IEEE Transactions on Information Theory

Published by IEEE (Institute of Electrical and Electronics Engineers)

Online ISSN: 1557-9654


Print ISSN: 0018-9448


Calibrated Precision Matrix Estimation for High-Dimensional Elliptical Distributions
  • Article

December 2014


68 Reads

Tuo Zhao


We propose a semiparametric method for estimating a precision matrix of high-dimensional elliptical distributions. Unlike most existing methods, our method naturally handles heavy tailness and conducts parameter estimation under a calibration framework, thus achieves improved theoretical rates of convergence and finite sample performance on heavy-tail applications. We further demonstrate the performance of the proposed method using thorough numerical experiments.

Fig. 2. Cystic Fibrosis ∆F 508 Screen as a Bipartite Multigraph Reconstruction. There are two allele nodes, the WT and the ∆F 508 mutation. Samples 1, 2, 3, 5 are WT, while specimen 4 is a carrier. The specimen labeled with 'X' is affected and does not enter to the screen. E risk is the edge between specimen 4 and the 'Mut' node.
Fig. 3. Optimal Solution using Tree Search
Fig. 4. Example of Factor Graph for Genotyping Reconstruction
Fig. 5. The Effect of Damping on Oscillations
Compressed Genotyping
  • Article
  • Full-text available

February 2010


71 Reads






Over the past three decades we have steadily increased our knowledge on the genetic basis of many severe disorders. Nevertheless, there are still great challenges in applying this knowledge routinely in the clinic, mainly due to the relatively tedious and expensive process of genotyping. Since the genetic variations that underlie the disorders are relatively rare in the population, they can be thought of as a sparse signal. Using methods and ideas from compressed sensing and group testing, we have developed a cost-effective genotyping protocol to detect carriers for severe genetic disorders. In particular, we have adapted our scheme to a recently developed class of high throughput DNA sequencing technologies. The mathematical framework presented here has some important distinctions from the 'traditional' compressed sensing and group testing frameworks in order to address biological and technical constraints of our setting.

Information Conversion, Effective Samples, and Parameter Size

January 2008


35 Reads

Consider the relative entropy between a posterior density for a parameter given a sample and a second posterior density for the same parameter, based on a different model and a different data set. Then the relative entropy can be minimized over the second sample to get a virtual sample that would make the second posterior as close as possible to the first in an informational sense. If the first posterior is based on a dependent dataset and the second posterior uses an independence model, the effective inferential power of the dependent sample is transferred into the independent sample by the optimization. Examples of this optimization are presented for models with nuisance parameters, finite mixture models, and models for correlated data. Our approach is also used to choose the effective parameter size in a Bayesian hierarchical model.

Table 1 : Medians and robust standard deviations (in parentheses) of PE, L 2 loss, L 1 loss, deviance, #S, and FN over 100 simulations for all methods in logistic regression by BIC and 
Table 5 : Classification errors in the neuroblastoma data set 3-year EFS Gender Method # of genes Test error # of genes Test error 
Nonconcave Penalized Likelihood With NP-Dimensionality

August 2011


373 Reads

Penalized likelihood methods are fundamental to ultra-high dimensional variable selection. How high dimensionality such methods can handle remains largely unknown. In this paper, we show that in the context of generalized linear models, such methods possess model selection consistency with oracle properties even for dimensionality of Non-Polynomial (NP) order of sample size, for a class of penalized likelihood approaches using folded-concave penalty functions, which were introduced to ameliorate the bias problems of convex penalty functions. This fills a long-standing gap in the literature where the dimensionality is allowed to grow slowly with the sample size. Our results are also applicable to penalized likelihood with the L(1)-penalty, which is a convex function at the boundary of the class of folded-concave penalty functions under consideration. The coordinate optimization is implemented for finding the solution paths, whose performance is evaluated by a few simulation examples and the real data analysis.

