2021 IEEE International Symposium on Information Theory (ISIT) 2021
DOI: 10.1109/isit45174.2021.9517821
|View full text |Cite
|
Sign up to set email alerts
|

Trellis BMA: Coded Trace Reconstruction on IDS Channels for DNA Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
33
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(33 citation statements)
references
References 30 publications
0
33
0
Order By: Relevance
“…5a shows the average normalized Hamming distance between the decoded information and the original one under different sequence copies. Clearly, the proposed method (red color) dramatically outperforms the Trellis BMA 6 (blue color) and the multiply posteriors method (orange color) by Lenz et al 13 . This indicates our modulation-based decoding method is superior to the other two HMM-based methods.…”
Section: Resultsmentioning
confidence: 89%
See 3 more Smart Citations
“…5a shows the average normalized Hamming distance between the decoded information and the original one under different sequence copies. Clearly, the proposed method (red color) dramatically outperforms the Trellis BMA 6 (blue color) and the multiply posteriors method (orange color) by Lenz et al 13 . This indicates our modulation-based decoding method is superior to the other two HMM-based methods.…”
Section: Resultsmentioning
confidence: 89%
“…We compare our decoding performance with that of Trellis BMA 4 on a real dataset published by the Microsoft group. In order to apply the proposed method on this dataset, we first construct a carrier strand for each DNA sequence by translating A/T to 0 and G/C to 1.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Among other applications, the input entropy is relevant to DNA reconstruction algorithms, since in several of these algorithms such as [6], [37], [43], there is a limitation on the number of noisy copies that are considered by the algorithm's decoder, due to design restrictions and run-time considerations. Therefore, in case the number of received noisy copies is greater than this limitation, a subset of these copies should be considered.…”
Section: Introductionmentioning
confidence: 99%