-
Identification based on random coding
Authors:
Vladimir R. Sidorenko,
Christian Deppe
Abstract:
Ahlswede and Dueck showed possibility to identify with high probability one out of $M$ messages by transmitting $1/C\log\log M$ bits only, where $C$ is the channel capacity. It is known that this identification can be based on error-correcting codes. We propose an identification procedure based on random codes that achieves channel capacity. Then we show that this procedure can be simplified using…
▽ More
Ahlswede and Dueck showed possibility to identify with high probability one out of $M$ messages by transmitting $1/C\log\log M$ bits only, where $C$ is the channel capacity. It is known that this identification can be based on error-correcting codes. We propose an identification procedure based on random codes that achieves channel capacity. Then we show that this procedure can be simplified using pseudo-random generators.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Prototype Design of a Timing and Fast Control system in the CBM Experiment
Authors:
V. Sidorenko,
I. Fröhlich,
W. F. J. Müller,
D. Emschermann,
S. Bähr,
C. Sturm,
J. Becker
Abstract:
The Compressed Baryonic Matter (CBM) experiment is designed to handle interaction rates of up to 10 MHz and up to 1 TB/s of raw data generated. With triggerless streaming data acquisition in the experiment and beam intensity fluctuations, it is expected that occasional data bursts will surpass bandwidth capabilities of the Data Acquisition System (DAQ) system. In order to preserve integrity of eve…
▽ More
The Compressed Baryonic Matter (CBM) experiment is designed to handle interaction rates of up to 10 MHz and up to 1 TB/s of raw data generated. With triggerless streaming data acquisition in the experiment and beam intensity fluctuations, it is expected that occasional data bursts will surpass bandwidth capabilities of the Data Acquisition System (DAQ) system. In order to preserve integrity of event data, the bandwidth of DAQ must be throttled in an organised way with minimum information loss. The Timing and Fast Control (TFC) system provides a latency-optimised datapath for throttling commands and distributes a system clock together with a global timestamp. This paper describes a prototype design of the system with focus on synchronisation and its evaluation.
△ Less
Submitted 20 December, 2021; v1 submitted 25 October, 2021;
originally announced October 2021.
-
Doubly-Exponential Identification via Channels: Code Constructions and Bounds
Authors:
Onur Günlü,
Joerg Kliewer,
Rafael F. Schaefer,
Vladimir Sidorenko
Abstract:
Consider the identification (ID) via channels problem, where a receiver wants to decide whether the transmitted identifier is its identifier, rather than decoding the identifier. This model allows to transmit identifiers whose size scales doubly-exponentially in the blocklength, unlike common transmission (or channel) codes whose size scales exponentially. It suffices to use binary constant-weight…
▽ More
Consider the identification (ID) via channels problem, where a receiver wants to decide whether the transmitted identifier is its identifier, rather than decoding the identifier. This model allows to transmit identifiers whose size scales doubly-exponentially in the blocklength, unlike common transmission (or channel) codes whose size scales exponentially. It suffices to use binary constant-weight codes (CWCs) to achieve the ID capacity. By relating the parameters of a binary CWC to the minimum distance of a code and using higher-order correlation moments, two upper bounds on the binary CWC size are proposed. These bounds are shown to be upper bounds also on the identifier sizes for ID codes constructed by using binary CWCs. We propose two code constructions based on optical orthogonal codes, which are used in optical multiple access schemes, have constant-weight codewords, and satisfy cyclic cross-correlation and auto-correlation constraints. These constructions are modified and concatenated with outer Reed-Solomon codes to propose new binary CWCs optimal for ID. Improvements to the finite-parameter performance of both our and existing code constructions are shown by using outer codes with larger minimum distance vs. blocklength ratios. We also illustrate ID performance regimes for which our ID code constructions perform significantly better than existing constructions.
△ Less
Submitted 25 June, 2021;
originally announced June 2021.
-
Quantum Synchronizable Codes From Cyclotomic Classes of Order Two over $\mathbb{Z}_{2q}$
Authors:
Tao Wang,
Tongjiang Yan,
Vladimir Sidorenko,
Xueting Wang
Abstract:
Quantum synchronizable codes are kinds of quantum error-correcting codes that can not only correct the effects of quantum noise on qubits but also the misalignment in block synchronization. This paper contributes to constructing two classes of quantum synchronizable codes by the cyclotomic classes of order two over $\mathbb{Z}_{2q}$, whose synchronization capabilities can reach the upper bound und…
▽ More
Quantum synchronizable codes are kinds of quantum error-correcting codes that can not only correct the effects of quantum noise on qubits but also the misalignment in block synchronization. This paper contributes to constructing two classes of quantum synchronizable codes by the cyclotomic classes of order two over $\mathbb{Z}_{2q}$, whose synchronization capabilities can reach the upper bound under certain conditions. Moreover, the quantum synchronizable codes possess good error-correcting capability towards bit errors and phase errors.
△ Less
Submitted 7 July, 2021; v1 submitted 4 June, 2021;
originally announced June 2021.
-
Decoding of Space-Symmetric Rank Errors
Authors:
Thomas Jerkovits,
Vladimir Sidorenko,
Antonia Wachter-Zeh
Abstract:
This paper investigates the decoding of certain Gabidulin codes that were transmitted over a channel with space-symmetric errors. Space-symmetric errors are additive error matrices that have the property that their column and row spaces are equal. We show that for channels restricted to space-symmetric errors, with high probability errors of rank up to 2(n-k)/3 can be decoded with a Gabidulin code…
▽ More
This paper investigates the decoding of certain Gabidulin codes that were transmitted over a channel with space-symmetric errors. Space-symmetric errors are additive error matrices that have the property that their column and row spaces are equal. We show that for channels restricted to space-symmetric errors, with high probability errors of rank up to 2(n-k)/3 can be decoded with a Gabidulin code of length n and dimension k, using a weak-self orthogonal basis as code locators.
△ Less
Submitted 4 February, 2021;
originally announced February 2021.
-
On Skew Convolutional and Trellis Codes
Authors:
Vladimir Sidorenko,
Wenhui Li,
Onur Günlü,
Gerhard Kramer
Abstract:
Two new classes of skew codes over a finite field $\F$ are proposed, called skew convolutional codes and skew trellis codes. These two classes are defined by, respectively, left or right sub-modules over the skew fields of fractions of skew polynomials over $\F$. The skew convolutional codes can be represented as periodic time-varying ordinary convolutional codes. The skew trellis codes are in gen…
▽ More
Two new classes of skew codes over a finite field $\F$ are proposed, called skew convolutional codes and skew trellis codes. These two classes are defined by, respectively, left or right sub-modules over the skew fields of fractions of skew polynomials over $\F$. The skew convolutional codes can be represented as periodic time-varying ordinary convolutional codes. The skew trellis codes are in general nonlinear over $\F$. Every code from both classes has a code trellis and can be decoded by Viterbi or BCJR algorithms.
