The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] erasure channels(4hit)

1-4hit
  • Decoding Error of Sudoku for Erasure Channels

    Mikihiko NISHIARA  Ryo HIDAI  

     
    PAPER-Channel Coding

      Vol:
    E100-A No:12
      Page(s):
    2641-2646

    Sudoku is a pencil puzzle. The aim of the solver is to complete the 9×9 grid by filling in a digit in every cell according to a certain rule. In this study, we regard the process of solving Sudoku as a process of decoding a codeword from a received word, and show the expected decoding error probability for erasure channels obtained by experiments.

  • Design of a New 4-Dimensional Constellation-Rotation Modulation Method for DVB-NGH

    Taejin JUNG  Hyoungsoo LIM  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E95-B No:11
      Page(s):
    3625-3628

    In this letter, we propose a new 4-dimensional constellation-rotation (CR) modulation method that achieves diversity gain of 4 in Rayleigh fading channels. The proposed scheme consists of two consecutive CR operations for QAM symbols unlike the conventional 2-dimensional CR method based on only one CR operation. Computer simulation results show that the new method exhibits much better performance than the conventional one in terms of code rate and channel erasure ratio.

  • Secret Key Capacity and Advantage Distillation Capacity

    Jun MURAMATSU  Kazuyuki YOSHIMURA  Peter DAVIS  

     
    PAPER-Cryptography

      Vol:
    E89-A No:10
      Page(s):
    2589-2596

    Secret key agreement is a procedure for agreeing on a secret key by exchanging messages over a public channel when a sender, a legitimate receiver (henceforth referred to as a receiver), and an eavesdropper have access to correlated sources. Maurer [6] defined secret key capacity, which is the least upper bound of the key generation rate of the secret key agreement, and presented an upper and a lower bound for the secret key capacity. The advantage distillation capacity is introduced and it is shown that this quantity equals to the secret key capacity. Naive information theoretical expressions of the secret key capacity and the advantage distillation capacity are also presented. An example of correlated sources, for which an analytic expression of the secret key capacity can be obtained, is also presented.

  • A Pseudo-Inverse Based Iterative Decoding Method for DFT Codes in Erasure Channels

    Paeiz AZMI  Farokh MARVASTI  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E87-B No:10
      Page(s):
    3092-3095

    One of the categories of decoding techniques for DFT codes in erasure channels is the class of iterative algorithms. Iterative algorithms can be considered as kind of alternating mapping methods using the given information in a repetitive way. In this paper, we propose a new iterative method for decoding DFT codes. It will be shown that the proposed method outperforms the well-known methods such as Wiley/Marvasti, and ADPW methods in the decoding of DFT codes in erasure channels.