The method of types [information theory]

November 1998


1,312 Reads

The method of types is one of the key technical tools in Shannon theory, and this tool is valuable also in other fields. In this paper, some key applications are presented in sufficient detail enabling an interested nonspecialist to gain a working knowledge of the method, and a wide selection of further applications are surveyed. These range from hypothesis testing and large deviations theory through error exponents for discrete memoryless channels and capacity of arbitrarily varying channels to multiuser problems. While the method of types is suitable primarily for discrete memoryless models, its extensions to certain models with memory are also discussed

Linear Properties in T-Functions

December 2006


29 Reads

Linear equations have always been powerful tools in cryptanalysis. In this correspondence, we present a general linear equation of minimum weight 3 in F<sub>2</sub> that holds for all state lengths n and all shifts i of sequences generated by the T-function x<sub>i</sub>=x<sub>i-1</sub> <sup>2</sup>orC+x<sub>i-1</sub> mod 2<sup>n</sup> proposed by Klimov and Shamir. It is surprising that these linear properties exist, and they indicate that the sequences generated by the T-functions have more structures than claimed by Klimov and Shamir

On the Detection Problem

June 1976


18 Reads

The detection problem for the model "signal-plus-noise," where the "noise" is represented by a Wiener process, has been approached primarily through the use of martingale theory. There are two core results: a new version of what is called "Girsanov's theorem" and the fact that the Wiener measure on the space of continuous functions can be generated by any Wiener process. In this correspondence a new version of "Girsanov's theorem" is derived and some fragmentary results concerning the measures associated with martingales are presented.

A monolithic Ka-band 0.25 μm GaAs MESFET transmitter for high volume production

February 2006


37 Reads

This paper considers a general linear vector Gaussian channel with arbitrary signaling and pursues two closely related goals: i) closed-form expressions for the gradient of the mutual information with respect to arbitrary parameters of the system, and ii) fundamental connections between information theory and estimation theory. Generalizing the fundamental relationship recently unveiled by Guo, Shamai, and Verdu´, we show that the gradient of the mutual information with respect to the channel matrix is equal to the product of the channel matrix and the error covariance matrix of the best estimate of the input given the output. Gradients and derivatives with respect to other parameters are then found via the differentiation chain rule.

A Queueing Theoretic Approach to the Delay Analysis for the FCFS 0.487 Conflict Resolution Algorithm

December 1993


52 Reads

The authors apply their queuing-theoretic delay analysis methodology to several variations of the FCFS 0.487 conflict resolution algorithm. In this approach, the main component of the packet delay is viewed as a queuing problem in which each window selected by the channel access algorithm is a customer requiring conflict resolution as its service. The authors' methodology is extended to handle all the features of the full FCFS 0.487 algorithm, including variable-size windows, arrival-time addressing (and hence true FCFS scheduling), and biased interval splitting. Some of these extensions involve approximations, but they make it possible to obtain the Laplace transform and moments of the packet delay. The authors also present an exact analysis for the three-cell algorithm, which is the 0.487 algorithm with a few modifications to satisfy the separability condition that reduces its capacity to 0.48. Comparisons made with other analyses (which provide bounds on the mean delay) and with extensive simulations show that the present results for both the mean and the variance of the packet delay are extremely accurate

A 0.487 Throughput Limited Sensing Algorithm

April 1987


66 Reads

We consider Poisson packet traffic accessing a single-slotted channel. We assume the existence of a ternary feedback per channel slot. We also adopt the limited feedback sensing model where each user senses the feedback only while he has a packet to transmit. For this model we develop a collision resolution algorithm with last come-first served characteristics. The algorithm attains the same throughput as Gallager's algorithm without the latter's full feedback sensing requirement. In addition, it is easy to implement, requires reasonable memory storage, induces uniformly good transmission delays, and is insensitive to feedback errors. In the presence of binary (collision versus noncollision) feedback the algorithm may attain a throughput of 0.4493 .

Correction to “Feedback With Carry Shift Registers Synthesis With the Euclidean Algorithm” [May 04 910-917]

February 2008


24 Reads

This paper corrects some errors on a previous paper concerning the synthesis of Feedback with Carry Shift Registers using the Euclidean Algorithm.

