?
Novel order statistics–based detector and coded modulation for a DHA FH OFDMA system
P. 11–16.
Coded DHA FH OFDMA communication systems that use order statistics-based detectors are promising candidates for applications such as IoT and M2M. For the majority of order statistics-based reception techniques the high throughput coded modulation schemes development remains an open problem. In what follows a novel order-statistics based detector that outperforms the classical Maximum Rank Sum detector is introduced. The proposed detector is then used to design a practical coded modulation scheme for a multi-tone multi-band DHA FH OFDMA that provides better latency-performance tradeoff than any order statistics-based reception method proposed so far
In book
Krouk E. IEEE, 2021.
Kuvshinov A., Fominykh A., Ivanov F., IEEE Access 2026 Vol. 14 P. 50549–50557
The recursive (U|U+V) construction, a generalization of which includes polar codes, provides a powerful framework for building complex codes from simpler components. However, existing approaches predominantly rely on fixed or symmetric tree architectures, overlooking the critical impact of decomposition choice on code performance. This paper addresses the challenge of optimal tree decomposition selection by presenting a framework ...
Added: April 7, 2026
Iakimenko S., Информационно-управляющие системы 2026 № 2 С. 36–48
Introduction: Caching reduces content access latency by bringing it closer to users and offloading the cloud layer of the network. Edge servers are used for this purpose, but the standard TCP/IP stack does not fully utilize caching capabilities. Therefore, it is necessary to consider a cache model using the Named Data Networking stack, which is ...
Added: March 9, 2026
Volkov V., Potiron Y., Journal of the American Statistical Association 2025 P. 1–28
A novel statistical approach to estimating latency, defined as the time it takes to learn about anevent and generate response to this event, is proposed. Our approach only requires amultidimensional point process describing event times, which circumvents the use of moredetailed datasets which may not even be available. We consider the class of parametric Hawkesmodels ...
Added: July 3, 2025
Kuvshinov A., Timokhin I., Ivanov F., , in: 2024 IEEE International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON).: Novosibirsk: IEEE, 2024. P. 52–57.
Concatenated codes are currently being actively investigated for the next-generation wireless communication sys tems due to their flexibility and ability to be used in various scenarios. The serial type of concatenation provides good error correcting properties with a potential reduction in complexity when an iterative concatenated decoder is used at the receiver side. One of ...
Added: November 16, 2024
Ivanov F., Kuvshinov A., Facta Universitatis. Series Electronics and Energetics 2024 Vol. 37 No. 3 P. 483–496
Nowadays concatenated codes are actively developed for different applications of error-correcting theory. In this paper we propose a new method for constructing concatenated codes consisting of some outer error-correcting code and a particular designed inner low-density parity-check (LDPC) code. We consider polarization-adjusted convolutional (PAC) code and LDPC code as outer code of suggested construction. Special ...
Added: November 16, 2024
Ivanov F., Kuvshinov A., , in: 2023 16th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).: Niš: IEEE, 2023. P. 228–231.
Concatenated codes are effectively used in different approaches of error-correcting theory. We suggest new concatenated code construction that is composed of outer LDPC code and a particular designed inner LDPC code. Special optimization procedure was developed to obtain inner code with specific error-correcting characteristics. We apply the decoder of woven codes to this construction, while ...
Added: June 21, 2024
Ivanov F., Kuvshinov A., , in: 2022 IEEE International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON).: Ekaterinburg: IEEE, 2022. P. 190–194.
In this paper we consider the special construction of concatenated codes. Our scheme consists of outer LDPC code and a specially designed class of inner LDPC code with interleaver between inner and outer codes. An inner code in the proposed construction is obtained using a specific optimization algorithm that allows to minimize SNR for a ...
Added: June 21, 2024
Novikov P., Nazarova M., Reshetnikov M. et al., Психология. Журнал Высшей школы экономики 2021 Т. 18 № 2 С. 381–392
Transcranial magnetic stimulation (TMS) is a non-invasive method allowing both investigating and modulating human brain in normal and pathological conditions. One of the most serious problems limiting TMS use in research and clinical practice is the high variability of its effects. In recent years, it became widely accepted that the effects of TMS protocols is ...
Added: October 31, 2021
Osipov D., , in: 2020 Moscow Workshop on Electronic and Networking Technologies (MWENT).: IEEE, 2020. P. 1–5.
A DHA FH OFDMA that uses order statistics- based techniques can be a very promising technique for mMTC systems. However for any case of practical interest the transmission rate of a classical DHA FH OFDMA system is relatively low due to complexity restrictions. To solve this problem a solution using concatenated coding in multiple disjoint ...
Added: May 8, 2020
Krouk E., Sergeev A., Afanasev M., , in: Intelligent Decision Technologies 2019Vol. 2.: Springer, 2019. P. 89–99.
Recently, low message delay becomes more and more important. It allows the implementation of new applications and services interacting in almost real time that was impossible before. A requirement of low message delay now is a part of many communication standards such as 5G and recommendation papers of future standards such as Tactile Internet proposed by ITU-T. In ...