△ Less
Submitted 2 February, 2021;
originally announced February 2021.
-
Decoding of Interleaved Alternant Codes
Authors:
Lukas Holzbaur,
Hedongliang Liu,
Alessandro Neri,
Sven Puchinger,
Johan Rosenkilde,
Vladimir Sidorenko,
Antonia Wachter-Zeh
Abstract:
Interleaved Reed-Solomon codes admit efficient decoding algorithms which correct burst errors far beyond half the minimum distance in the random errors regime, e.g., by computing a common solution to the Key Equation for each Reed-Solomon code, as described by Schmidt et al. If this decoder does not succeed, it may either fail to return a codeword or miscorrect to an incorrect codeword, and good u…
▽ More
Interleaved Reed-Solomon codes admit efficient decoding algorithms which correct burst errors far beyond half the minimum distance in the random errors regime, e.g., by computing a common solution to the Key Equation for each Reed-Solomon code, as described by Schmidt et al. If this decoder does not succeed, it may either fail to return a codeword or miscorrect to an incorrect codeword, and good upper bounds on the fraction of error matrices for which these events occur are known. The decoding algorithm immediately applies to interleaved alternant codes as well, i.e., the subfield subcodes of interleaved Reed-Solomon codes, but the fraction of decodable error matrices differs, since the error is now restricted to a subfield. In this paper, we present new general lower and upper bounds on the fraction of error matrices decodable by Schmidt et al.'s decoding algorithm, thereby making it the only decoding algorithm for interleaved alternant codes for which such bounds are known.
△ Less
Submitted 17 September, 2021; v1 submitted 14 October, 2020;
originally announced October 2020.
-
Lunar close encounters compete with the circumterrestrial Lidov-Kozai effect
Authors:
Davide Amato,
Renu Malhotra,
Vladislav Sidorenko,
Aaron J. Rosengren
Abstract:
Luna 3 (or Lunik 3 in Russian sources) was the first spacecraft to perform a flyby of the Moon. Launched in October 1959 on a translunar trajectory with large semi-major axis and eccentricity, it collided with the Earth in late March 1960. The short, 6-month dynamical lifetime has often been explained through an increase in eccentricity due to the Lidov-Kozai effect. However, the classical Lidov-K…
▽ More
Luna 3 (or Lunik 3 in Russian sources) was the first spacecraft to perform a flyby of the Moon. Launched in October 1959 on a translunar trajectory with large semi-major axis and eccentricity, it collided with the Earth in late March 1960. The short, 6-month dynamical lifetime has often been explained through an increase in eccentricity due to the Lidov-Kozai effect. However, the classical Lidov-Kozai solution is only valid in the limit of small semi-major axis ratio, a condition that is satisfied only for solar (but not for lunar) perturbations. We undertook a study of the dynamics of Luna 3 with the aim of assessing the principal mechanisms affecting its evolution. We analyze the Luna 3 trajectory by generating accurate osculating solutions, and by comparing them to integrations of singly- and doubly-averaged equations of motion in vectorial form. Lunar close encounters, which cannot be reproduced in an averaging approach, decisively affect the trajectory and break the doubly-averaged dynamics. Solar perturbations induce oscillations of intermediate period that affect the geometry of the close encounters and cause the singly-averaged and osculating inclinations to change quadrants (the orbital plane ``flips''). We find that the peculiar evolution of Luna 3 can only be explained by taking into account lunar close encounters and intermediate-period terms; such terms are averaged out in the Lidov-Kozai solution, which is not adequate to describe translunar or cislunar trajectories. Understanding the limits of the Lidov-Kozai solution is of particular significance for the motion of objects in the Earth-Moon environment and of exoplanetary systems.
△ Less
Submitted 15 June, 2020;
originally announced June 2020.
-
Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage
Authors:
Thomas Jerkovits,
Onur Günlü,
Vladimir Sidorenko,
Gerhard Kramer
Abstract:
A key agreement problem is considered that has a biometric or physical identifier, a terminal for key enrollment, and a terminal for reconstruction. A nested convolutional code design is proposed that performs vector quantization during enrollment and error control during reconstruction. Physical identifiers with small bit error probability illustrate the gains of the design. One variant of the ne…
▽ More
A key agreement problem is considered that has a biometric or physical identifier, a terminal for key enrollment, and a terminal for reconstruction. A nested convolutional code design is proposed that performs vector quantization during enrollment and error control during reconstruction. Physical identifiers with small bit error probability illustrate the gains of the design. One variant of the nested convolutional codes improves on the best known key vs. storage rate ratio but it has high complexity. A second variant with lower complexity performs similar to nested polar codes. The results suggest that the choice of code for key agreement with identifiers depends primarily on the complexity constraint.
△ Less
Submitted 27 April, 2020;
originally announced April 2020.
-
Randomized Nested Polar Subcode Constructions for Privacy, Secrecy, and Storage
Authors:
Onur Günlü,
Peter Trifonov,
Muah Kim,
Rafael F. Schaefer,
Vladimir Sidorenko
Abstract:
We consider polar subcodes (PSCs), which are polar codes (PCs) with dynamically-frozen symbols, to increase the minimum distance as compared to corresponding PCs. A randomized nested PSC construction with a low-rate PSC and a high-rate PC, is proposed for list and sequential successive cancellation decoders. This code construction aims to perform lossy compression with side information. Nested PSC…
▽ More
We consider polar subcodes (PSCs), which are polar codes (PCs) with dynamically-frozen symbols, to increase the minimum distance as compared to corresponding PCs. A randomized nested PSC construction with a low-rate PSC and a high-rate PC, is proposed for list and sequential successive cancellation decoders. This code construction aims to perform lossy compression with side information. Nested PSCs are used in the key agreement problem with physical identifiers. Gains in terms of the secret-key vs. storage rate ratio as compared to nested PCs with the same list size are illustrated to show that nested PSCs significantly improve on nested PCs. The performance of the nested PSCs is shown to improve with larger list sizes, which is not the case for nested PCs considered.
△ Less
Submitted 29 July, 2020; v1 submitted 25 April, 2020;
originally announced April 2020.
-
Reservoir Computing using High Order Synchronization of Coupled Oscillators
Authors:
A. A. Velichko,
D. V. Ryabokon,
S. D. Khanin,
A. V. Sidorenko,
A. G. Rikkiev
Abstract:
We propose a concept for reservoir computing on oscillators using the high-order synchronization effect. The reservoir output is presented in the form of oscillator synchronization metrics: fractional high-order synchronization value and synchronization efficiency, expressed as a percentage. Using two coupled relaxation oscillators built on VO2 switches, we created an oscillator reservoir that all…
▽ More
We propose a concept for reservoir computing on oscillators using the high-order synchronization effect. The reservoir output is presented in the form of oscillator synchronization metrics: fractional high-order synchronization value and synchronization efficiency, expressed as a percentage. Using two coupled relaxation oscillators built on VO2 switches, we created an oscillator reservoir that allows simulating the XOR operation. The reservoir can operate as with static input data (power currents, coupling forces), as with dynamic data in the form of spike sequences. Having a small number of oscillators and significant non-linearity, the reservoir expresses a wide range of dynamic states. The proposed computing concept can be implemented on oscillators of diverse nature.