Erratum to “Characterization of Zak Space Support of a Discrete Chirp” [Jun 07 2190-2203]

October 2007


7 Reads

In the above titled paper (ibid., vol. 53, pp. 2190-2203, Jun 07), equation (B6) in Appendix B incorrectly identifies the Jacobi symbol. The proper definition is provided here.

Correction to “On Achievable Rates and Complexity of LDPC Codes Over Parallel Channels: Bounds and Applications” [Feb 07 580-598]

August 2008


74 Reads

In the above titled paper (ibid., vol. 53, no. 2, pp. 580-598, Feb 07), there was a printing typo in the last line of eq. (30). Necessary revisions are presented here.

Correction to “A Geometric Interpretation of Fading in Wireless Networks: Theory and Applications” [Dec 08 5500-5510]

May 2009


7 Reads

In the above titled paper (ibid., vol 54, no. 12, pp. 5500-5510, Dec 08), the table containing the list of symbols was corrupted during the publication process. The proper symbol table is presented here.

Correction to “An Algebraic, Analytic, and Algorithmic Investigation on the Capacity and Capacity-Achieving Input Probability Distributions of Finite-Input–Finite-Output Discrete Memoryless Channels” [Mar 08 1003-1023]

October 2008


13 Reads

In the above titled paper (ibid., vol. 54, no. 3, pp. 1003-1023, Mar 08), several misprints were introduced. The corrections are presented here.

Correction to “On Full Diversity Space–Time Block Codes With Partial Interference Cancellation Group Decoding” [Oct 09 4366-4385]

August 2010


26 Reads

In this paper, a correction is made to the criterion for a linear dispersion space-time block code to achieve full diversity with the partial interference cancellation (PIC) group decoding recently published in the above titled paper (ibid., vol. 55, no. 10, pp. 4366-4385).

A Block-Decodable (1,8) Runlength-Limited rate 8/12 Code

August 1994


20 Reads

Describes a (d,k)=(1,8) runlength-limited (RLL) rate 8/12 code with fixed codeword length 12. The code is block-decodable; a codeword can be decoded without knowledge of preceding or succeeding codewords. The code belongs to the class of bounded delay block-decodable (BDB) codes with one symbol (8 bits) look-ahead. Due to its format, this code is particularly attractive for use in combination with error-correcting codes such as Reed-Solomon codes over the finite field GF(2<sup>8</sup>)

Tropp, J.A.: Just relax: convex programming methods for identifying sparse signals in noise. IEEE Trans. Inf. Theory 52, 1030-1051

April 2006


195 Reads

This paper studies a difficult and fundamental problem that arises throughout electrical engineering, applied mathematics, and statistics. Suppose that one forms a short linear combination of elementary signals drawn from a large, fixed collection. Given an observation of the linear combination that has been contaminated with additive noise, the goal is to identify which elementary signals participated and to approximate their coefficients. Although many algorithms have been proposed, there is little theory which guarantees that these algorithms can accurately and efficiently solve the problem. This paper studies a method called convex relaxation, which attempts to recover the ideal sparse signal by solving a convex program. This approach is powerful because the optimization can be completed in polynomial time with standard scientific software. The paper provides general conditions which ensure that convex relaxation succeeds. As evidence of the broad impact of these results, the paper describes how convex relaxation can be used for several concrete signal recovery problems. It also describes applications to channel coding, linear regression, and numerical analysis

Hellman, M.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory, IT 24, 106-110

February 1978


275 Reads

A cryptographic system is described which is secure if and only if computing logarithms over GF(p) is infeasible. Previously published algorithms for computing this function require O(p^{1/2}) complexity in both time and space. An improved algorithm is derived which requires O =(log^{2} p) complexity if p - 1 has only small prime factors. Such values of p must be avoided in the cryptosystem. Constructive uses for the new algorithm are also described.

