On the Duality of Erasures and Defects

In this paper, the duality of erasures and defects will be investigated by comparing the binary erasure channel (BEC) and the binary defect channel (BDC). The duality holds for channel capacities, capacity achieving schemes, minimum distances, and upper bounds on the probability of failure to retrieve the original message. Also, the binary defect and erasure channel (BDEC) will be introduced by combining the properties of the BEC and the BDC. It will be shown that the capacity of the BDEC can be achieved by the coding scheme that combines the encoding for the defects and the decoding for the erasures. This coding scheme for the BDEC has two separate redundancy parts for correcting erasures and masking defects. Thus, we will investigate the problem of redundancy allocation between these two parts.

[1]  Thomas M. Cover,et al.  Network Information Theory , 2001 .

[2]  Ashish Jagmohan,et al.  Coding for Multilevel Heterogeneous Memories , 2010, 2010 IEEE International Conference on Communications.

[3]  O. Antoine,et al.  Theory of Error-correcting Codes , 2022 .

[4]  B. V. K. Vijaya Kumar,et al.  Redundancy allocation of partitioned linear block codes , 2013, 2013 IEEE International Symposium on Information Theory.

[5]  Abbas El Gamal,et al.  On the capacity of computer memory with defects , 1983, IEEE Trans. Inf. Theory.

[6]  Daniel A. Spielman,et al.  Efficient erasure correcting codes , 2001, IEEE Trans. Inf. Theory.

[7]  B. V. K. Vijaya Kumar,et al.  Iterative Cross-Entropy Encoding for Memory Systems with Stuck-At Errors , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[8]  A. J. Han Vinck,et al.  On the general defective channel with informed encoder and capacities of some constrained memories , 1994, IEEE Trans. Inf. Theory.

[9]  Abbas El Gamal,et al.  Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).

[10]  Emre Telatar,et al.  Finite-length analysis of low-density parity-check codes on the binary erasure channel , 2002, IEEE Trans. Inf. Theory.

[11]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[12]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[13]  Chris Heegard Partitioned linear block codes for computer memory with 'stuck-at' defects , 1983, IEEE Trans. Inf. Theory.

[14]  Ashish Jagmohan,et al.  Algorithms for memories with stuck cells , 2010, 2010 IEEE International Symposium on Information Theory.

[15]  Michael Luby,et al.  LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[16]  Erdal Arikan,et al.  Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.

[17]  B. V. K. Vijaya Kumar,et al.  Coding for memory with stuck-at defects , 2013, 2013 IEEE International Conference on Communications (ICC).