△ Less
Submitted 8 April, 2020;
originally announced April 2020.
-
Secure and Reliable Key Agreement with Physical Unclonable Functions
Authors:
Onur Günlü,
Tasnad Kernetzky,
Onurcan İşcan,
Vladimir Sidorenko,
Gerhard Kramer,
Rafael F. Schaefer
Abstract:
Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit sequences to which secret keys are bound. A set of transforms that perform well in terms of the dec…
▽ More
Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit sequences to which secret keys are bound. A set of transforms that perform well in terms of the decorrelation efficiency is applied to ring oscillator (RO) outputs to improve the uniqueness and reliability of extracted bit sequences, to reduce the hardware area and information leakage about the key and RO outputs, and to maximize the secret-key length. Low-complexity error-correction codes are proposed to illustrate two complete key-binding systems with perfect secrecy, and better secret-key and privacy-leakage rates than existing methods. A reference hardware implementation is also provided to demonstrate that the transform-coding approach occupies a small hardware area.
△ Less
Submitted 27 February, 2020; v1 submitted 26 February, 2020;
originally announced February 2020.
-
Dynamics in first-order mean motion resonances: analytical study of a simple model with stochastic behaviour
Authors:
Sergey Efimov,
Vladislav Sidorenko
Abstract:
We examine a 2DOF Hamiltonian system, which arises in study of first-order mean motion resonance in spatial circular restricted three-body problem "star-planet-asteroid", and point out some mechanisms of chaos generation. Phase variables of the considered system are subdivided into fast and slow ones: one of the fast variables can be interpreted as resonant angle, while the slow variables are para…
▽ More
We examine a 2DOF Hamiltonian system, which arises in study of first-order mean motion resonance in spatial circular restricted three-body problem "star-planet-asteroid", and point out some mechanisms of chaos generation. Phase variables of the considered system are subdivided into fast and slow ones: one of the fast variables can be interpreted as resonant angle, while the slow variables are parameters characterizing the shape and orientation of the asteroid's orbit. Averaging over the fast motion is applied to obtain evolution equations which describe the long-term behavior of the slow variables. These equations allowed us to provide a comprehensive classification of the slow variables' evolution paths. The bifurcation diagram showing changes in the topological structure of the phase portraits is constructed and bifurcation values of Hamiltonian are calculated. Finally, we study properties of the chaos emerging in the system.
△ Less
Submitted 19 December, 2018;
originally announced December 2018.
-
On stability of planar solutions of double averaged restricted elliptic three-body problem
Authors:
Anatoly Neishtadt,
Kaicheng Sheng,
Vladislav Sidorenko
Abstract:
Double averaged planar restricted elliptic three-body problem has a two-parametric family of stable equilibria. We show that these equilibria are stable in the linear approximation as equilibria of the double averaged spatial restricted elliptic three-body problem. They are Lyapunov stable for all values of parameters but, possibly, parameters from some finite set of analytic curves.
Double averaged planar restricted elliptic three-body problem has a two-parametric family of stable equilibria. We show that these equilibria are stable in the linear approximation as equilibria of the double averaged spatial restricted elliptic three-body problem. They are Lyapunov stable for all values of parameters but, possibly, parameters from some finite set of analytic curves.
△ Less
Submitted 4 April, 2018; v1 submitted 23 March, 2018;
originally announced March 2018.
-
Long-term Attitude Dynamics of Space Debris in Sun-synchronous Orbits: Cassini Cycles and Chaotic Stabilization
Authors:
Sergey Efimov,
Dmitry Pritykin,
Vladislav Sidorenko
Abstract:
Comprehensive analysis of space debris rotational dynamics is vital for active debris removal missions that require physical capture or de-tumbling of a target. We study the attitude motion of used rocket bodies acknowledgedly belonging to one of the categories of large space debris objects that pose an immediate danger to space operations in low Earth orbits. Particularly, we focus on Sun-synchro…
▽ More
Comprehensive analysis of space debris rotational dynamics is vital for active debris removal missions that require physical capture or de-tumbling of a target. We study the attitude motion of used rocket bodies acknowledgedly belonging to one of the categories of large space debris objects that pose an immediate danger to space operations in low Earth orbits. Particularly, we focus on Sun-synchronous orbits (SSO) with altitudes in the interval 600-800 km, where the density of space debris is maximal. Our mathematical model takes into account the gravity gradient torque and the torque due to eddy currents induced by the interaction of conductive materials with the geomagnetic field. Using perturbation techniques and numerical methods we examine the deceleration of the initial fast rotation and the subsequent transition to a relative equilibrium with respect to the local vertical. A better understanding of the latter phase is achieved owing to a more accurate model of the eddy currents torque than in most prior research. We show that SSO precession is also an important factor influencing the motion properties. One of its effects is manifested at the deceleration stage as the angular momentum vector oscillates about the direction to the south celestial pole.
△ Less
Submitted 22 December, 2017;
originally announced December 2017.
-
Dynamics of "jum**" Trojans: perturbative treatment
Authors:
Vladislav Sidorenko
Abstract:
The term "jum**" Trojan was introduced by Tsiganis et al. (2000) in their studies of long-term dynamics exhibited by the asteroid (1868) Thersites, which had been observed to jump from librations around L4 to librations around L5. Another example of a "jum**" Trojan was found by Connors et al. (2011): librations of the asteroid 2010 TK7 around the Earth's libration point L4 preceded by its lib…
▽ More
The term "jum**" Trojan was introduced by Tsiganis et al. (2000) in their studies of long-term dynamics exhibited by the asteroid (1868) Thersites, which had been observed to jump from librations around L4 to librations around L5. Another example of a "jum**" Trojan was found by Connors et al. (2011): librations of the asteroid 2010 TK7 around the Earth's libration point L4 preceded by its librations around L5. We explore the dynamics of "jum**" Trojans under the scope of the restricted planar elliptical three-body problem. Via double numerical averaging we construct evolutionary equations, which allow analyzing transitions between the orbital motion regimes.
△ Less
Submitted 6 December, 2017;
originally announced December 2017.
