-
Properties of Syndrome Distribution for Blind Reconstruction of Cyclic Codes
Authors:
Arti D. Yardi,
Saravanan Vijayakumaran
Abstract:
In the problem of blind reconstruction of channel codes, the receiver does not have the knowledge of the channel code used at the transmitter and the aim is to identify this unknown channel code corresponding to the given received sequence. In this paper, we study this blind reconstruction problem for binary cyclic codes. In the literature, several researchers have proposed blind reconstruction al…
▽ More
In the problem of blind reconstruction of channel codes, the receiver does not have the knowledge of the channel code used at the transmitter and the aim is to identify this unknown channel code corresponding to the given received sequence. In this paper, we study this blind reconstruction problem for binary cyclic codes. In the literature, several researchers have proposed blind reconstruction algorithms that make use of the distribution of the syndromes (remainders) of the received polynomials with respect to a candidate polynomial for the generator polynomial of the cyclic code. However, very limited analysis is available for the syndrome distribution and its properties. In this paper, we study the syndrome structure of the received polynomials. Specifically, we prove that the syndrome distribution of the noise-free sequence can either be uniform or restricted uniform. We also provide the necessary and sufficient conditions for it to be of the either type. For the noise-affected received sequence we prove that, finding the syndrome distribution is in general computationally intractable. We also apply these results to analyze the performance of the existing methods and verify some of the assumptions made in the literature for blind reconstruction.
△ Less
Submitted 12 October, 2017; v1 submitted 7 October, 2017;
originally announced October 2017.
-
Detecting Linear Block Codes in Noise using the GLRT
Authors:
Arti D. Yardi,
Saravanan Vijayakumaran
Abstract:
In this paper, we consider the problem of distinguishing the noisy codewords of a known binary linear block code from a random bit sequence. We propose to use the generalized likelihood ratio test (GLRT) to solve this problem. We also give a formula to find approximate number of codewords required and compare our results with an existing method.
In this paper, we consider the problem of distinguishing the noisy codewords of a known binary linear block code from a random bit sequence. We propose to use the generalized likelihood ratio test (GLRT) to solve this problem. We also give a formula to find approximate number of codewords required and compare our results with an existing method.
△ Less
Submitted 31 October, 2012;
originally announced October 2012.
-
Capacity of the Degraded Half-Duplex Relay Channel
Authors:
Saravanan Vijayakumaran,
Tan F. Wong,
Tat M. Lok
Abstract:
A discrete memoryless half-duplex relay channel is constructed from a broadcast channel from the source to the relay and destination and a multiple access channel from the source and relay to the destination. When the relay listens, the channel operates in the broadcast mode. The channel switches to the multiple access mode when the relay transmits. If the broadcast component channel is physical…
▽ More
A discrete memoryless half-duplex relay channel is constructed from a broadcast channel from the source to the relay and destination and a multiple access channel from the source and relay to the destination. When the relay listens, the channel operates in the broadcast mode. The channel switches to the multiple access mode when the relay transmits. If the broadcast component channel is physically degraded, the half-duplex relay channel will also be referred to as physically degraded. The capacity of this degraded half-duplex relay channel is examined. It is shown that the block Markov coding suggested in the seminal paper by Cover and El Gamal can be modified to achieve capacity for the degraded half-duplex relay channel. In the code construction, the listen-transmit schedule of the relay is made to depend on the message to be sent and hence the schedule carries information itself. If the schedule is restricted to be deterministic, it is shown that the capacity can be achieved by a simple management of information flows across the broadcast and multiple access component channels.
△ Less
Submitted 16 August, 2007;
originally announced August 2007.
-
Encoding of Functions of Correlated Sources
Authors:
Saravanan Vijayakumaran
Abstract:
This submission is being withdrawn due to serious errors in the achievability proofs. The reviewers of the journal I had submitted to had found errors back in 2006. I had forgotten about this paper until I saw the CFP for a JSAC issue on in-network computation. http://www.jsac.ucsd.edu/Calls/in-networkcomputationcfp.pdf.
This submission is being withdrawn due to serious errors in the achievability proofs. The reviewers of the journal I had submitted to had found errors back in 2006. I had forgotten about this paper until I saw the CFP for a JSAC issue on in-network computation. http://www.jsac.ucsd.edu/Calls/in-networkcomputationcfp.pdf.
△ Less
Submitted 1 September, 2011; v1 submitted 28 March, 2006;
originally announced March 2006.