Monomials of orders 7 and 11 cannot be in the group of a (24, 12, 10) self-dual quaternary code (Corresp.)

February 1983


9 Reads

It is an interesting open question whether a self-dual quaternary (24,12,10) code C exists. It was shown by Conway and Pless that the only primes which can be orders of permutations in the group of C are 11, 7, and 3. In this correspondence we eliminate 11 and 7 not only as permutations but also as orders of monomials in the group of C . This is done by reducing the problems to the consideration of several codes and finding low weight vectors in these codes.

The minimum distance of the [38,19] ternary extended QR-code is 11 (Corresp.)

April 1984


14 Reads

The method of Mykkeltveit, Lam, and McEliece for finding weight enumerators of binary QR-codes is used to prove that the minimum distance of the [38,19] ternary extended QR-code is 11 .

NMDS codes of maximal length over Fq, 8 ≤ q ≤ 11

May 2002


76 Reads

A linear [n,k,d]<sub>q</sub> code C is called near maximum-distance separable (NMDS) if d(C)=n-k and d(C<sup>⊥</sup>)=k. The maximum length of an NMDS [n,k,d]<sub>q </sub> code is denoted by m'(k,q). In this correspondence, it has been verified by a computer-based proof that m'(5,8)=15, m'(4,9)=16,m'(5,9)=16, and 20&les;m'(4,11)&les;21. Moreover, the NMDS codes of length m'(4,8), m'(5,8), and m'(4,9) have been classified. As the dual code of an NMDS code is NMDS, the values of m'(k,8), k=10,11,12, and of m'(k,9),k=12,13,14 have been also deduced

An approximation to the weight distribution of binary primitive BCH codes with designed distances 9 and 11 (Corresp.)

October 1986


16 Reads

Recently Kasami {em et al.} presented a linear programming approach to the weight distribution of binary linear codes [2]. Their approach to compute upper and lower bounds on the weight distribution of binary primitive BCH codes of length 2^{m} - 1 with m geq 8 and designed distance 2t + 1 with 4 leq t leq 5 is improved. From these results, the relative deviation of the number of codewords of weight jleq 2^{m-1} from the binomial distribution 2^{-mt} left( stackrel{2^{m}-1}{j} right) is shown to be less than 1 percent for the following cases: (1) t = 4, j geq 2t + 1 and m geq 16 ; (2) t = 4, j geq 2t + 3 and 10 leq m leq 15 ; (3) t=4, j geq 2t+5 and 8 leq m leq 9 ; (4) t=5,j geq 2t+ 1 and m geq 20 ; (5) t=5, j geq 2t+ 3 and 12 leq m leq 19 ; (6) t=5, j geq 2t+ 5 and 10 leq m leq 11 ; (7) t=5, j geq 2t + 7 and m=9 ; (8) t= 5, j geq 2t+ 9 and m = 8 .

Two generalized complex orthogonal space-time block codes of rates 7/11 and 3/5 for 5 and 6 transmit antennas

February 2003


52 Reads

Space-time block codes from orthogonal designs have two advantages, namely, fast maximum-likelihood (ML) decoding and full diversity. Rate 1 real (pulse amplitude modulation-PAM) space-time codes (real orthogonal designs) for multiple transmit antennas have been constructed from the real Hurwitz-Radon families, which also provides the rate 1/2 complex (quadrature amplitude modulation-QAM) space-time codes (complex orthogonal designs) for any number of transmit antennas. Rate 3/4 complex orthogonal designs (space-time codes) for three and four transmit antennas have existed in the literature but no high rate (>1/2) complex orthogonal designs for other numbers of transmit antennas exist. We present rate 7/11 and rate 3/5 generalized complex orthogonal designs for five and six transmit antennas, respectively.

A Geometric Construction of a $[110,5,90]_{9}$ -Linear Code Admitting the Mathieu Group $M_{11}

December 2008


22 Reads

We give a geometric construction of a [110,5,90]<sub>9</sub>-linear code admitting the Mathieu group M <sub>11</sub> as a subgroup of its automorphism group.