-
Defunct Satellites in Nearly Polar Orbits: Long-term Evolution of Attitude Motion
Authors:
Sergey Efimov,
Dmitry Pritykin,
Vladislav Sidorenko
Abstract:
Low Earth orbits (LEO) are known as a region of high space activity and, consequently, space debris highest density. Launcher upper stages and defunct satellites are the largest space debris objects, whose collisions can result in still greater pollution, rendering further space missions in LEO impossible. Thus, space debris mitigation is necessary, and LEO region is a primary target of active deb…
▽ More
Low Earth orbits (LEO) are known as a region of high space activity and, consequently, space debris highest density. Launcher upper stages and defunct satellites are the largest space debris objects, whose collisions can result in still greater pollution, rendering further space missions in LEO impossible. Thus, space debris mitigation is necessary, and LEO region is a primary target of active debris removal (ADR) projects. However, ADR planning requires at least an approximate idea of the candidate objects' attitude dynamics, which is one of the incentives for our study. This paper is mainly focused on modeling and simulating defunct satellites. The model takes into account the gravity gradient torque and the torque due to eddy currents induced by the interaction of conductive materials with the geomagnetic field. A better understanding of the intermediate phase of the exponential deceleration is achieved owing to a more accurate model of the eddy currents torque than in most prior research. We also show the existence of other important factors in the studied dynamics such as evolution of the orbit itself and the residual magnetic moment, which both contribute to the overall attitude motion evolution and the variety of the final regimes.
△ Less
Submitted 3 January, 2018; v1 submitted 19 November, 2017;
originally announced November 2017.
-
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
Authors:
Onur Günlü,
Onurcan İşcan,
Vladimir Sidorenko,
Gerhard Kramer
Abstract:
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random linear codes and achieves all points of the key-leakage-storage regions of the generated-secret and chosen-secret models. The second construction uses nested polar codes for vector quantization during…
▽ More
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random linear codes and achieves all points of the key-leakage-storage regions of the generated-secret and chosen-secret models. The second construction uses nested polar codes for vector quantization during enrollment and for error correction during reconstruction. Simulations show that the nested polar codes achieve privacy-leakage and storage rates that improve on existing code designs. One proposed code achieves a rate tuple that cannot be achieved by existing methods.
△ Less
Submitted 3 April, 2019; v1 submitted 1 September, 2017;
originally announced September 2017.
-
The eccentric Kozai-Lidov effect as a resonance phenomenon
Authors:
Vladislav Sidorenko
Abstract:
Exploring weakly perturbed Keplerian motion within the restricted three-body problem, Lidov (1962) and, independently, Kozai (1962) discovered coupled oscillations of eccentricity and inclination (the KL-cycles). Their classical studies were based on an integrable model of the secular evolution, obtained by double averaging of the disturbing function approximated with its first non-trivial term. T…
▽ More
Exploring weakly perturbed Keplerian motion within the restricted three-body problem, Lidov (1962) and, independently, Kozai (1962) discovered coupled oscillations of eccentricity and inclination (the KL-cycles). Their classical studies were based on an integrable model of the secular evolution, obtained by double averaging of the disturbing function approximated with its first non-trivial term. This was the quadrupole term in the series expansion with respect to the ratio of the semimajor axis of the disturbed body to that of the disturbing body. If the next (octupole) term is kept in the expression for the disturbing function, long-term modulation of the KL-cycles can established (Ford et al., 2000, Naoz et al., 2011, Katz et al., 2011). Specifically, flips between the prograde and retrograde orbits become possible. Since such flips are observed only when the perturber has a non-zero eccentricity, the term "Eccentric Kozai-Lidov Effect" (or EKL-effect) was proposed by Lithwick and Naoz (2011) to specify such behaviour. We demonstrate that the EKL-effect can be interpreted as a resonance phenomenon. To this end, we write down the equations of motion in terms of "action-angle" variables emerging in the integrable Kozai-Lidov model. It turns out that for some initial values the resonance is degenerate and the usual "pendulum" approximation is insufficient to describe the evolution of the resonance phase. Analysis of the related bifurcations allows us to estimate the typical time between the successive flips for different parts of the phase space.
△ Less
Submitted 20 August, 2017;
originally announced August 2017.
-
On the dynamics of a spherically shaped top on a plane with friction
Authors:
Vladislav Sidorenko
Abstract:
The simple realistic model of the tippe top is considered. An averaged system of equations of motion is obtained in special evolutionary variables. Through the qualitative analysis of this system the general features of the motion of the top are obtained. Finally, some numerical results are presented.
The simple realistic model of the tippe top is considered. An averaged system of equations of motion is obtained in special evolutionary variables. Through the qualitative analysis of this system the general features of the motion of the top are obtained. Finally, some numerical results are presented.
△ Less
Submitted 7 April, 2016;
originally announced April 2016.
-
Three-Dimensional Multi-Tethered Satellite Formation with the Elements Moving Along Lissajous Curves
Authors:
D. Yarotsky,
V. Sidorenko,
D. Pritykin
Abstract:
This note presents a novel approach to maintain three-dimensional multi-tethered satellite formation in space. For a formation consisting of a main body connected by tethers with several deputy satellites (the so-called "hub-and-spoke" configuration) we demonstrate that under proper choice of the system's parameters the deputy satellites can move along Lissajous curves in the plane normal to the l…
▽ More
This note presents a novel approach to maintain three-dimensional multi-tethered satellite formation in space. For a formation consisting of a main body connected by tethers with several deputy satellites (the so-called "hub-and-spoke" configuration) we demonstrate that under proper choice of the system's parameters the deputy satellites can move along Lissajous curves in the plane normal to the local vertical with all tethers stretched, the total force due to the tension forces acting on the main satellite is balanced in a way allowing it to be in relative equilibrium strictly below or strictly above the system's center of mass. We analyze relations between the system's essential parameters and obtain conditions under which the proposed motion does take place. We also study analytically the motion stability for different configurations and whether the deputy satellites can collide or the tethers can entangle. Our theoretical findings are corroborated and validated by numerical experiments.
△ Less
Submitted 16 March, 2016;
originally announced March 2016.
-
Row Reduction Applied to Decoding of Rank Metric and Subspace Codes
Authors:
Sven Puchinger,
Johan Rosenkilde né Nielsen,
Wenhui Li,
Vladimir Sidorenko
Abstract:
We show that decoding of $\ell$-Interleaved Gabidulin codes, as well as list-$\ell$ decoding of Mahdavifar--Vardy codes can be performed by row reducing skew polynomial matrices. Inspired by row reduction of $\F[x]$ matrices, we develop a general and flexible approach of transforming matrices over skew polynomial rings into a certain reduced form. We apply this to solve generalised shift register…
▽ More
We show that decoding of $\ell$-Interleaved Gabidulin codes, as well as list-$\ell$ decoding of Mahdavifar--Vardy codes can be performed by row reducing skew polynomial matrices. Inspired by row reduction of $\F[x]$ matrices, we develop a general and flexible approach of transforming matrices over skew polynomial rings into a certain reduced form. We apply this to solve generalised shift register problems over skew polynomial rings which occur in decoding $\ell$-Interleaved Gabidulin codes. We obtain an algorithm with complexity $O(\ell μ^2)$ where $μ$ measures the size of the input problem and is proportional to the code length $n$ in the case of decoding. Further, we show how to perform the interpolation step of list-$\ell$-decoding Mahdavifar--Vardy codes in complexity $O(\ell n^2)$, where $n$ is the number of interpolation constraints.
