skip to main content
10.1145/1582379.1582696acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

Fundamental theories on new pattern exclusive coding

Published: 21 June 2009 Publication History

Abstract

In modern communication systems and protocols, the sophisticated packet design, which involves multiple-layer requirements, is in demand. Hence any need for adding more features, system control functions, and reserved prefix headers will cause the dramatic change in the packet format and the corresponding communication standard revision. To combat this problem, we introduce a new concept of cursor patterns and propose to employ these cursor pattern sequences, together with a new pattern exclusive coding scheme, to explore the possibility for removing the restriction of the current packet boundaries. In this paper, we derive the crucial mathematical properties for the pattern exclusive codes with respect to an arbitrary set of cursor patterns, such as the coding efficiency of the PECs and the peak-to-average-power ratio measure of transmitting the PECs with respect to a pattern set. Our proposed method to use the pattern sets with the associated PECs can have potentials towards a number of communication applications, such as data payload limiters, transmitter identification, and even short training sequence for estimation and synchronization, etc.

References

[1]
Efficient data transmission method. European Patent EP1429502.
[2]
SPI Block Guide V4. published by Freescale Semiconductor.
[3]
IEEE802.15.4/d18 standard-part 15.4b: Wireless medium access control (MAC) and physical layer (PHY) specifications for low rate wireless personal area networks (WPANs), Feb. 2003.
[4]
ATSC automatic transmitter power control (ATPC) data return link (DRL) standard, May 2006.
[5]
S. Lin and J. D. J. Costello. Error Control Coding. Prentice-Hall, 2 edition, 2004.
[6]
J. Lukas, J. Fridrich, and M. Goljan. Digital camera identification from sensor pattern noise. IEEE Transactions on Information Forensics and Security, 1(2):205--214, 2006.
[7]
J. G. Proakis. Digital Communications. McGraw-Hill, 4 edition, 2001.
[8]
R. van Nee and A. de Wild. Reducing the peak-to-average power ratio of ofdm. In Proceedings of IEEE Vehicular Technology Conference, volume 3, pages 2072--2076, May 1998.
[9]
X. Wang, Y. Wu, and B. Caron. Transmitter identification using embedded pseudo random sequences. IEEE Transactions on Broadcasting, 50(3):244--252, 2004.
[10]
E. B. y Goytia, M. Nakano-Miyatake, and M. Perez-Meana. Authentication of identification card using watermarking. In European Conference on Wireless Technology, pages 269--272, 2006.

Cited By

View all

Index Terms

  1. Fundamental theories on new pattern exclusive coding

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
      June 2009
      1561 pages
      ISBN:9781605585697
      DOI:10.1145/1582379
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 21 June 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. cursors
      2. pattern exclusive coding
      3. seamless communications

      Qualifiers

      • Research-article

      Conference

      IWCMC '09
      Sponsor:

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 16 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)A Novel Protocol-Free Bandage-Cover CryptographerIEEE Transactions on Cybernetics10.1109/TCYB.2021.311723552:11(11431-11441)Online publication date: Nov-2022
      • (2015)Software-Defined Multiplexing Codes2015 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOCOM.2015.7417802(1-6)Online publication date: Dec-2015
      • (2014)Dust: Real-Time Code Offloading System for Wearable Computing2015 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOCOM.2014.7417877(1-7)Online publication date: Dec-2014
      • (2014)Software-Defined Multiplexing Codes2015 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOCOM.2014.7417802(1-6)Online publication date: Dec-2014

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media