Skip to main content

Showing 1–11 of 11 results for author: Vinck, A J H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.06073  [pdf

    cs.IT

    On the Binary Symmetric Channel with a Transition Probability Determined by a Poisson Distribution

    Authors: A. J. Han Vinck, Fatma Rouissi

    Abstract: The classical Binary Symmetric Channel has a fixed transition probability. We discuss the Binary Symmetric Channel with a variable transition probability that depends on a Poisson distribution. The error rate for this channel is determined and we also give bounds for the channel capacity. We give a motivation for the model based on the Class-A impulse noise model, as given by Middleton. The channe… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

    Comments: 5 pages and 12 figures

  2. arXiv:2205.01044  [pdf

    cs.IT

    Coding Concepts and Reed-Solomon Codes

    Authors: A. J. Han Vinck

    Abstract: The material in this book is presented to graduate students in Information and Communication theory. The idea is that we give an introduction to particular applications of information theory and coding in digital communications. The goal is to bring understanding of the underlying concepts, both in theory as well as in practice. We mainly concentrate on our own research results. After showing obta… ▽ More

    Submitted 2 May, 2022; originally announced May 2022.

  3. arXiv:1907.02944  [pdf

    cs.IT

    Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory

    Authors: A. J. Han Vinck, Kees A. Schouhamer Immink, Tadashi Wadayama, Van Khu Vu, Akiko Manada, Kui Cai, Shunsuke Horii, Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta, Xingwei Zhong, Zhen Mei, Renfei Bu, J. H. Weber, Vitaly Skachek, Hiroyoshi Morita, N. Hovhannisyan, Hiroshi Kamabe, Shan Lu, Hirosuke Yamamoto, Kengo Hasimoto, O. Ytrehus, Shigeaki Kuzuoaka, Mikihiko Nishiara, Han Mao Kiah , et al. (2 additional authors not shown)

    Abstract: This year, 2019 we celebrate 30 years of our friendship between Asian and European scientists at the AEW11 in Rotterdam, the Netherlands. Many of the 1989 participants are also present at the 2019 event. This year we have many participants from different parts of Asia and Europe. It shows the importance of this event. It is a good tradition to pay a tribute to a special lecturer in our community.… ▽ More

    Submitted 26 June, 2019; originally announced July 2019.

  4. arXiv:1707.08567  [pdf

    cs.IT

    Proceedings of Workshop AEW10: Concepts in Information Theory and Communications

    Authors: Kees A. Schouhamer Immink, Stan Baggen, Ferdaous Chaabane, Yanling Chen, Peter H. N. de With, Hela Gassara, Hamed Gharbi, Adel Ghazel, Khaled Grati, Naira M. Grigoryan, Ashot Harutyunyan, Masayuki Imanishi, Mitsugu Iwamoto, Ken-ichi Iwata, Hiroshi Kamabe, Brian M. Kurkoski, Shigeaki Kuzuoka, Patrick Langenhuizen, Jan Lewandowsky, Akiko Manada, Shigeki Miyake, Hiroyoshi Morita, Jun Muramatsu, Safa Najjar, Arnak V. Poghosyan , et al. (9 additional authors not shown)

    Abstract: The 10th Asia-Europe workshop in "Concepts in Information Theory and Communications" AEW10 was held in Boppard, Germany on June 21-23, 2017. It is based on a longstanding cooperation between Asian and European scientists. The first workshop was held in Eindhoven, the Netherlands in 1989. The idea of the workshop is threefold: 1) to improve the communication between the scientist in the different p… ▽ More

    Submitted 27 July, 2017; originally announced July 2017.

    Comments: 44 pages, editors for the proceedings: Yanling Chen and A. J. Han Vinck

    MSC Class: 68P30; 94A05

  5. arXiv:1707.05932  [pdf, other

    cs.IT

    Effects of Feedback on the One-sided Secrecy of Two-way Wiretap through Multiple Transmissions

    Authors: Chao Qi, Yanling Chen, A. J. Han Vinck, Xiaohu Tang

    Abstract: In this paper, the one-sided secrecy of two-way wiretap channel with feedback is investigated, where the confidential messages of one user through multiple transmissions is guaranteed secure against an external eavesdropper. For one thing, one-sided secrecy satisfies the secure demand of many practical scenarios. For another, the secrecy is measured over many blocks since the correlation between e… ▽ More

    Submitted 18 July, 2017; originally announced July 2017.

