dc.contributor.author | Zheng, Lizhong | |
dc.contributor.author | Huang, Shao-Lun | |
dc.contributor.author | Blankenship, Yufei | |
dc.date.accessioned | 2012-09-25T12:36:11Z | |
dc.date.available | 2012-09-25T12:36:11Z | |
dc.date.issued | 2010-08 | |
dc.date.submitted | 2010-06 | |
dc.identifier.isbn | 978-1-4244-5850-9 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/73146 | |
dc.description | Proceedings of a meeting held 25-27 June 2010, Beijing, China. | en_US |
dc.description.abstract | In information theory, in order to maximize the total throughput, it is required that the codebook has an empirical distribution that maximizes the mutual information over the channel. In coding theory, however, most codes we can generate have Bernoulli (1 over 2) distribution. In this paper, we present a new coding scheme to efficiently generate binary codes with different distributions. Our main approach is to first encode the information bits by a linear code C, and then quantized the codeword to the closest codeword in another linear code Cs. The quantization error is then treated as the encoded codeword in our coding scheme. We discuss the practicality and advantage of such codes and give a design example. | en_US |
dc.language.iso | en_US | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
dc.relation.isversionof | http://dx.doi.org/ 10.1109/WCINS.2010.5541727 | en_US |
dc.rights | Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. | en_US |
dc.source | IEEE | en_US |
dc.title | The design of binary shaping filter of binary code | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Zheng, Lizhong et al. "The design of binary shaping filter of binary code." Proceedings of the 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS): 228-232. © 2010 IEEE. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.mitauthor | Zheng, Lizhong | |
dc.contributor.mitauthor | Huang, Shao-Lun | |
dc.relation.journal | Proceedings of the 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS) | en_US |
dc.eprint.version | Final published version | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
dspace.orderedauthors | Shao-Lun Huang; Yufei Blankenship; Lizhong Zheng | en |
dc.identifier.orcid | https://orcid.org/0000-0002-6108-0222 | |
mit.license | PUBLISHER_POLICY | en_US |
mit.metadata.status | Complete | |