△ Less
Submitted 14 July, 2016; v1 submitted 15 October, 2015;
originally announced October 2015.
-
List and Probabilistic Unique Decoding of Folded Subspace Codes
Authors:
Hannes Bartz,
Vladimir Sidorenko
Abstract:
A new class of folded subspace codes for noncoherent network coding is presented. The codes can correct insertions and deletions beyond the unique decoding radius for any code rate $R\in[0,1]$. An efficient interpolation-based decoding algorithm for this code construction is given which allows to correct insertions and deletions up to the normalized radius $s(1-((1/h+h)/(h-s+1))R)$, where $h$ is t…
▽ More
A new class of folded subspace codes for noncoherent network coding is presented. The codes can correct insertions and deletions beyond the unique decoding radius for any code rate $R\in[0,1]$. An efficient interpolation-based decoding algorithm for this code construction is given which allows to correct insertions and deletions up to the normalized radius $s(1-((1/h+h)/(h-s+1))R)$, where $h$ is the folding parameter and $s\leq h$ is a decoding parameter. The algorithm serves as a list decoder or as a probabilistic unique decoder that outputs a unique solution with high probability. An upper bound on the average list size of (folded) subspace codes and on the decoding failure probability is derived. A major benefit of the decoding scheme is that it enables probabilistic unique decoding up to the list decoding radius.
△ Less
Submitted 21 April, 2015;
originally announced April 2015.
-
Solving Shift Register Problems over Skew Polynomial Rings using Module Minimisation
Authors:
Wenhui Li,
Johan S. R. Nielsen,
Sven Puchinger,
Vladimir Sidorenko
Abstract:
For many algebraic codes the main part of decoding can be reduced to a shift register synthesis problem. In this paper we present an approach for solving generalised shift register problems over skew polynomial rings which occur in error and erasure decoding of $\ell$-Interleaved Gabidulin codes. The algorithm is based on module minimisation and has time complexity $O(\ell μ^2)$ where $μ$ measures…
▽ More
For many algebraic codes the main part of decoding can be reduced to a shift register synthesis problem. In this paper we present an approach for solving generalised shift register problems over skew polynomial rings which occur in error and erasure decoding of $\ell$-Interleaved Gabidulin codes. The algorithm is based on module minimisation and has time complexity $O(\ell μ^2)$ where $μ$ measures the size of the input problem.
△ Less
Submitted 20 January, 2015;
originally announced January 2015.
-
Quasi-satellite orbits in the general context of dynamics in the 1:1 mean motion resonance. Perturbative treatment
Authors:
V. Sidorenko,
A. Neishtadt,
A. Artemyev,
L. Zelenyi
Abstract:
Our investigation is motivated by the recent discovery of asteroids orbiting the Sun and simultaneously staying near one of the Solar System planets for a long time. This regime of motion is usually called the quasi-satellite regime, since even at the times of the closest approaches the distance between the asteroid and the planet is significantly larger than the region of space (the Hill's sphere…
▽ More
Our investigation is motivated by the recent discovery of asteroids orbiting the Sun and simultaneously staying near one of the Solar System planets for a long time. This regime of motion is usually called the quasi-satellite regime, since even at the times of the closest approaches the distance between the asteroid and the planet is significantly larger than the region of space (the Hill's sphere) in which the planet can hold its satellites. We explore the properties of the quasi-satellite regimes in the context of the spatial restricted circular three-body problem "Sun-planet-asteroid". Via double numerical averaging, we construct evolutionary equations which describe the long-term behaviour of the orbital elements of an asteroid. Special attention is paid to possible transitions between the motion in a quasi-satellite orbit and the one in another type of orbits available in the 1:1 resonance. A rough classification of the corresponding evolutionary paths is given for an asteroid's motion with a sufficiently small eccentricity and inclination.
△ Less
Submitted 7 September, 2014; v1 submitted 1 September, 2014;
originally announced September 2014.
-
Convolutional Codes in Rank Metric with Application to Random Network Coding
Authors:
Antonia Wachter-Zeh,
Markus Stinner,
Vladimir Sidorenko
Abstract:
Random network coding recently attracts attention as a technique to disseminate information in a network. This paper considers a non-coherent multi-shot network, where the unknown and time-variant network is used several times. In order to create dependencies between the different shots, particular convolutional codes in rank metric are used. These codes are so-called (partial) unit memory ((P)UM)…
▽ More
Random network coding recently attracts attention as a technique to disseminate information in a network. This paper considers a non-coherent multi-shot network, where the unknown and time-variant network is used several times. In order to create dependencies between the different shots, particular convolutional codes in rank metric are used. These codes are so-called (partial) unit memory ((P)UM) codes, i.e., convolutional codes with memory one. First, distance measures for convolutional codes in rank metric are shown and two constructions of (P)UM codes in rank metric based on the generator matrices of maximum rank distance codes are presented. Second, an efficient error-erasure decoding algorithm for these codes is presented. Its guaranteed decoding radius is derived and its complexity is bounded. Finally, it is shown how to apply these codes for error correction in random linear and affine network coding.
△ Less
Submitted 19 January, 2015; v1 submitted 29 April, 2014;
originally announced April 2014.
-
On a Multiple-Access in a Vector Disjunctive Channel
Authors:
Alexey Frolov,
Victor Zyablov,
Vladimir Sidorenko,
Robert Fischer
Abstract:
We address the problem of increasing the sum rate in a multiple-access system from [1] for small number of users. We suggest an improved signal-code construction in which in case of a small number of users we give more resources to them. For the resulting multiple-access system a lower bound on the relative sum rate is derived. It is shown to be very close to the maximal value of relative sum rate…
▽ More
We address the problem of increasing the sum rate in a multiple-access system from [1] for small number of users. We suggest an improved signal-code construction in which in case of a small number of users we give more resources to them. For the resulting multiple-access system a lower bound on the relative sum rate is derived. It is shown to be very close to the maximal value of relative sum rate in [1] even for small number of users. The bound is obtained for the case of decoding by exhaustive search. We also suggest reduced-complexity decoding and compare the maximal number of users in this case and in case of decoding by exhaustive search.
△ Less
Submitted 24 January, 2013;
originally announced January 2013.
-
The Tippe Top Dynamics: The Comparison of Friction Models
Authors:
V. V. Sidorenko,
S. A. Skorokhod
Abstract:
The simple realistic model of the tippe top is considered. An averaged system of equations of motion is obtained in special evolutionary variables. Through the qualitative analysis of this system the general features of the motion of the top are obtained. Finally, some numerical results are presented.
