channel decoding
Recently Published Documents


TOTAL DOCUMENTS

342
(FIVE YEARS 9)

H-INDEX

26
(FIVE YEARS 0)

Author(s):  
Chunlin Yan ◽  
Wei Liu ◽  
Hongwei Yuan

Massive machine type communications (mMTC) are one of the critical requirements for beyond fifth generation (B5G) communication systems. Services for a huge number of user terminals should be provided simultaneously due to the explosive development of mMTC. It is proved that non-orthogonal multiple access (NOMA) is effective in satisfying such a requirement. In this paper we evaluate the impacts of numerous factors, such as channel encoding, channel decoding, repetition number, multi-user detector, and number of receiver antennas, on the performance of NOMA. It is surprised to find that some conclusions drawn from orthogonal multiple access system may do not hold anymore for NOMA systems. The factors which have significant impact on the performance of NOMA should be paid more attention to in the system design. The analysis and evaluation results shine more light on how to design an effect NOMA scheme by considering both transmitter and receiver to fulfill the requirements of mMTC for B5G systems.



2021 ◽  
Author(s):  
Wensen Xu ◽  
Lihao Zhang ◽  
Taotao Wang ◽  
Soung Chang Liew


2021 ◽  
Author(s):  
Kai Niu ◽  
Jincheng Dai ◽  
Kailin Tan ◽  
Jian Gao




Computers ◽  
2021 ◽  
Vol 10 (7) ◽  
pp. 87
Author(s):  
Juan Jose Gomez-Ricardez ◽  
Jose Juan Garcia-Hernandez

Although the development of watermarking techniques has enabled designers to tackle normal processing attacks (e.g., amplitude scaling, noise addition, re-compression), robustness against malicious attacks remains a challenge. The discordant size content replacement attack is an attack against watermarking schemes which performs content replacement that increases or reduces the number of samples in the signal. This attack modifies the content and length of the signal, as well as desynchronizes the position of the watermark and its removal. In this paper, a source-channel coding approach for protecting an audio signal against this attack was applied. Before applying the source-channel encoding, a decimation technique was performed to reduce by one-half the number of samples in the original signal. This technique allowed compressing at a bit rate of 64 kbps and obtaining a watermarked audio signal with an excellent quality scale. In the watermark restoration, an interpolation was applied after the source-channel decoding to recover the content and the length. The procedure of decimation–interpolation was taken because it is a linear and time-invariant operation and is useful in digital audio. A synchronization strategy was designed to detect the positions where the number of samples in the signal was increased or reduced. The restoration ability of the proposed scheme was tested with a mathematical model of the discordant size content replacement attack. The attack model confirmed that it is necessary to design a synchronizing strategy to correctly extract the watermark and to recover the tampered signal. Experimental results show that the scheme has better restoration ability than state-of-the-art schemes. The scheme was able to restore a tampered area of around 20% with very good quality, and up to 58.3% with acceptable quality. The robustness against the discordant size content replacement attack was achieved with a transparency threshold above −2.





Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1434
Author(s):  
Jan Lewandowsky ◽  
Sumedh Jitendra Dongare ◽  
Rocío Martín Lima ◽  
Marc Adrat ◽  
Matthias Schrammen ◽  
...  

The preservation of relevant mutual information under compression is the fundamental challenge of the information bottleneck method. It has many applications in machine learning and in communications. The recent literature describes successful applications of this concept in quantized detection and channel decoding schemes. The focal idea is to build receiver algorithms intended to preserve the maximum possible amount of relevant information, despite very coarse quantization. The existent literature shows that the resulting quantized receiver algorithms can achieve performance very close to that of conventional high-precision systems. Moreover, all demanding signal processing operations get replaced with lookup operations in the considered system design. In this paper, we develop the idea of maximizing the preserved relevant information in communication receivers further by considering parametrized systems. Such systems can help overcome the need of lookup tables in cases where their huge sizes make them impractical. We propose to apply genetic algorithms which are inspired from the natural evolution of the species for the problem of parameter optimization. We exemplarily investigate receiver-sided channel output quantization and demodulation to illustrate the notable performance and the flexibility of the proposed concept.







2020 ◽  
Vol 2020 ◽  
pp. 1-16
Author(s):  
Amaad Khalil ◽  
Nasru minallah ◽  
Muhammad Asfandyar Awan ◽  
Hameed Ullah Khan ◽  
Atif Sardar Khan ◽  
...  

In this research work, we have presented an iterative joint source channel decoding- (IJSCD-) based wireless video communication system. The anticipated transmission system is using the sphere packing (SP) modulation assisted differential space-time spreading (DSTS) multiple input-multiple output (MIMO) scheme. SP modulation-aided DSTS transmission mechanism results in achieving high diversity gain by keeping the maximum possible Euclidean distance between the modulated symbols. Furthermore, the proposed DSTS scheme results in a low-complexity MIMO scheme, due to nonemployment of any channel estimation mechanism. Various combinations of source bit coding- (SBC-) aided IJSCD error protection scheme has been used, while considering their identical overall bit rate budget. Artificial redundancy is incorporated in the source-coded stream for the proposed SBC scheme. The motive of adding artificial redundancy is to increase the iterative decoding performance. The performance of diverse SBC schemes is investigated for identical overall code rate. SBC schemes are employed with different combinations of inner recursive systematic convolutional (RSC) codes and outer SBC codes. Furthermore, the convergence behaviour of the employed error protection schemes is investigated using extrinsic information transfer (EXIT) charts. The results of experiments show that our proposed R a t e − 2 / 3 SBC-assisted error protection scheme with high redundancy incorporation and convergence capability gives better performance. The proposed R a t e − 2 / 3 SBC gives about 1.5 dB E b / N 0 gain at the PSNR degradation point of 1 dB as compared to R a t e − 6 / 7 SBC-assisted error protection scheme, while sustaining the overall bit rate budget. Furthermore, it is also concluded that the proposed R a t e − 2 / 3 SBC-assisted scheme results in E b / N 0 gain of 24 dB at the PSNR degradation point of 1 dB with reference to R a t e − 1 SBC benchmarker scheme.



Sign in / Sign up

Export Citation Format

Share Document