共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
In this paper, the application of matching pursuit (MP) in progressive coding of memoryless Gaussian sources is studied. In addition, a detailed analysis of the rate-distortion performance of our proposed MP encoder is presented, and the distortion of the MP encoder is derived in terms of dictionary size and number of quantization levels and the optimum parameters are calculated. Our analysis is based on a probabilistic model for matching pursuit residual vectors. Our simulation results verify the accuracy of our analysis and show that matching pursuit can produce an embedded bitstream with comparable quality to existing quantizers. The MP encoder outperforms quantizers that are capable of producing embedded bitstreams. 相似文献
4.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》2009,55(9):3927-3944
5.
针对传统的向量量化压缩的不足性,提高量化效果的方法主要是增加向量的维数,但同时增加了计算的复杂性.为了解决分布式编码中量化器的设计问题,在联合条件熵约束的条件下,着重从WZ量化器的最优条件分析,提出了一种Lloyd迭代算法,通过实验证明,该算法比传统的算法更可以保证量化器的局部最优性. 相似文献
6.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》2009,55(4):1709-1720
7.
一种分簇无线传感器网络中的分布式信源编码算法 总被引:1,自引:0,他引:1
针对密集型无线传感器网络中信息存在大量冗余的问题,该文提出了一种适用于分簇无线传感网络的分布式信源编码算法。该算法以边信息作为初始参考信源,利用信源间的相关性来决定各信源的编码顺序和参考信源,然后由各信源相对于参考信源进行相关编码,接收端则根据编码顺序和参考信源进行相关译码。该文同时针对模值编码的方式,给出了一种低复杂度的译码算法。理论分析和仿真结果表明,将该算法应用于分簇路由协议中可以有效地降低节点的发送比特数,从而降低网络的能耗以延长网络寿命。 相似文献
8.
9.
Kosut O. Lang Tong 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2008,54(6):2550-2565
The distributed source coding problem is considered when the sensors, or encoders, are under Byzantine attack; that is, an unknown group of sensors have been reprogrammed by a malicious intruder to undermine the reconstruction at the fusion center. Three different forms of the problem are considered. The first is a variable-rate setup, in which the decoder adaptively chooses the rates at which the sensors transmit. An explicit characterization of the variable-rate achievable sum rates is given for any number of sensors and any groups of traitors. The converse is proved constructively by letting the traitors simulate a fake distribution and report the generated values as the true ones. This fake distribution is chosen so that the decoder cannot determine which sensors are traitors while maximizing the required rate to decode every value. Achievability is proved using a scheme in which the decoder receives small packets of information from a sensor until its message can be decoded, before moving on to the next sensor. The sensors use randomization to choose from a set of coding functions, which makes it probabilistically impossible for the traitors to cause the decoder to make an error. Two forms of the fixed-rate problem are considered, one with deterministic coding and one with randomized coding. The achievable rate regions are given for both these problems, and it is shown that lower rates can be achieved with randomized coding. 相似文献
10.
In this paper, we propose a technique for coding the data from multiple correlated binary sources, with the aim of providing an alternative solution to the correlated source compression problem. Using non-systematic repeat-accumulate based codes, it is possible to achieve compression which is close to the Slepian–Wolf bound without relying on massive puncturing. With the technique proposed in this paper, instead of puncturing, compression is achieved by increasing check node degrees. Hence, the code rate can be more flexibly adjusted with the proposed technique in comparison with the puncturing-based schemes. Furthermore, the technique is applied to distributed joint source-channel coding (DJSCC). It is shown that in many cases tested, the proposed scheme can achieve mutual information very close to one with the lower signal-to-noise power ratio than turbo and low density generator matrix based DJSCC in additive white Gaussian noise channel. The convergence property of the system is also evaluated via the extrinsic information transfer analysis. 相似文献
11.
Sheng-Tzong Cheng Jia-Shing Shih Chih-Lun Chou Gwo-Jiun Horng Chi-Hsuan Wang 《Wireless Personal Communications》2013,70(2):847-868
Distributed source coding (DSC) can be used to compress multiple correlated sensor measurements. These sensors send their compressed data to a central station for joint decoding. However, the issue on designing an optimal transmission scheduling scheme of DSC packets for WSNs have not been well addressed in the literature. In this work, we proposed a novel DSC coding scheme—hierarchical coding scheme, which exploits inter-node coding dependency in sensing-driven and correlated manner. In addition, the interaction between hierarchical coding topology and transmission is considered. We optimize the transmission schedule of DSC nodes to achieve better decoding quality. Our approach can be practically applied to any WSN topologies with correlated source coding nodes. Simulation shows that our work can achieve higher decoding accuracy and compression rate than previous approaches, and the decoding accuracy would not have much degradation under the error-prone wireless environment. 相似文献
12.