The simple realistic model of the tippe top is considered. An averaged system of equations of motion is obtained in special evolutionary variables. Through the qualitative analysis of this system the general features of the motion of the top are obtained. Finally, some numerical results are presented.
△ Less
Submitted 25 October, 2012;
originally announced October 2012.
-
Optimal Threshold-Based Multi-Trial Error/Erasure Decoding with the Guruswami-Sudan Algorithm
Authors:
Christian Senger,
Vladimir R. Sidorenko,
Martin Bossert,
Victor V. Zyablov
Abstract:
Traditionally, multi-trial error/erasure decoding of Reed-Solomon (RS) codes is based on Bounded Minimum Distance (BMD) decoders with an erasure option. Such decoders have error/erasure tradeoff factor L=2, which means that an error is twice as expensive as an erasure in terms of the code's minimum distance. The Guruswami-Sudan (GS) list decoder can be considered as state of the art in algebraic d…
▽ More
Traditionally, multi-trial error/erasure decoding of Reed-Solomon (RS) codes is based on Bounded Minimum Distance (BMD) decoders with an erasure option. Such decoders have error/erasure tradeoff factor L=2, which means that an error is twice as expensive as an erasure in terms of the code's minimum distance. The Guruswami-Sudan (GS) list decoder can be considered as state of the art in algebraic decoding of RS codes. Besides an erasure option, it allows to adjust L to values in the range 1<L<=2. Based on previous work, we provide formulae which allow to optimally (in terms of residual codeword error probability) exploit the erasure option of decoders with arbitrary L, if the decoder can be used z>=1 times. We show that BMD decoders with z_BMD decoding trials can result in lower residual codeword error probability than GS decoders with z_GS trials, if z_BMD is only slightly larger than z_GS. This is of practical interest since BMD decoders generally have lower computational complexity than GS decoders.
△ Less
Submitted 18 April, 2011;
originally announced April 2011.
-
Adaptive Single-Trial Error/Erasure Decoding of Reed-Solomon Codes
Authors:
Christian Senger,
Vladimir R. Sidorenko,
Steffen Schober,
Martin Bossert,
Victor V. Zyablov
Abstract:
Algebraic decoding algorithms are commonly applied for the decoding of Reed-Solomon codes. Their main advantages are low computational complexity and predictable decoding capabilities. Many algorithms can be extended for correction of both errors and erasures. This enables the decoder to exploit binary quantized reliability information obtained from the transmission channel: Received symbols with…
▽ More
Algebraic decoding algorithms are commonly applied for the decoding of Reed-Solomon codes. Their main advantages are low computational complexity and predictable decoding capabilities. Many algorithms can be extended for correction of both errors and erasures. This enables the decoder to exploit binary quantized reliability information obtained from the transmission channel: Received symbols with high reliability are forwarded to the decoding algorithm while symbols with low reliability are erased. In this paper we investigate adaptive single-trial error/erasure decoding of Reed-Solomon codes, i.e. we derive an adaptive erasing strategy which minimizes the residual codeword error probability after decoding. Our result is applicable to any error/erasure decoding algorithm as long as its decoding capabilities can be expressed by a decoder capability function. Examples are Bounded Minimum Distance decoding with the Berlekamp-Massey- or the Sugiyama algorithms and the Guruswami-Sudan list decoder.
△ Less
Submitted 4 April, 2011;
originally announced April 2011.
-
On the circular Sitnikov problem: the alternation of stability and instability in the family of vertical motions
Authors:
Vladislav Sidorenko
Abstract:
We consider the special case of the restricted circular three-body problem, when the two primaries are of equal mass, while the third body of negligible mass performs oscillations along a straight line perpendicular to the plane of the primaries (so called periodic vertical motions). The main goal of our investigation is to study the stability of these periodic motions in the linear approximation.…
▽ More
We consider the special case of the restricted circular three-body problem, when the two primaries are of equal mass, while the third body of negligible mass performs oscillations along a straight line perpendicular to the plane of the primaries (so called periodic vertical motions). The main goal of our investigation is to study the stability of these periodic motions in the linear approximation. A special attention is given to the alternation of stability and instability within the family of periodic vertical motions, whenever their amplitude is varied in a continuous monotone manner.
△ Less
Submitted 16 February, 2011;
originally announced February 2011.
-
On (Partial) Unit Memory Codes Based on Gabidulin Codes
Authors:
Antonia Wachter,
Vladimir Sidorenko,
Martin Bossert,
Victor Zyablov
Abstract:
(Partial) Unit Memory ((P)UM) codes provide a powerful possibility to construct convolutional codes based on block codes in order to achieve a high decoding performance. In this contribution, a construction based on Gabidulin codes is considered. This construction requires a modified rank metric, the so-called sum rank metric. For the sum rank metric, the free rank distance, the extended row rank…
▽ More
(Partial) Unit Memory ((P)UM) codes provide a powerful possibility to construct convolutional codes based on block codes in order to achieve a high decoding performance. In this contribution, a construction based on Gabidulin codes is considered. This construction requires a modified rank metric, the so-called sum rank metric. For the sum rank metric, the free rank distance, the extended row rank distance and its slope are defined analogous to the extended row distance in Hamming metric. Upper bounds for the free rank distance and the slope of (P)UM codes in the sum rank metric are derived and an explicit construction of (P)UM codes based on Gabidulin codes is given, achieving the upper bound for the free rank distance.
△ Less
Submitted 15 February, 2011; v1 submitted 14 February, 2011;
originally announced February 2011.
-
A Basis for all Solutions of the Key Equation for Gabidulin Codes
Authors:
Antonia Wachter,
Vladimir Sidorenko,
Martin Bossert
Abstract:
We present and prove the correctness of an efficient algorithm that provides a basis for all solutions of a key equation in order to decode Gabidulin (G-) codes up to a given radius tau. This algorithm is based on a symbolic equivalent of the Euclidean Algorithm (EA) and can be applied for decoding of G-codes beyond half the minimum rank distance. If the key equation has a unique solution, our alg…
▽ More
We present and prove the correctness of an efficient algorithm that provides a basis for all solutions of a key equation in order to decode Gabidulin (G-) codes up to a given radius tau. This algorithm is based on a symbolic equivalent of the Euclidean Algorithm (EA) and can be applied for decoding of G-codes beyond half the minimum rank distance. If the key equation has a unique solution, our algorithm reduces to Gabidulin's decoding algorithm up to half the minimum distance. If the solution is not unique, we provide a basis for all solutions of the key equation. Our algorithm has time complexity O(tau^2) and is a generalization of the modified EA by Bossert and Bezzateev for Reed-Solomon codes.
△ Less
Submitted 9 June, 2010;
originally announced June 2010.
