed i… ▽ More

    Submitted 28 October, 2012; originally announced October 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:0905.1512

  9. arXiv:1202.0866  [pdf, ps, other

    cs.IT

    List-decoding of Subspace Codes and Rank-Metric Codes up to Singleton Bound

    Authors: Hessam Mahdavifar, Alexander Vardy

    Abstract: Subspace codes and rank-metric codes can be used to correct errors and erasures in network, with linear network coding. Subspace codes were introduced by Koetter and Kschischang to correct errors and erasures in networks where topology is unknown (the noncoherent case). In a previous work, we have developed a family of subspace codes, based upon the Koetter-Kschichang construction, which are effic… ▽ More

    Submitted 3 February, 2012; originally announced February 2012.

  10. arXiv:1202.0338  [pdf, other

    cs.IT

    Algebraic List-decoding of Subspace Codes

    Authors: Hessam Mahdavifar, Alexander Vardy

    Abstract: Subspace codes were introduced in order to correct errors and erasures for randomized network coding, in the case where network topology is unknown (the noncoherent case). Subspace codes are indeed collections of subspaces of a certain vector space over a finite field. The Koetter-Kschischang construction of subspace codes are similar to Reed-Solomon codes in that codewords are obtained by evaluat… ▽ More

    Submitted 1 February, 2012; originally announced February 2012.

  11. Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes

    Authors: Hessam Mahdavifar, Alexander Vardy

    Abstract: Suppose Alice wishes to send messages to Bob through a communication channel C_1, but her transmissions also reach an eavesdropper Eve through another channel C_2. The goal is to design a coding scheme that makes it possible for Alice to communicate both reliably and securely. Reliability is measured in terms of Bob's probability of error in recovering the message, while security is measured in te… ▽ More

    Submitted 25 September, 2011; v1 submitted 21 July, 2010; originally announced July 2010.

    Comments: 16 pages, 5 figures, published in the IEEE Transactions on Information Theory, vol. 57, no. 10, October 2011. arXiv admin note: substantial text overlap with arXiv:1001.0210

    MSC Class: 94B99; 94A60 ACM Class: E.4

    Journal ref: IEEE Transactions on Information Theory, vol. 57, no. 10, October 2011

  12. arXiv:1001.0210  [pdf, ps, other

    cs.IT cs.CR

    Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes

    Authors: Hessam Mahdavifar, Alexander Vardy

    Abstract: Suppose Alice wishes to send messages to Bob through a communication channel C_1, but her transmissions also reach an eavesdropper Eve through another channel C_2. The goal is to design a coding scheme that makes it possible for Alice to communicate both reliably and securely. Reliability is measured in terms of Bob's probability of error in recovering the message, while security is measured in te… ▽ More

    Submitted 3 April, 2011; v1 submitted 1 January, 2010; originally announced January 2010.

    Comments: 15 pages, to appear in the IEEE Transactions on Information Theory

    MSC Class: 94B99; 94A60 ACM Class: E.4

  13. arXiv:0905.1512  [pdf, ps, other

    cs.IT

    A Nearly Optimal Construction of Flash Codes

    Authors: Hessam Mahdavifar, Paul H. Siegel, Alexander Vardy, Jack K. Wolf, Eitan Yaakobi

    Abstract: Flash memory is a non-volatile computer memory comprised of blocks of cells, wherein each cell can take on q different values or levels. While increasing the cell level is easy, reducing the level of a cell can be accomplished only by erasing an entire block. Since block erasures are highly undesirable, coding schemes - known as floating codes or flash codes - have been designed in order to maxi… ▽ More

    Submitted 10 May, 2009; originally announced May 2009.