麻豆传媒AV

Machine Learning-Aided Efficient Decoding of Reed鈥揗uller Subcodes

Submitted by admin on Wed, 10/23/2024 - 01:52

Reed-Muller (RM) codes achieve the capacity of general binary-input memoryless symmetric channels and are conjectured to have a comparable performance to that of random codes in terms of scaling laws. However, such results are established assuming maximum-likelihood decoders for general code parameters. Also, RM codes only admit limited sets of rates. Efficient decoders such as successive cancellation list (SCL) decoder and recently-introduced recursive projection-aggregation (RPA) decoders are available for RM codes at finite lengths.

Efficient Algorithms for the Bee-Identification Problem

Submitted by admin on Wed, 10/23/2024 - 01:52

The bee-identification problem, formally defined by Tandon, Tan, and Varshney (2019), requires the receiver to identify 鈥渂ees鈥 using a set of unordered noisy measurements. In this previous work, Tandon, Tan, and Varshney studied error exponents and showed that decoding the measurements jointly results in a significantly larger error exponent. In this work, we study algorithms related to this joint decoder. First, we demonstrate how to perform joint decoding efficiently.

Fast and Low-Complexity Soft-Decision Generalized Integrated Interleaved Decoder

Submitted by admin on Wed, 10/23/2024 - 01:52

Generalized integrated interleaved (GII) codes are essential to next-generation digital communication and storage systems since they can achieve very high decoding throughput with low complexity. Only hard-decision GII decoding has been considered in previous work. To further improve the error-correcting capability, soft-decision decoding algorithms utilizing the channel probability information need to be developed. The decoding of GII codes constructed based on BCH codes consists of multiple rounds of BCH decoding.

New Bounds on the Size of Binary Codes With Large Minimum Distance

Submitted by admin on Wed, 10/23/2024 - 01:52

Let $A(n, d)$ denote the maximum size of a binary code of length $n$ and minimum Hamming distance $d$ . Studying $A(n, d)$ , including efforts to determine it as well to derive bounds on $A(n, d)$ for large $n$ 鈥檚, is one of the most fundamental subjects in coding theory. In this paper, we explore new lower and upper bounds on $A(n, d)$ in the large-minimum distance regime, in particular, when $d = n/2 - \Omega (\sqrt {n})$ .

Private Information Retrieval Without Storage Overhead: Coding Instead of Replication

Submitted by admin on Wed, 10/23/2024 - 01:52

Private information retrieval (PIR) protocols allow a user to retrieve a data item from a database without revealing any information about the identity of the item being retrieved. Specifically, in information-theoretic $k$ -server PIR, the database is replicated among $k$ non-communicating servers, and each server learns nothing about the item retrieved by the user. The effectiveness of PIR protocols is usually measured in terms of their communication complexity, which is the total number of bits exchanged between the user and the servers.

Bee Identification Problem for DNA Strands

Submitted by admin on Wed, 10/23/2024 - 01:52

Motivated by DNA-based applications, we generalize the bee identification problem proposed by Tandon et al. (2019). In this setup, we transmit all $M$ codewords from a codebook over some channel and each codeword results in $N$ noisy outputs. Then our task is to identify each codeword from this unordered set of $MN$ noisy outputs. First, via a reduction to a minimum-cost flow problem on a related bipartite flow network called the input-output flow network, we show that the problem can be solved in $O(M^{3})$ time in the worst case.

Active Privacy-Utility Trade-Off Against Inference in Time-Series Data Sharing

Submitted by admin on Wed, 10/23/2024 - 01:52

Internet of Things devices have become highly popular thanks to the services they offer. However, they also raise privacy concerns since they share fine-grained time-series user data with untrusted third parties. We model the user鈥檚 personal information as the secret variable, to be kept private from an honest-but-curious service provider, and the useful variable, to be disclosed for utility.

SPRT-Based Efficient Best Arm Identification in Stochastic Bandits

Submitted by admin on Wed, 10/23/2024 - 01:52

This paper investigates the best arm identification (BAI) problem in stochastic multi-armed bandits in the fixed confidence setting. The general class of the exponential family of bandits is considered. The existing algorithms for the exponential family of bandits face computational challenges. To mitigate these challenges, the BAI problem is viewed and analyzed as a sequential composite hypothesis testing task, and a framework is proposed that adopts the likelihood ratio-based tests known to be effective for sequential testing.

Dual-Blind Deconvolution for Overlaid Radar-Communications Systems

Submitted by admin on Wed, 10/23/2024 - 01:52

The increasingly crowded spectrum has spurred the design of joint radar-communications systems that share hardware resources and efficiently use the radio frequency spectrum. We study a general spectral coexistence scenario, wherein the channels and transmit signals of both radar and communications systems are unknown at the receiver. In this dual-blind deconvolution (DBD) problem, a common receiver admits a multi-carrier wireless communications signal that is overlaid with the radar signal reflected off multiple targets.