Venkataramanan R. Sandeep Pradhan S. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2007,53(6):2154-2179
In this work, we consider a source coding model with feed-forward. We analyze a system with a noiseless, feed-forward link where the decoder has knowledge of all previous source samples while reconstructing the present sample. The rate-distortion function for an arbitrary source with feed-forward is derived in terms of directed information, a variant of mutual information. We further investigate the nature of the rate-distortion function with feed-forward for two common types of sources- discrete memory- less sources and Gaussian sources. We then characterize the error exponent for a general source with feed-forward. The results are then extended to feed-forward with an arbitrary delay larger than the block length. 相似文献
13.
14.
Jana S. Moulin P. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2006,52(9):4049-4067
The Karhunen-Loeacuteve transform (KLT) is known to be optimal for high-rate transform coding of Gaussian vectors for both fixed-rate and variable-rate encoding. The KLT is also known to be suboptimal for some non-Gaussian models. This paper proves high-rate optimality of the KLT for variable-rate encoding of a broad class of non-Gaussian vectors: Gaussian vector-scale mixtures (GVSM), which extend the Gaussian scale mixture (GSM) model of natural signals. A key concavity property of the scalar GSM (same as the scalar GVSM) is derived to complete the proof. Optimality holds under a broad class of quadratic criteria, which include mean-squared error (MSE) as well as generalized f-divergence loss in estimation and binary classification systems. Finally, the theory is illustrated using two applications: signal estimation in multiplicative noise and joint optimization of classification/reconstruction systems 相似文献
15.
Chao Tian Jun Chen 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2009,55(10):4676-4680
Let X , Y , Z be zero-mean, jointly Gaussian random vectors of dimensions nx, ny, and nz, respectively. Let P be the set of random variables W such that W harr Y harr (X, Z) is a Markov string. We consider the following optimization problem: WisinP min I(Y; Z) subject to one of the following two possible constraints: 1) I(X; W|Z) ges RI, and 2) the mean squared error between X and Xcirc = E(X|W, Z) is less than d . The problem under the first kind of constraint is motivated by multiple-input multiple-output (MIMO) relay channels with an oblivious transmitter and a relay connected to the receiver through a dedicated link, while for the second case, it is motivated by source coding with decoder side information where the sensor observation is noisy. In both cases, we show that jointly Gaussian solutions are optimal. Moreover, explicit water filling interpretations are given for both cases, which suggest transform coding approaches performed in different transform domains, and that the optimal solution for one problem is, in general, suboptimal for the other. 相似文献
16.
Gunduz D. Erkip E. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2007,53(10):3454-3475
User cooperation is a powerful tool to combat fading and increase robustness for communication over wireless channels. Although it is doubtless a promising technique for enhancing channel reliability, its performance in terms of average source distortion is not clear since source-channel separation theorem fails under the most common nonergodic slow-fading channel assumption, when channel state information (CSI) is only available at the receiving terminals. This work sheds some light on the end-to-end performance of joint source-channel coding for cooperative relay systems in the high signal-to-noise ratio (SNR) regime. Considering distortion exponent as a figure of merit, we propose various strategies for cooperative source and channel coding that significantly improve the performance compared to the conventional scheme of source coding followed by cooperative channel coding. We characterize the optimal distortion exponent of a full-duplex relay channel for all bandwidth ratios. For the half-duplex relay channel, we provide an upper bound which is tight for small and large bandwidth ratios. We consider the effect of correlated side information on the distortion exponent as well. 相似文献
17.
Tian C. Steiner A. Shamai S. Diggavi S.N. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2008,54(7):2903-2918
We consider the problem of transmitting a Gaussian source on a slowly fading Gaussian channel, subject to the mean-squared error distortion measure. The channel state information is known only at the receiver but not at the transmitter. The source is assumed to be encoded in a successive refinement (SR) manner, and then transmitted over the channel using the broadcast strategy. In order to minimize the expected distortion at the receiver, optimal power allocation is essential. We propose an efficient algorithm to compute the optimal solution in linear time , when the total number of possible discrete fading states. Moreover, we provide a derivation of the optimal power allocation when the fading state is a continuum, using the classical variational method. The proposed algorithm as well as the continuous solution is based on an alternative representation of the capacity region of the Gaussian broadcast channel. 相似文献
18.
19.
《IEEE transactions on circuits and systems. I, Regular papers》2008,55(7):2013-2025
20.
Koga H. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2008,54(6):2658-2677
In this paper, coding theorems on the (t, m) -threshold scheme for a general source are discussed, where m means the number of the shares and t means a threshold. The (t,m) -threshold scheme treated in this paper encrypts n source outputs Xn to m shares at once and is required to satisfy the two conditions that 1) Xn is reproduced from arbitrary t shares, and 2) almost no information of Xn is revealed from any t - 1 shares. It is shown that the (t,m) -threshold scheme must satisfy certain inequalities including the limit inferiors in probability. One of the inequalities is closely related to the minimum length of the fair random bits needed to a dealer for realizing the (t, m) -threshold scheme. In addition, it is shown that a certain variation of Shamir's threshold scheme meets the two conditions. The same approach can be taken to the problems of Shannon's cipher system with the perfect secrecy and fixed-length source coding with vanishing decoding error probability. It is shown that the same kind of inequalities, which indicate the converse coding theorems, hold in both two cases. 相似文献