A rate 4/6 (d=1, k=11) block-decodable runlength-limited code

October 1996


58 Reads

A new rate 4/6 (d=1, k'=11) runlength-limited code which is well adapted to byte-oriented storage systems is presented. The new code has the virtue that it can be decoded on a block basis, i.e., without knowledge of previous or next codewords, and, therefore, it does not suffer from error propagation. This code is particularly attractive as many commercially available Reed-Solomon codes operate in GF(2<sup>8 </sup>)

A Rate $R=5/20$ Hypergraph-Based Woven Convolutional Code With Free Distance $120

May 2010


12 Reads

A rate R=5/20 hypergraph-based woven convolutional code with overall constraint length 67 and constituent convolutional codes is presented. It is based on a 3-partite, 3-uniform, 4-regular hypergraph and contains rate R<sup>c</sup>=3/4 constituent convolutional codes with overall constraint length 5. Although the code construction is based on low-complexity codes, the free distance of this construction, computed with the BEAST algorithm, is d<sub>free</sub>=120, which is remarkably large.

Codes of lengths 120 and 136 meeting the Grey-Rankin bound and quasi-symmetric designs

April 1999


13 Reads

In this correspondence, we give a characterization of certain quasi-cyclic self-complementary codes with parameters [120,9,56] and [136,9,64], some quasi-cyclic self-complementary codes are also constructed with parameters [496,11,240] and [528,11,256]. These codes are optimal in the sense that they meet the Grey-Rankin bound, new quasi-symmetric SDP (symmetric difference property) designs are constructed from these codes

Best Fire codes with length up to 1200 bits (Corresp.)

October 1970


5 Reads

This correspondence presents 11 tables of best unshortened Fire codes of length up to 1200 bits, classified into groups according to their relative redundancy.

The weight distributions of extended binary primitive BCH codes of length 128

August 1997


108 Reads

In previous work, a method was presented to compute the weight distribution of a linear block code by using its trellis diagram. In this correspondence, the method is improved by using the trellis structure of linear block codes. Another method with reduced computational complexity is also proposed which uses the invariant property of a code. With these methods, the weight distributions of all extended binary primitive BCH codes of length 128 are computed, except for those for which the formulas of the weight distribution are known. It turns out that (128,64,22) extended binary primitive BCH code is formally self-dual. The probability of an undetectable error for each code is computed and its monotonicity is examined

The covering radius of the (128,8) Reed-Muller code is 56 (Corresp.)

June 1980


18 Reads

Let r_{i} be the covering radius of the (2^{i},i+ 1) Reed-Muller code. It is an open question whether r_{2m+1}=2^{2_{m}}-2m holds for all m . It is known to be true for m=0,1,2 , and here it is shown to be also true for m=3 .

Lower bounds for parametric estimation with constraints. IEEE Trans. Inform. Theory 26, 1285-1301

December 1990


38 Reads

A Chapman-Robbins form of the Barankin bound is used to derive a multiparameter Cramer-Rao (CR) type lower bound on estimator error covariance when the parameter θ∈ R <sup>n</sup> is constrained to lie in a subset of the parameter space. A simple form for the constrained CR bound is obtained when the constraint set Θ<sub>C</sub>, can be expressed as a smooth functional inequality constraint. It is shown that the constrained CR bound is identical to the unconstrained CR bound at the regular points of Θ<sub>C</sub>, i.e. where no equality constraints are active. On the other hand, at those points θ∈Θ<sub>C</sub> where pure equality constraints are active the full-rank Fisher information matrix in the unconstrained CR bound must be replaced by a rank-reduced Fisher information matrix obtained as a projection of the full-rank Fisher matrix onto the tangent hyperplane of the full-rank Fisher matrix onto the tangent hyperplane of the constraint set at θ. A necessary and sufficient condition involving the forms of the constraint and the likelihood function is given for the bound to be achievable, and examples for which the bound is achieved are presented. In addition to providing a useful generalization of the CR bound, the results permit analysis of the gain in achievable MSE performance due to the imposition of particular constraints on the parameter space without the need for a global reparameterization

Binary Self-Dual Codes of Lengths 52 to 60 With an Automorphism of Order 7 or 13

December 2011


23 Reads

All binary [ n , n /2] optimal self-dual codes for length 52 ≤ n ≤ 60 with an automorphism of order 7 or 13 are classified up to equivalence. Two of the constructed [54,27,10] codes have weight enumerators that were not previously known to exist. There are also some [58,29,10] codes with new values of the parameters in their weight enumerator.

