Quantum secret-sharing and quantum error-correction schemes rely on multipartite decoding protocols, yet the nonlocal operations involved are challenging and sometimes infeasible. Here we construct a quantum secret-sh...
详细信息
Quantum secret-sharing and quantum error-correction schemes rely on multipartite decoding protocols, yet the nonlocal operations involved are challenging and sometimes infeasible. Here we construct a quantum secret-sharing protocol with a reduced number of quantum communication channels between the players. We introduce a scheme based on embedding a classical linear code into a quantum error-correcting code and then mapping the latter to a quantum secret-sharing protocol. In contrast to the Calderbank-Shor-Steane construction, we do not impose any restriction on the classical code; our protocol works with any arbitrary linear code. Our work paves the way towards the more general problem of simplifying the decoding of quantum error-correcting codes.
We conducted simulations on the neuronal behavior of neuristor-based leaky integrate-and-fire (NLIF) neurons. The phase-plane analysis on the NLIF neuron highlights its spiking dynamics determined by two nullclines co...
详细信息
We conducted simulations on the neuronal behavior of neuristor-based leaky integrate-and-fire (NLIF) neurons. The phase-plane analysis on the NLIF neuron highlights its spiking dynamics determined by two nullclines conditional on the variables on the plane. Particular emphasis was placed on the operational noise arising from the variability of the threshold switching behavior in the neuron on each switching event. As a consequence, we found that the NLIF neuron exhibits a Poisson-like noise in spiking, delimiting the reliability of the information conveyed by individual NLIF neurons. To highlight neuronal information coding at a higher level, a population of noisy NLIF neurons was analyzed in regard to probability of successful information decoding given the Poisson-like noise of each neuron. The result demonstrates highly probable success in decoding in spite of large variability - due to the variability of the threshold switching behavior - of individual neurons.
There have been many attempts to apply chaotic signals to communications or radar, but one obstacle has been that there is no effective way to recover chaotic signals from noise larger than the signal. In this work, w...
详细信息
There have been many attempts to apply chaotic signals to communications or radar, but one obstacle has been that there is no effective way to recover chaotic signals from noise larger than the signal. In this work, we create "pseudo-chaotic" signals by concatenating dictionary sequences generated from a chaotic attractor. Because the number of dictionary sequences is finite, these pseudo-chaotic signals are not actually chaotic, but they can still contain some of the desirable properties of chaos. Using dictionary sequences allows the pseudo-chaotic signal to be recovered from noise using a correlation detector and a Viterbi decoder, so the signal can be recovered from noise or interference that is larger than the signal itself.
This paper proposes a kind of security radio data transmission mode based on Turbo codes for Communication Based Train Control (CBTC) system in urban mass transit, and presents the simulation and analysis with several...
详细信息
ISBN:
(纸本)9781424421138
This paper proposes a kind of security radio data transmission mode based on Turbo codes for Communication Based Train Control (CBTC) system in urban mass transit, and presents the simulation and analysis with several different decoding algorithms in this paper, such as Bi-SOVA, SOVA, MAP and Max-Log-MAP. The results show that Bi-SOVA algorithm and Max-Log-MAP algorithm have better performance of bit error. Therefore, it is reasonable and effective to use Turbo codes for replacing traditional CRC for error-correction in security radio data transmission of CBTC system.
This paper proposes a kind of security radio data transmission mode based on Turbo codes for Communication Based Train Control (CBTC) system in urban mass transit, and presents the simulation and analysis with several...
详细信息
This paper proposes a kind of security radio data transmission mode based on Turbo codes for Communication Based Train Control (CBTC) system in urban mass transit, and presents the simulation and analysis with several different decoding algorithms in this paper, such as Bi-SOVA, SOVA, MAP and Max-Log-MAP. The results show that Bi-SOVA algorithm and Max-Log-MAP algorithm have better performance of bit error. Therefore, it is reasonable and effective to use Turbo codes for replacing traditional CRC for error-correction in security radio data transmission of CBTC system.
LDPC codes have been intensively used in various wireless communication applications, due to their increased BER performance. The present paper summarizes the state of the art applications of short length LDPC codes a...
详细信息
ISBN:
(纸本)9781479914920
LDPC codes have been intensively used in various wireless communication applications, due to their increased BER performance. The present paper summarizes the state of the art applications of short length LDPC codes and proposes FPGA based application specific hardware architectures for short-length LDPC decoders. The decoding algorithms considered for implementation are both belief propagation and min-sum algorithm. Due to the increased BER performances, the proposed architecture make use of parallel computation capabilities offered by FPGA technology in order to implement the belief propagation algorithm. In spite of the iterative nature and increased computational complexity of the LDPC decoding algorithm, the proposed architecture achieves high-throughput, mandatory in real-time application and data transmission. The architecture for the LDPC belief propagation based decoder is based on arctangent hyperbolic function approximation used for check nodes update.
暂无评论