ERROR-CORRECTING CODES
AN APPROACH TO DEVELOPMENT OF BLOCK-COMMUTATIVE CODES WITH LOW DENSITY OF PARITY CHECK
Alexander V. Kozlov, Evgeny A. Krouk, Andrei A. Ovchinnikov
9
Methods of low-density parity-check codes construction are proposed. The codes constructions are presented, results of application of the codes in AWGN channel are demonstrated.
THE LOWER BOUND OF SYSTEMATIC UNIFORMLY ROBUST CODE LENGTH
Maksim O. Alekseev
14
Basic definitions of error-detecting robust codes are formulated; the area of the codes application is described. The lower bound of the length of systematic R-uniformly distributed codes is deduced. Comparison with the present-day results is carried out.
MODIFICATION OF GOERTZEL-BLAHUT ALGORITHM
Sergey V. Fedorenko
17
The classic Goertzel-Blahut algorithm for computation of discrete Fourier transform over a finite field is considered along with several modifications of the classic algorithm. It is shown that the modified Goertzel—Blahut algorithm is closely related to the fast Fourier transform algorithms rather than to the semi-fast algorithms.
A NEW ALGORITHM FOR LIST DECODING OF TURBO CODES
Akmal I. Akmalkhodzhaev, Alexander V. Kozlov
20
The problem of list decoding of turbo codes is considered. A new algorithm of window-based list decoder of convolutional code with soft output is developed in the frames of the parallel turbo decoding method. The proposed algorithm is shown to outperform the algorithm presented earlier; the gain in performance is obtained not only with short words, but also with words of considerable length.
A NEW CONSTRUCTION OF SYSTEMATIC ROBUST CODE
Maksim O. Alekseev
24
A concept of a robust code is presented. Basic characteristics of such a code are formulated, and a new construction method is proposed. A nonlinear function is introduced to compute check symbols. Analysis of the code robustness in the case of unidirectional errors is performed.
WIRELESS COMMUNICATION NETWORKS
A METHOD OF ASSESSMENT OF WIRELESS NETWORK TOPOLOGY WITH THE USE OF A PRIORY INFORMATION ON DEVICE POSITION
Evgeny A. Bakin, Konstantin N. Smirnov
28
Approaches to estimation of path loss for sensor network are considered. The stochastic model of the relative positions of the network devices and state-of-art method of channel quality estimation in the frames of the model are analyzed. A new method of the estimation based on maximum a posteriori probability (MAP) is presented. The proposed method is compared with classical RSSI estimation method.
ANALYSIS OF INTERFERENCE CANCELLATION PROCEDURE IN OFDM SYSTEMS WITH RANDOM MULTIPLE ACCESS
Maxim A. Grankin, Evgeny V. Pustovalov, Andrey M. Turlikov
35
Interference cancellation procedure in a centralized wireless network is considered. The PHY layer of the network uses OFDM modulation, while the MAC layer employs random multiple access. The error probability of interference cancellation is estimated. The dependence of maximal stable throughput of multiple access algorithms on the SNR is derived.
SYNTHESIS OF OPTIMAL RULE OF SIGNAL RECEPTION AGAINST CROSS TALK IN WCAN SYSTEM
Гурнов К. Б., Grigory S. Evseev
42
Wireless chip area network (WCAN) system using ultra wide band (UWB) range and pulse position modulation (PPM) is considered. A new algorithm for signal reception is developed on the base of calculation of likelihood function maximum. Results of analytical calculation of the bit error rate, as well as modeling results are presented.
ON CALCULATION OF MESSAGE DELAY WITH CODING ON TRANSPORT LAYER OF DATA-TRANSMISSION NETWORK
Evgeny A. Krouk, Маличенко Д. А.
45
The model used for calculation of the gain obtained by using coding at the transport layer of datacommunication network is considered. Analytical estimates for the gain are compared with simulation results.
ANALYSIS OF ENERGY-SAVING MODES IN MOBILE USER DEVICE
Evgeny V. Pustovalov, Andrey M. Turlikov
52
Power saving techniques based on periodical disconnection of subscriber’s device is considered. Energy consumption by the device and mean initial delay are estimated with the use of a standard mathematical model.
PROTECTION OF ULTRA-LIGHT AUTHENTICATION PROTOCOLS AGAINST ATTACKS ON LSB
Danil A. Kovalev, Bezzateev Sergey V
58
An advanced version of mutual authentication protocol LMAP++ is presented. The proposed improvement is based on substitution of standard addition operation modulo 2m by addition operation modulo 2m–1, and application of only simplest arithmetic operations. The proposed modification complexity is compared with complexity of known methods for increasing the reliability of the protocol LMAP + +.
VIDEO INFORMATION PROCESSING
METHOD OF SIDE INFORMATION GENERATION FOR DISTRIBUTED VIDEO CODING SYSTEMS
Anton I. Veselov, Marat R. Gilmutdinov, Boris S. Filippov
62
Main problems of distributed video coding are considered. Using reference codec DISCOVER as an example, advantages and disadvantages of basic coding methods are analyzed. A new method for generation of side information based on hierarchical motion estimation is proposed. Efficiency of a codec based on the proposed method as compared with DISCOVER is illustrated with rate-distortion diagrams
VIDEO WATERMARKING ALGORITHM FOR H.264 COMPRESSED VIDEO
Afanasyeva Alexandra V, Denis O. Ivanov, Dmitry A. Ryzhov
68
A method of video protection from redistribution with digital watermarks is proposed. The most popular family of digital watermarking algorithms for H.264 standard is considered. The problem of construction of individual labels resistant to coalition attacks is addressed. The Tardos code is chosen because of minimum length among the existing codes.
INFORMATION STORAGE SYSTEMS
EFFICIENCY ASSESSMENT OF CACHE PARTITION SIZES MANAGEMENT ALGORITHM IN STORAGE SYSTEM
Vasily S. Duzhin, Grigory S. Evseev, Evgeny M. Linsky
71
A model of storage system cache consisting of two partitions is considered. An algorithm that redistributes the partitions sizes is proposed. The impact of current and next state detection errors on algorithm efficiency is evaluated.
ESTIMATION OF RELIABILITY OF FAILURE-SAFE CLUSTERS WITH DIRECT CONNECTION TO STORAGE DEVICES
Bogatyrev Vladimir A, Bogatyrev Stanislav Vladimirovich, Bogatyrev Anatoly Vladimirovich
77
Variants of configuration of clusters with direct connection to binary-input storage devices and servers are considered. An approach to estimation of reliability of the configurations is proposed.