Algebraic Decoding of the Ternary (13, 7, 5) Quadratic Residue Code

June 1992


9 Reads

An algebraic decoding algorithm for the ternary (13,7,5) quadratic residue code is presented. This seems to be the first attempt to provide an algebraic decoding algorithm for a quadratic residue code over a nonbinary field

Leon, J.S.: A Probabilistic Algorithm for Computing Minimum Weights of Large Error-Correcting Codes. IEEE Transactions on Information Theory 34(5), 1354-1359

October 1988


90 Reads

An algorithm is developed that can be used to find, with a very low probability of error (10<sup>-100</sup> or less in many cases), the minimum weights of codes far too large to be treated by any known exact algorithm. The probabilistic method is used to find minimum weights of all extended quadratic residue codes of length 440 or less. The probabilistic algorithm is presented for binary codes, but it can be generalized to codes over GF( q ) with q >2

Figure 3: The transmitted signals that achieve capacity are mutually orthogonal with respect to time. The constituent orthonormal unit vectors are isotropically distributed (see Appendix A), and independent of the signal magnitudes, which have mean-square value T. The solid sphere of radius T 1=2 demarcates the root mean-square. For T M, the vectors all lie approximately on the surface of this sphere. The shell of thickness "T 1=2 is discussed in Section 5.
Figure 4: Normalized capacity, and upper and lower bounds, versus coherence interval T (SNR=0dB, one transmitter antenna, one receiver antenna). The lower bound and capacity meet at T = 12. As per Theorem 3, the capacity approaches the perfect-knowledge upper bound as T ! 1.
Figure 6: Normalized capacity, and upper and lower bounds, versus coherence interval T (SNR=12dB, one transmitter antenna, one receiver antenna). The lower bound and capacity meet at T = 3. The capacity approaches the perfect-knowledge upper bound as T ! 1.
Figure 7: Capacity and perfect-knowledge upper bound versus number of receiver antennas N (SNR=0dB, 6dB, 12dB, arbitrary number of transmitter antennas, coherence interval equal to one). The gap between capacity and upper bound only widens as N ! 1. approximately 6.1 bits/T , remains a valid lower bound on capacity for all M > 3. (One could always ignore all but three of the transmitter antennas.) This gives us the modified lower bound also displayed in the figure.
Figure 8: Normalized capacity lower bounds and perfect-knowledge upper bounds versus number of transmitter antennas M (SNR=20dB, one receiver antenna, coherence interval equal to 100). The actual channel capacity lies in the shaded region. Lower bound peaks at M = 3; this peak is a valid lower bound for M 3, giving us the modified lower bound.
Hochwald, B.M.: Capacity of a mobile multiple-antenna communication link in Rayleigh flat fading. IEEE Trans. Inform. Theory 45, 139-157

February 1999


355 Reads

We analyze a mobile wireless link comprising M transmitter and N receiver antennas operating in a Rayleigh flat-fading environment. The propagation coefficients between pairs of transmitter and receiver antennas are statistically independent and unknown; they remain constant for a coherence interval of T symbol periods, after which they change to new independent values which they maintain for another T symbol periods, and so on. Computing the link capacity, associated with channel coding over multiple fading intervals, requires an optimization over the joint density of T·M complex transmitted signals. We prove that there is no point in making the number of transmitter antennas greater than the length of the coherence interval: the capacity for M>T is equal to the capacity for M=T. Capacity is achieved when the T×M transmitted signal matrix is equal to the product of two statistically independent matrices: a T×T isotropically distributed unitary matrix times a certain T×M random matrix that is diagonal, real, and nonnegative. This result enables us to determine capacity for many interesting cases. We conclude that, for a fixed number of antennas, as the length of the coherence interval increases, the capacity approaches the capacity obtained as if the receiver knew the propagation coefficients

