Improved bit-stuffing bounds on two-dimensional constraints - Information Theory, 2002. Proceedings. 2002 IEEE International Symposium on
نویسندگان
چکیده
We consider the two-dimensional (2-D) (d, IC) runlengthlimited constraint and the 2-D ‘no isolated bits’ constraint (in short, the n.i.b. constraint). A binary array on the square lattice satisfies the two-dimensional (d, IC) constraint if it satisfies the one-dimensional (d, IC) constraint in both vertical and horizontal directions. Similarly, an array on the hexagonal lattice satisfies the two-dimensional (d, IC) constraint if the onedimensional (d, IC) constraint is met in all three directions. The 2-D n.i.b. constraint requires that each bit is equal to at least one of its four closest neighbors on the square lattice. We denote the (d, IC) constraints on the square and hexagonal lattices by S:;k and S,$!, respectively, while the n.i.b. constraint is denoted by Snib. The capacity of a 2-D constraint S is defined by cap(S) = lim,,,,, ( l /(mn)) . log, IS[m,n]I, where S[m,n] is the set of m x n arrays that satisfy the constraint S. The capacity of 2-D constraints has been investigated by several authors (e.g. [1]-[6]). By examining the behavior of the bit-stuffing encoder presented in [5], we derive improved lower bounds on cap(S$-), for d 2 2. We adapt the encoder and analysis to the hexagonal lattice to derive lower bounds on cap(S,d;r), for d 2 2. For Si ; : , we use results in [4] to compute the exact coding ratio of an efficient bit-stuffing encoder. Finally, we present and analyze a bit-stuffing coding scheme to derive a lower bound on cap(S,d;r).
منابع مشابه
Efficient Coding for a Two-Dimensional Runlength-Limited Constraint
Runlength-limited (d, k) constraints and codes are widely used in digital data recording and transmission applications. Generalizations of runlength constraints to two dimensions are of potential interest in page-oriented information storage systems. However, in contrast to the one-dimensional case, little is known about the information-theoretic properties of two-dimensional constraints or the...
متن کاملProceedings of the Second UK Embedded Forum
Nolte and colleagues (e.g. Nolte et al. Proc. of the 8th IEEE Real-Time and Embedded Technology and Applications Symposium, San Jose, California. 2002) have described an approach which aims to reduce the impact of bit stuffing in networks employing the Controller Area Network (CAN) protocol. In this paper, we explore the impact of the Nolte technique on a set of general random – CAN data and sh...
متن کاملConstrained systems with unconstrained positions
We develop methods for analyzing and constructing combined modulation/error-correctiong codes (ECC codes), in particular codes that employ some form of reversed concatenation and whose ECC decoding scheme requires easy access to soft information (e.g., turbo codes, low-density parity-check (LDPC) codes or parity codes). We expand on earlier work of Immink and Wijngaarden and also of Fan, in whi...
متن کاملThroughput of IEEE 802.11 FHSS networks in the presence of strongly interfering Bluetooth networks
Citation for published version (APA): Stranne, A., Florén, F., Edfors, O., & Molin, B-A. (2002). Throughput of IEEE 802.11 FHSS networks in the presence of strongly interfering Bluetooth networks. In 13th IEEE International Symposium on Personal Indoor and Mobile Radio Communications. PIMRC 2002. Proceedings (Cat. No.02TH8637) (pp. 161-165). IEEE-Institute of Electrical and Electronics Engineer...
متن کاملBounds on the capacity of constrained two-dimensional codes
Bounds on the capacity of constrained two-dimensional (2-D) codes are presented. The bounds of Calkin and Wilf apply to first-order symmetric constraints. The bounds are generalized in a weaker form to higher order and nonsymmetric constraints. Results are given for constraints specified by run-length limits or a minimum distance between pixels of a given value.
متن کامل