-
Adaptive Single-Trial Error/Erasure Decoding for Binary Codes
Authors:
Christian Senger,
Vladimir R. Sidorenko,
Steffen Schober,
Martin Bossert,
Victor V. Zyablov
Abstract:
We investigate adaptive single-trial error/erasure decoding of binary codes whose decoder is able to correct e errors and t erasures if le+t<=d-1. Thereby, d is the minimum Hamming distance of the code and 1<l<=2 is the tradeoff parameter between errors and erasures. The error/erasure decoder allows to exploit soft information by treating a set of most unreliable received symbols as erasures. The…
▽ More
We investigate adaptive single-trial error/erasure decoding of binary codes whose decoder is able to correct e errors and t erasures if le+t<=d-1. Thereby, d is the minimum Hamming distance of the code and 1<l<=2 is the tradeoff parameter between errors and erasures. The error/erasure decoder allows to exploit soft information by treating a set of most unreliable received symbols as erasures. The obvious question here is, how this erasing should be performed, i.e. how the unreliable symbols which must be erased to obtain the smallest possible residual codeword error probability are determined. In a previous paper, we answer this question for the case of fixed erasing, where only the channel state and not the individual symbol reliabilities are taken into consideration. In this paper, we address the adaptive case, where the optimal erasing strategy is determined for every given received vector.
△ Less
Submitted 30 April, 2010; v1 submitted 20 April, 2010;
originally announced April 2010.
-
Optimal Thresholds for GMD Decoding with (L+1)/L-extended Bounded Distance Decoders
Authors:
Christian Senger,
Vladimir R. Sidorenko,
Martin Bossert,
Victor V. Zyablov
Abstract:
We investigate threshold-based multi-trial decoding of concatenated codes with an inner Maximum-Likelihood decoder and an outer error/erasure (L+1)/L-extended Bounded Distance decoder, i.e. a decoder which corrects e errors and t erasures if e(L+1)/L + t <= d - 1, where d is the minimum distance of the outer code and L is a positive integer. This is a generalization of Forney's GMD decoding, whi…
▽ More
We investigate threshold-based multi-trial decoding of concatenated codes with an inner Maximum-Likelihood decoder and an outer error/erasure (L+1)/L-extended Bounded Distance decoder, i.e. a decoder which corrects e errors and t erasures if e(L+1)/L + t <= d - 1, where d is the minimum distance of the outer code and L is a positive integer. This is a generalization of Forney's GMD decoding, which was considered only for L = 1, i.e. outer Bounded Minimum Distance decoding. One important example for (L+1)/L-extended Bounded Distance decoders is decoding of L-Interleaved Reed-Solomon codes. Our main contribution is a threshold location formula, which allows to optimally erase unreliable inner decoding results, for a given number of decoding trials and parameter L. Thereby, the term optimal means that the residual codeword error probability of the concatenated code is minimized. We give an estimation of this probability for any number of decoding trials.
△ Less
Submitted 20 April, 2010; v1 submitted 7 January, 2010;
originally announced January 2010.
-
On Generalized Minimum Distance Decoding Thresholds for the AWGN Channel
Authors:
Christian Senger,
Vladimir Sidorenko,
Victor Zyablov
Abstract:
We consider the Additive White Gaussian Noise channel with Binary Phase Shift Keying modulation. Our aim is to enable an algebraic hard decision Bounded Minimum Distance decoder for a binary block code to exploit soft information obtained from the demodulator. This idea goes back to Forney and is based on treating received symbols with low reliability as erasures. This erasing at the decoder is…
▽ More
We consider the Additive White Gaussian Noise channel with Binary Phase Shift Keying modulation. Our aim is to enable an algebraic hard decision Bounded Minimum Distance decoder for a binary block code to exploit soft information obtained from the demodulator. This idea goes back to Forney and is based on treating received symbols with low reliability as erasures. This erasing at the decoder is done using a threshold, each received symbol with reliability falling below the threshold is erased. Depending on the target overall complexity of the decoder this pseudo-soft decision decoding can be extended from one threshold T to z>1 thresholds T_1<...<T_z for erasing received symbols with lowest reliability. The resulting technique is widely known as Generalized Minimum Distance decoding. In this paper we provide a means for explicit determination of the optimal threshold locations in terms of minimal decoding error probability. We do this for the one and the general z>1 thresholds case, starting with a geometric interpretation of the optimal threshold location problem and using an approach from Zyablov.
△ Less
Submitted 18 May, 2009; v1 submitted 18 March, 2009;
originally announced March 2009.
-
Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes
Authors:
Christian Senger,
Vladimir Sidorenko,
Martin Bossert,
Victor Zyablov
Abstract:
Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is cla…
▽ More
Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which iteratively decodes by first using the inner decoder to get an estimate of the outer code words and then using an outer error/erasure decoder with a varying number of erasures determined by a set of pre-calculated thresholds. In this paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed, which exploits the fact that a number of outer Reed-Solomon codes with average minimum distance d can be grouped into one single Interleaved Reed-Solomon code which can be decoded beyond d/2. This allows to skip a number of decoding iterations on the one hand and to reduce the complexity of each decoding iteration significantly - while maintaining the decoding performance - on the other.
△ Less
Submitted 5 May, 2008;
originally announced May 2008.
-
Trellis Computations
Authors:
Axel Heim,
Vladimir Sidorenko,
Uli Sorger
Abstract:
For a certain class of functions, the distribution of the function values can be calculated in the trellis or a sub-trellis. The forward/backward recursion known from the BCJR algorithm is generalized to compute the moments of these distributions. In analogy to the symbol probabilities, by introducing a constraint at a certain depth in the trellis we obtain symbol moments. These moments are requ…
▽ More
For a certain class of functions, the distribution of the function values can be calculated in the trellis or a sub-trellis. The forward/backward recursion known from the BCJR algorithm is generalized to compute the moments of these distributions. In analogy to the symbol probabilities, by introducing a constraint at a certain depth in the trellis we obtain symbol moments. These moments are required for an efficient implementation of the discriminated belief propagation algorithm in [2], and can furthermore be utilized to compute conditional entropies in the trellis.
The moment computation algorithm has the same asymptotic complexity as the BCJR algorithm. It is applicable to any commutative semi-ring, thus actually providing a generalization of the Viterbi algorithm.
△ Less
Submitted 19 November, 2007;
originally announced November 2007.
-
Syndrome Decoding of Reed-Solomon Codes Beyond Half the Minimum Distance based on Shift-Register Synthesis
Authors:
Georg Schmidt,
Vladimir R. Sidorenko,
Martin Bossert
Abstract:
In this paper, a new approach for decoding low-rate Reed-Solomon codes beyond half the minimum distance is considered and analyzed. Unlike the Sudan algorithm published in 1997, this new approach is based on multi-sequence shift-register synthesis, which makes it easy to understand and simple to implement. The computational complexity of this shift-register based algorithm is of the same order a…
▽ More
In this paper, a new approach for decoding low-rate Reed-Solomon codes beyond half the minimum distance is considered and analyzed. Unlike the Sudan algorithm published in 1997, this new approach is based on multi-sequence shift-register synthesis, which makes it easy to understand and simple to implement. The computational complexity of this shift-register based algorithm is of the same order as the complexity of the well-known Berlekamp-Massey algorithm. Moreover, the error correcting radius coincides with the error correcting radius of the original Sudan algorithm, and the practical decoding performance observed on a q-ary symmetric channel (QSC) is virtually identical to the decoding performance of the Sudan algorithm. Bounds for the failure and error probability as well as for the QSC decoding performance of the new algorithm are derived, and the performance is illustrated by means of examples.