Liu, C.: Approximating Discrete Probability Distributions with Dependence Trees. IEEE Transactions on Information Theory 14(3), 462-467

June 1968


314 Reads

A method is presented to approximate optimally an n -dimensional discrete probability distribution by a product of second-order distributions, or the distribution of the first-order tree dependence. The problem is to find an optimum set of n - 1 first order dependence relationship among the n variables. It is shown that the procedure derived in this paper yields an approximation of a minimum difference in information. It is further shown that when this procedure is applied to empirical observations from an unknown distribution of tree dependence, the procedure is the maximum-likelihood estimate of the distribution.

Hughes, G.: On the mean accuracy of statistical pattern recognizers. IEEE Trans. Inf. Theory 14(1), 55-63

February 1968


556 Reads

The overall mean recognition probability (mean accuracy) of a pattern classifier is calculated and numerically plotted as a function of the pattern measurement complexity n and design data set size m . Utilized is the well-known probabilistic model of a two-class, discrete-measurement pattern environment (no Gaussian or statistical independence assumptions are made). The minimum-error recognition rule (Bayes) is used, with the unknown pattern environment probabilities estimated from the data relative frequencies. In calculating the mean accuracy over all such environments, only three parameters remain in the final equation: n, m , and the prior probability p_{c} of either of the pattern classes. With a fixed design pattern sample, recognition accuracy can first increase as the number of measurements made on a pattern increases, but decay with measurement complexity higher than some optimum value. Graphs of the mean accuracy exhibit both an optimal and a maximum acceptable value of n for fixed m and p_{c} . A four-place tabulation of the optimum n and maximum mean accuracy values is given for equally likely classes and m ranging from 2 to 1000 . The penalty exacted for the generality of the analysis is the use of the mean accuracy itself as a recognizer optimality criterion. Namely, one necessarily always has some particular recognition problem at hand whose Bayes accuracy will be higher or lower than the mean over all recognition problems having fixed n, m , and p_{c} .

On the Covering Radius of Binary [14,6] Codes Containing the All-One Vector

June 1988


13 Reads

It is shown that the covering radius of any binary linear [14, 6] code containing the all-one vector is at least 4. Since the minimum covering radius of a binary linear [14, 6] code is 3, this shows that in general the minimum of the covering radius is not achieved by codes containing the all-one vector

Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Transactions on Information Theory 47(4), 1423-1443

June 2001


400 Reads

We consider the problem of embedding one signal (e.g., a digital watermark), within another “host” signal to form a third, “composite” signal. The embedding is designed to achieve efficient tradeoffs among the three conflicting goals of maximizing the information-embedding rate, minimizing the distortion between the host signal and composite signal, and maximizing the robustness of the embedding. We introduce new classes of embedding methods, termed quantization index modulation (QIM) and distortion-compensated QIM (DC-QIM), and develop convenient realizations in the form of what we refer to as dither modulation. Using deterministic models to evaluate digital watermarking methods, we show that QIM is “provably good” against arbitrary bounded and fully informed attacks, which arise in several copyright applications, and in particular it achieves provably better rate distortion-robustness tradeoffs than currently popular spread-spectrum and low-bit(s) modulation methods. Furthermore, we show that for some important classes of probabilistic models, DC-QIM is optimal (capacity-achieving) and regular QIM is near-optimal. These include both additive white Gaussian noise (AWGN) channels, which may be good models for hybrid transmission applications such as digital audio broadcasting, and mean-square-error-constrained attack channels that model private-key watermarking applications