  6. arXiv:1702.00977  [pdf, ps, other

    cs.IT

    Relay Selection in Cooperative Power Line Communication: A Multi-Armed Bandit Approach

    Authors: Babak Nikfar, A. J. Han Vinck

    Abstract: Power line communication (PLC) exploits the existence of installed infrastructure of power delivery system, in order to transmit data over power lines. In PLC networks, different nodes of the network are interconnected via power delivery transmission lines, and the data signal is flowing between them. However, the attenuation and the harsh environment of the power line communication channels, make… ▽ More

    Submitted 3 February, 2017; originally announced February 2017.

  7. arXiv:1701.06187  [pdf, other

    cs.IT

    Joint secrecy over the K-Transmitter Multiple Access Channel

    Authors: Yanling Chen, O. Ozan Koyluoglu, A. J. Han Vinck

    Abstract: This paper studies the problem of secure communication over a K-transmitter multiple access channel in the presence of an external eavesdropper, subject to a joint secrecy constraint (i.e., information leakage rate from the collection of K messages to an eavesdropper is made vanishing). As a result, we establish the joint secrecy achievable rate region. To this end, our results build upon two tech… ▽ More

    Submitted 22 January, 2017; originally announced January 2017.

    Comments: 6 pages, 1 figure

    MSC Class: 94A15; 97E60

  8. arXiv:1509.07236  [pdf

    cs.IT

    Impulse Noise and Narrowband PLC

    Authors: A. J. Han Vinck, F. Rouissi, T. Shongwe, G. R. Colen, L. G. Oliveira

    Abstract: We discuss the influence of random- and periodic impulse noise on narrowband (< 500 kHz frequency band) Power Line Communications. We start with random impulse noise and compare the properties of the measured impulse noise with the common theoretical models like Middleton Class-A and Mixed Gaussian. The main difference is the fact that the measured impulse noise is noise with memory for the narrow… ▽ More

    Submitted 24 September, 2015; originally announced September 2015.

    Comments: To be presented at WSPLC in Klagenfurt, Austria, September 21-22, 2015

  9. arXiv:1208.1697  [pdf, other

    cs.IT

    Information-Theoretical Security for Several Models of Multiple-Access Channel

    Authors: Bin Dai, A. J. Han Vinck, Zhuojun Zhuang, Yuan Luo

    Abstract: Several security models of multiple-access channel (MAC) are investigated. First, we study the degraded MAC with confidential messages, where two users transmit their confidential messages (no common message) to a destination, and each user obtains a degraded version of the output of the MAC. Each user views the other user as a eavesdropper, and wishes to keep its confidential message as secret as… ▽ More

    Submitted 28 December, 2012; v1 submitted 8 August, 2012; originally announced August 2012.

    Comments: Submitted to IEEE Trans. on Information Theory. arXiv admin note: text overlap with arXiv:1201.2859

  10. Degraded Broadcast Channel with Side Information, Confidential Messages and Noiseless Feedback

    Authors: Bin Dai, A. J. Han Vinck, Zhuojun Zhuang, Yuan Luo

    Abstract: In this paper, first, we investigate the model of degraded broadcast channel with side information and confidential messages. This work is from Steinberg's work on the degraded broadcast channel with causal and noncausal side information, and Csisz$\acute{a}$r-Körner's work on broadcast channel with confidential messages. Inner and outer bounds on the capacity-equivocation regions are provided for… ▽ More

    Submitted 31 October, 2012; v1 submitted 13 January, 2012; originally announced January 2012.

    Comments: Part of this paper has been accepted by ISIT2012, and this paper is submitted to IEEE Transactions on Information Theory

  11. arXiv:1104.1528  [pdf

    cs.IT

    Coded Modulation for Power Line Communications

    Authors: A. J. Han Vinck

    Abstract: We discuss the application of coded modulation for power-line communications. We combine M-ary FSK with diversity and coding to make the transmission robust against permanent frequency disturbances and impulse noise. We give a particular example of the coding/modulation scheme that is in agreement with the existing CENELEC norms. The scheme can be considered as a form of coded Frequency Hop** an… ▽ More

    Submitted 8 April, 2011; originally announced April 2011.

    Comments: 7 pages; AEÜ Journal, 2000, pp. 45-49, Jan 2000