△ Less
Submitted 22 February, 2007;
originally announced February 2007.
-
Collaborative Decoding of Interleaved Reed-Solomon Codes and Concatenated Code Designs
Authors:
Georg Schmidt,
Vladimir R. Sidorenko,
Martin Bossert
Abstract:
Interleaved Reed-Solomon codes are applied in numerous data processing, data transmission, and data storage systems. They are generated by interleaving several codewords of ordinary Reed-Solomon codes. Usually, these codewords are decoded independently by classical algebraic decoding methods. However, by collaborative algebraic decoding approaches, such interleaved schemes allow the correction o…
▽ More
Interleaved Reed-Solomon codes are applied in numerous data processing, data transmission, and data storage systems. They are generated by interleaving several codewords of ordinary Reed-Solomon codes. Usually, these codewords are decoded independently by classical algebraic decoding methods. However, by collaborative algebraic decoding approaches, such interleaved schemes allow the correction of error patterns beyond half the minimum distance, provided that the errors in the received signal occur in bursts. In this work, collaborative decoding of interleaved Reed-Solomon codes by multi-sequence shift-register synthesis is considered and analyzed. Based on the framework of interleaved Reed-Solomon codes, concatenated code designs are investigated, which are obtained by interleaving several Reed-Solomon codes, and concatenating them with an inner block code.
△ Less
Submitted 12 October, 2006; v1 submitted 12 October, 2006;
originally announced October 2006.
-
Long-term evolution of the asteroid orbits at the 3:1 mean motion resonance with Jupiter (planar problem)
Authors:
Vladislav Sidorenko
Abstract:
The 3:1 mean-motion resonance of the planar elliptic restricted three body problem (Sun-Jupiter-asteroid) is considered. The double numeric averaging is used to obtain the evolutionary equations which describe the long-term behavior of the asteroid's argument of pericentre and eccentricity. The existence of the adiabatic chaos area in the system's phase space is shown.
The 3:1 mean-motion resonance of the planar elliptic restricted three body problem (Sun-Jupiter-asteroid) is considered. The double numeric averaging is used to obtain the evolutionary equations which describe the long-term behavior of the asteroid's argument of pericentre and eccentricity. The existence of the adiabatic chaos area in the system's phase space is shown.
△ Less
Submitted 2 October, 2006;
originally announced October 2006.
-
Linear Shift-Register Synthesis for Multiple Sequences of Varying Length
Authors:
Georg Schmidt,
Vladimir R. Sidorenko
Abstract:
The problem of finding the shortest linear shift-register capable of generating t finite length sequences over some field F is considered. A similar problem was already addressed by Feng and Tzeng. They presented an iterative algorithm for solving this multi-sequence shift-register synthesis problem, which can be considered as generalization of the well known Berlekamp-Massey algorithm. The Feng…
▽ More
The problem of finding the shortest linear shift-register capable of generating t finite length sequences over some field F is considered. A similar problem was already addressed by Feng and Tzeng. They presented an iterative algorithm for solving this multi-sequence shift-register synthesis problem, which can be considered as generalization of the well known Berlekamp-Massey algorithm. The Feng-Tzeng algorithm works indeed, if all t sequences have the same length. This paper focuses on multi-sequence shift-register synthesis for generating sequences of varying length. It is exposed, that the Feng-Tzeng algorithm does not always give the correct solution in this case. A modified algorithm is proposed and formally proved, which overcomes this problem.
△ Less
Submitted 9 May, 2006;
originally announced May 2006.
-
Complex rotation with internal dissipation. Applications to cosmic-dust alignment and to wobbling comets and asteroids
Authors:
Michael Efroimsky,
A. Lazarian,
Vladislav Sidorenko
Abstract:
Neutron stars, asteroids, comets, cosmic-dust granules, spacecraft, as well as whatever other freely spinning body dissipate energy when they rotate about any axis different from principal. We discuss the internal-dissipation-caused relaxation of a freely precessing rotator towards its minimal-energy mode (mode that corresponds to the spin about the maximal-inertia axis). While the body nutates…
▽ More
Neutron stars, asteroids, comets, cosmic-dust granules, spacecraft, as well as whatever other freely spinning body dissipate energy when they rotate about any axis different from principal. We discuss the internal-dissipation-caused relaxation of a freely precessing rotator towards its minimal-energy mode (mode that corresponds to the spin about the maximal-inertia axis). While the body nutates at some rate, the internal stresses and strains within the body oscillate at frequencies both higher and lower than this rate. The internal dissipation takes place mostly the second and higher harmonics. We discuss the application of our findings to asteroids. Regarding the comets, estimates show that the currently available angular resolution of spacecraft-based instruments makes it possible to observe wobble dam** within year- or maybe even month-long spans of time. We also discuss cosmic-dust astrophysics; in particular, the role played by precession dam** in the dust alignment. We show that this dam** provides coupling of the grain's rotational and vibrational degrees of freedom; this entails occasional flip** of dust grains due to thermal fluctuations. During such a flip, grain preserves its angular momentum, but the direction of torques arising from H2 formation reverses. As a result, flip** grain will not rotate fast in spite of the action of uncompensated H2 formation torques. The grains get ``thermally trapped,'' and their alignment is marginal.
△ Less
Submitted 27 August, 2002;
originally announced August 2002.
-
Multi-channel phase-equivalent transformation and supersymmetry
Authors:
A. M. Shirokov,
V. N. Sidorenko
Abstract:
Phase-equivalent transformation of local interaction is generalized to the multi-channel case. Generally, the transformation does not change the number of the bound states in the system and their energies. However, with a special choice of the parameters, the transformation removes one of the bound states and is equivalent to the multi-channel supersymmetry transformation recently suggested by S…
▽ More
Phase-equivalent transformation of local interaction is generalized to the multi-channel case. Generally, the transformation does not change the number of the bound states in the system and their energies. However, with a special choice of the parameters, the transformation removes one of the bound states and is equivalent to the multi-channel supersymmetry transformation recently suggested by Sparenberg and Baye. Using the transformation, it is also possible to add a bound state to the discrete spectrum of the system at a given energy $E<0$ if the angular momentum at least in one of the coupled channels $l\ge 2$.
△ Less
Submitted 29 September, 2000;
originally announced September 2000.