On a (145, 32) binary cyclic code

December 1999


35 Reads

We discovered that a (145, 32) binary cyclic code generated by the product of an irreducible polynomial of degree 28 with exponent 145 and the polynomial x<sup>4</sup>+x<sup>3</sup>+x<sup>2</sup>+x+1 has a minimum distance of 44

The Minimal Covering Radius t [15,6] of a Six-Dimensional Binary Linear Code of Length 15 is Equal to 4

October 1988


2 Reads

The nonexistence of a binary linear [15,6] code with covering radius 3 is proved by geometrically based arguments. The author also considers the wider application of the techniques

A New Construction of 16-QAM Near Complementary Sequences

December 2010


26 Reads

We present a new 16-QAM near complementary sequence construction where the length of the sequences is n = 2 m . The 16-QAM near complementary sequences are constructed by nonlinear offsets. But the peak-to-mean envelope power ratio bounds for these 16-QAM near complementary sequences is as low as 2.4. The number of newly constructed 16-QAM near complementary sequences is ([( m !)/2])4 m +1.

The children of the (32, 16) doubly even codes

December 1978


9 Reads

Generator matrices, weight distributions, and automorphism groups are given for all (26,13,6), (28,14,6), and (30,15,6) binary self-dual codes. These results are obtained from the earlier enumeration made by J. H. Conway and the author of all (32,16) self-dual doubly even codes.

A construction of OFDM 16-QAM sequences having low peak powers

August 2001


21 Reads

Using a realization of 16-QAM as set addition of two scaled versions of the 4-PSK constellation, we construct 16-QAM sequences having low peak-to-mean envelope power ratios (PMEPR) from 4-PSK Golay sequences. Various upper bounds on the peak envelope powers of these sequences are established. Transmission using these sequences provides twice as much rate as transmission using complementary Golay sequences with a maximum PMEPR of 3.6 (5.56 dB)

Self-dual codes over GF(3) and GF(4) of length not exceeding 16

June 1979


164 Reads

All self-dual codes over GF(3) and GF(4) of length 16 are found. The self-dual codes of shorter length are described in a concise and systematic notation. A number of new techniques ("promotion" and "demotion," "tag olng? and "subtraction") are given for constructing codes. Finally, several new extremal self-dual codes are given which have length greater than 16.

Fig. 1. 
Fig. 2. 
A New Construction of 16-QAM Golay Complementary Sequences

December 2003


301 Reads

We present a new construction of 16-QAM Golay sequences of length n = 2<sup>m</sup>. The number of constructed sequences is (14 + 12m)(m!/2)4<sup>m+1</sup>. When employed as a code in an orthogonal frequency-division multiplexing (OFDM) system; this set of sequences has a peak-to-mean envelope power ratio (PMEPR) of 3.6. By considering two specific subsets of these sequences, we obtain new codes with PMEPR bounds of 2.0 and 2.8 and respective code sizes of (2 + 2m)(m!/2)4<sup>m+1</sup> and (4 + 4m)(m!/2)4<sup>m+1</sup>. These are larger than previously known codes for the same PMEPR bounds.

Comments on A New Construction of 16-QAM Golay Complementary Sequences and Extension for 64-QAM Golay Sequences

August 2008


15 Reads

For original article by C.V. Chong see ibid. Vol.49, no.11, p.2953-2959, Nov. 2003. Some corrections are given for the sequence pairing descriptions of 16-QAM Golay complementary sequences in Chong, Venkataramani, and Tarokh's paper, together with a related correction for Lee and Golomb's 64-QAM Golay sequence construction. Lee and Golomb obtained 496, 808, and 976 offset pairs for length 2<sup>m</sup> 64-QAM Golay sequences, m = 2,3,4. We obtained 724, 972, and 1224 offset pairs. Adding w = 1 to Case III in Lee and Golomb's construction gives some additional offset pairs, others are new and exist for m ges 3 only. Descriptions of new offset pairs and enumeration for all first order offset pairs are proposed as conjectures. An example is given to show that there exist other 64-QAM Golay sequences not within this construction.