Added: October 29, 2019
Maudrich T., Kenville R., Nikulin V. et al., Neuroscience 2019 No. 406 P. 300–313
Mirror Activity (MA) is a phenomenon that is characterized by involuntarily occurring muscular activity inhomologous contralateral limbs during unilateral movements. Even in neurologically healthy humans, MA of a smallextent has been described, which does not directly lead to visible movements, but nonetheless, it is still detectable withsurface electromyography (EMG) and therefore defined as physiological MA ...
Added: October 25, 2019
Zhilin I., Kreshchuk A., Zyablov V., , in: 2016 International Symposium on Information Theory and Its Applications (ISITA).: Monterey: IEEE, 2016. P. 290–294.
In this paper we propose a generalized concatenated code (GC code) construction based on shortened Reed-Solomon inner codes and nonbinary LDPC outer codes. We also propose a soft-input decoder for this construction that makes use of soft-input soft-output decoding of both inner and outer codes. We show that this construction gives significant coding gain. We ...
Added: January 9, 2019
Davydow A., Chuprikov P., Nikolenko S. I. et al., , in: Proceedings of the 36th IEEE Conference on Computer Communications (INFOCOM 2017).: Atlanta: IEEE, 2017. P. 1–9.
Modern datacenters are increasingly required to deal with latency-sensitive applications. A major question here is how to represent latency in desired objectives. Incorporation of multiple traffic characteristics (e.g., packet values and required processing requirements) significantly increases the complexity of buffer management policies. In this work, we consider weighted throughput optimization (total transmitted value) in the ...
Added: March 14, 2018
Zhilin, I., Zigangirov D., Zyablov V., Electronic Notes in Discrete Mathematics 2017 Vol. 57 P. 219–224
We propose a concatenated code construction based on convolutional codes. We prove that minimum distance of this construction equals product of free distances of component codes. ...
Added: February 1, 2018
Ivanov F., Zhilin I., Zyablov V., European Wireless 2015; 21th European Wireless Conference; Proceedings of 2015 P. 1–5
n this paper we propose to consider a generalized error-locating code (GEL-code) as a possible candidate for data transmission systems that require high code rates along with strict requirements on wrong decoding probability. The paper describes the construction of the GEL-code and the algorithms for encoding and decoding. The main idea is to implement a ...
Added: February 1, 2018
Subbotin A., Osipov D., , in: Multiple Access Communications. 9th International Workshop, MACOM 2016, Aalborg, Denmark, November 21-22, 2016, Proceedings.: Cham: Springer, 2016. P. 15–29.
In what follows a coded DHA FH OFDMA employing robust reception and concatenated coding construction is considered. The problem of employing Generalized Minimum Distance decoder as an outer code decoder is considered. The effectiveness of the proposed decision is verified by means of simulation. In particular performance of the communication system under intensive mixed interference ...
Added: January 4, 2017
М.: ВНИИ МВД России, 2014.
The collection includes articles, reflecting the author's view on the problem of the latency of economic crimes. Presents the views of experts and scientific views on the definition and types of latent crime, modern understanding of the latency of crimes in the economic sphere, especially the determination of latent crime. For a wide range of ...
Added: January 16, 2015
Osipov D., , in: Multiple Access CommunicationsVol. 8715: 7th International Workshop, MACOM 2014, Halmstad, Sweden, August 27-28, 2014. Proceedings.: Halmstad: Springer, 2014. P. 29–34.
Future generation communication systems will have to endure interference induced by communication systems operating within the same frequency bands. Recently several coded DHA FH OFDMA systems employing rank-based detectors able to solve this problem were proposed. Unfortunately such detectors have relatively high complexity. In what follows a reduced-complexity detector using only column sorting for a ...
Added: October 29, 2014
Moreira J., Fernández M., Kabatiansky G. A., , in: Information Forensics and Security (WIFS), 2011 IEEE International Workshop on.: IEEE, 2011. P. 1–6.
Separating codes have been used in many areas as diverse as automata synthesis, technical diagnosis and traitor tracing schemes. In this paper, we study a weak version of separating codes called almost separating codes. More precisely, we derive lower bounds on the rate of almost separating codes. From the main result it is seen that ...
Added: May 6, 2014
Osipov D., Lecture Notes in Computer Science 2012 Vol. 7642 LNCS P. 37–48
In what follows an upper bound for the probability of erroneous decoding in a coded DHA FH OFDMA system with a noncoherent ML detector under multitone jamming is introduced. ...
Added: February 6, 2013
Яковлева О. В., Черные дыры в Российском законодательстве 2010 № 6 С. 93–96
This article is an attempt to highlight the issues, associated with a latency of crimes under Art. 170 of the Criminal Code of the Russian Federation, and to propose mechanisms to detect these criminal violations. The author analyzes the reasons hindering the identification of the crimes, described in the article. In the present article also ...
Added: September 28, 2012