-
2D Sinc Interpolation-Based Fractional Delay and Doppler Estimation Using Time and Frequency Shifted Gaussian Pulses
Authors:
Yutaka Jitsumatsu
Abstract:
An accurate delay and Doppler estimation method for a radar system using time and frequency-shifted pulses with pseudo-random numbers is proposed. The ambiguity function of the transmitted signal has a strong peak at the origin and is close to zero if delay and Doppler are more than the inverses of the bandwidth and time-width. A two-dimensional (2D) sinc function gives a good approximation of the…
▽ More
An accurate delay and Doppler estimation method for a radar system using time and frequency-shifted pulses with pseudo-random numbers is proposed. The ambiguity function of the transmitted signal has a strong peak at the origin and is close to zero if delay and Doppler are more than the inverses of the bandwidth and time-width. A two-dimensional (2D) sinc function gives a good approximation of the ambiguity function around the origin, by which fractional delay and Doppler are accurately estimated.
△ Less
Submitted 8 December, 2023;
originally announced December 2023.
-
Computation of the optimal error exponent function for fixed-length lossy source coding in discrete memoryless sources
Authors:
Yutaka Jitsumatsu
Abstract:
The error exponent of fixed-length lossy source coding was established by Marton. Ahlswede showed that this exponent can be discontinuous at a rate $R$, depending on the source distribution $P$ and the distortion measure $d(x,y)$. The reason for the discontinuity in the error exponent is that there exists a distortion measure $d(x,y)$ and a distortion level $Δ$ such that the rate-distortion functi…
▽ More
The error exponent of fixed-length lossy source coding was established by Marton. Ahlswede showed that this exponent can be discontinuous at a rate $R$, depending on the source distribution $P$ and the distortion measure $d(x,y)$. The reason for the discontinuity in the error exponent is that there exists a distortion measure $d(x,y)$ and a distortion level $Δ$ such that the rate-distortion function $R(Δ|P)$ is neither concave nor quasi-concave with respect to $P$. Arimoto's algorithm for computing the error exponent in lossy source coding is based on Blahut's parametric representation of the error exponent. However, Blahut's parametric representation is a lower convex envelope of Marton's exponent, and the two do not generally agree. A major contribution of this paper is to provide a parametric representation that perfectly matches the inverse function of Marton's exponent, thereby preventing the problems arising from the above-mentioned non-concavity of $R(Δ|P)$. For fixed parameters, an optimal distribution can be obtained using Arimoto's algorithm. By performing a nonconvex optimization over the parameters, the inverse function of Marton's exponent is obtained.
△ Less
Submitted 6 December, 2023;
originally announced December 2023.
-
Computing the optimal error exponential function for fixed-length lossy coding in discrete memoryless sources
Authors:
Yutaka Jitsumatsu
Abstract:
The error exponent of fixed-length lossy source coding was established by Marton. Ahlswede showed that this exponent can be discontinuous at a rate $R$, depending on the probability distribution $P$ of the given information source and the distortion measure $d(x,y)$. The reason for the discontinuity in the error exponent is that there exists $(d,Δ)$ such that the rate-distortion function $R(Δ|P)$…
▽ More
The error exponent of fixed-length lossy source coding was established by Marton. Ahlswede showed that this exponent can be discontinuous at a rate $R$, depending on the probability distribution $P$ of the given information source and the distortion measure $d(x,y)$. The reason for the discontinuity in the error exponent is that there exists $(d,Δ)$ such that the rate-distortion function $R(Δ|P)$ is neither concave nor quasi-concave with respect to $P$. Arimoto's algorithm for computing the error exponent in lossy source coding is based on Blahut's parametric representation of the error exponent. However, Blahut's parametric representation is a lower convex envelope of Marton's exponent, and the two do not generally agree. The contribution of this paper is to provide a parametric representation that perfectly matches with the inverse function of Marton's exponent, thus avoiding the problem of the rate-distortion function being non-convex with respect to $P$. The optimal distribution for fixed parameters can be obtained using Arimoto's algorithm. Performing a nonconvex optimization over the parameters successfully yields the inverse function of Marton's exponent.
△ Less
Submitted 23 April, 2023;
originally announced April 2023.
