successive decoding
Recently Published Documents


TOTAL DOCUMENTS

49
(FIVE YEARS 9)

H-INDEX

10
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Kumud Altmayer ◽  
Stephen G. Wilson

<p>In this work the study has been done on the performance pertaining to the binary antipodal AWGN channel for rate ½ coding approaches, with short and medium blocklengths. This work emphasizes on the contributions of various events leading to block error and their dependence on signal-to-noise ratio, decoder list size, CRC length, if any, and the role of list sorting. Furthermore, this work generalizes to variations, including Reed-Muller/Polar codes that follow the polarization and the method of successive decoding.<br></p>


2021 ◽  
Author(s):  
Kumud Altmayer ◽  
Stephen G. Wilson

<p>In this work the study has been done on the performance pertaining to the binary antipodal AWGN channel for rate ½ coding approaches, with short and medium blocklengths. This work emphasizes on the contributions of various events leading to block error and their dependence on signal-to-noise ratio, decoder list size, CRC length, if any, and the role of list sorting. Furthermore, this work generalizes to variations, including Reed-Muller/Polar codes that follow the polarization and the method of successive decoding.<br></p>


Author(s):  
Mahdi Nangir ◽  
Jafar Pourrostam ◽  
Javad Musevi Niya ◽  
Behzad Mozaffari Tazehkand
Keyword(s):  

2020 ◽  
Vol 69 (7) ◽  
pp. 7998-8002 ◽  
Author(s):  
Peng Li ◽  
Xin Jian ◽  
Fang Wang ◽  
Shu Fu ◽  
Zhaotao Zhang

2019 ◽  
Vol 1 (1) ◽  
Author(s):  
Antonia Arvanitaki ◽  
Nikolaos Pappas ◽  
Parthajit Mohapatra ◽  
Niklas Carlsson

AbstractIn this paper, we consider the two-user broadcast channel with security constraints. We assume that a source broadcasts packets to two receivers, and that one of them has secrecy constraints, i.e., its packets need to be kept secret from the other receiver. The receiver with secrecy constraint has full-duplex capability, allowing it to transmit a jamming signal to increase its secrecy. We derive the average delay per packet and provide simulations and numerical results, where we compare different performance metrics for the cases when both receivers treat interference as noise, when the legitimate receiver performs successive decoding, and when the eavesdropper performs successive decoding. The results show that successive decoding provides better average packet delay for the legitimate user. Furthermore, we define a new metric that characterizes the reduction on the success probability for the legitimate user that is caused by the secrecy constraint. The results show that secrecy poses a significant amount of packet delay for the legitimate receiver when either receiver performs successive decoding. We also formulate an optimization problem, wherein the throughput of the eavesdropper is maximized under delay and secrecy rate constraints at the legitimate receiver. We provide numerical results for the optimization problem, where we show the trade-off between the transmission power for the jamming and the throughput of the non-legitimate receiver. The results provide insights into how channel ordering and encoding differences can be exploited to improve performance under different interference conditions.


2019 ◽  
Vol 67 (1) ◽  
pp. 457-471
Author(s):  
Zhengchuan Chen ◽  
Qizhong Yao ◽  
Howard H. Yang ◽  
Tony Q. S. Quek

Sign in / Sign up

Export Citation Format

Share Document