-
Algorithm Families for Computing Information-Theoretic Forms of Strong Converse Exponents in Channel Coding and Lossy Source Coding
Authors:
Yutaka Jitsumatsu,
Yasutada Oohama
Abstract:
The error exponent of a discrete memoryless channel is expressed in two forms. One is Gallager's expression with a positive slope parameter and the other is Csiszar and Korner's information-theoretic representation expressed using the mutual information and the relative entropy. They differ in appearance, and existing methods to prove their agreement are not elementary, as they require an evaluati…
▽ More
The error exponent of a discrete memoryless channel is expressed in two forms. One is Gallager's expression with a positive slope parameter and the other is Csiszar and Korner's information-theoretic representation expressed using the mutual information and the relative entropy. They differ in appearance, and existing methods to prove their agreement are not elementary, as they require an evaluation of the KKT conditions that the optimal distribution must satisfy. Similarly, there are two types of expressions for the strong converse exponent. They are Arimoto's expression with a negative slope parameter and Dueck and Korner's information-theoretic expression. The purpose of this paper is to clarify the relation between two ways of representing exponents, i.e., representations using slope parameters and those using information-theoretic quantities, from the viewpoint of algorithms for computing exponents. Arimoto's algorithm is based on expression using slope parameters, while the authors' and Tridenski and Zamir's algorithms are based on Dueck and Korner's information-theoretic expression. An algorithm family that includes the above two algorithms as special cases was recently proposed. This paper clarifies that the convergence of Tridenski and Zamir's algorithm proves the match of Arimoto's and Dueck and Korner's exponents. We discuss another family of algorithms and, using the surrogate objective function used therein, prove that the two expressions of the error exponent coincide. Evaluation of the KKT condition is not needed in this proof. We then discuss the computation of the error and correct decoding probability exponents in lossy source coding. A new algorithm family for computing the source coding strong converse exponent is defined. The convergence of a member of the algorithm family implies the match of the two expressions of the strong converse exponent.
△ Less
Submitted 4 November, 2022; v1 submitted 12 May, 2022;
originally announced May 2022.
-
The Conditional Information Leakage Given Eavesdropper's Received Signals in Wiretap Channels
Authors:
Yutaka Jitsumatsu,
Ukyo Michiwaki,
Yasutada Oohama
Abstract:
Information leakage in Wyner's wiretap channel model is usually defined as the mutual information between the secret message and the eavesdropper's received signal. We define a new quantity called "conditional information leakage given the eavesdropper's received signals," which expresses the amount of information that eavesdropper gains from his/her received signal. A benefit of introducing this…
▽ More
Information leakage in Wyner's wiretap channel model is usually defined as the mutual information between the secret message and the eavesdropper's received signal. We define a new quantity called "conditional information leakage given the eavesdropper's received signals," which expresses the amount of information that eavesdropper gains from his/her received signal. A benefit of introducing this quantity is that we can develop a fast algorithm for computing the conditional information leakage, which has linear complexity in the code length $n$, while the complexity for computing the usual information leakage is exponential in $n$. Validity of such a conditional information leakage as a security criterion is confirmed by studying the cases of binary symmetric channels and binary erasure channels.
△ Less
Submitted 24 January, 2019; v1 submitted 18 January, 2019;
originally announced January 2019.
-
An Iterative Algorithm for Computing the Optimal Exponent of Correct Decoding Probability for Rates below the Rate Distortion Function
Authors:
Yutaka Jitsumatsu,
Yasutada Oohama
Abstract:
The form of Dueck and Körner's exponent function for correct decoding probability for discrete memoryless channels at rates above the capacity is similar to the form of Csiszár and Körner's exponent function for correct decoding probability in lossy source coding for discrete memoryless sources at rates below the rate distortion function. We recently gave a new algorithm for computing Dueck and Kö…
▽ More
The form of Dueck and Körner's exponent function for correct decoding probability for discrete memoryless channels at rates above the capacity is similar to the form of Csiszár and Körner's exponent function for correct decoding probability in lossy source coding for discrete memoryless sources at rates below the rate distortion function. We recently gave a new algorithm for computing Dueck and Körner's exponent. In this paper, we give an algorithm for computing Csiszár and Körner's exponent. The proposed algorithm can be also used to compute cutoff rate and the rate distortion function.
△ Less
Submitted 27 May, 2016; v1 submitted 22 January, 2016;
originally announced January 2016.