6.451 Principles of Digital Communication II Wednesday, May 4, 2005 MIT, Spring 2005 Handout #22. Problem Set 9 Solutions
|
|
- William O’Neal’
- 5 years ago
- Views:
Transcription
1 6.45 Principles of Digital Communication II Wednesda, Ma 4, 25 MIT, Spring 25 Hand #22 Problem Set 9 Solutions Problem 8.3 (revised) (BCJR (sum-product) decoding of SPC codes) As shown in Problem 6.4 or Figure of Chapter, an (n, n, 2) single-parit-check code has a two-state trellis diagram. Consider the (8, 7, 2) code, and let the received sequence from a discrete-time AWGN channel with input alphabet {±} and noise variance 2 σ = be given b r =(.,.,.7,.8,.,.3,.9,.5). Perform BCJR (sumproduct) decoding of this sequence to determine the APP vector for each smbol Y k. [Hint: the special algorithm given in Section (see Problem 9.5) to implement the sumproduct update rule for zero-sum nodes ma be helpful here.] First, let us draw the normal graph of a minimal trellis realization of the (8, 7, 2) code. This graph is shown abstractl below: Y Y Y 2 Y 3 Y 4 Y 5 Y 6 Y 7 B Σ B Σ 2 Σ 3 Σ 4 Σ 5 Σ 6 Σ 7 B 2 B 3 B 4 B 5 B 6 B 7 (2, ) (3, 2) (3, 2) (3, 2) (3, 2) (3, 2) (3, 2) (2, ) Moreover, it is eas to see that the (3, 2) branch constraint codes are all (3, 2, 2) zero-sum codes, and the (2, ) codes are simple repetition codes that need not actuall be shown. Therefore the trellis realization ma be drawn simpl as follows: Y Y Y 2 Y 3 Y 4 Y 5 Y 6 Y Note that this trellis realization of the (8, 7, 2) code is another ccle-free realization that uses 6 (3, 2, 2) zero-sum constraints, as in the reduced HT realization of Problem 8.; however, the diameter of this realization is 5 (which is as large as it could possibl be). For a binar-input Gaussian-noise channel with inputs {±} and Gaussian conditional probabilit densit p(r ) =(2πσ) /2 exp (r ) 2 /2σ 2, the a posteriori probabilit (APP) of {±} given a received value r is, b Baes rule, p(r ) p( r) = p(r ) + p(r ) e r/σ2 =. e r/σ 2 + e r/σ 2 Here σ 2 = (so SNR = ( db); i.e., the channel is ver nois). The two values p(± r k ) form the intrinsic information message k = {p k,p k } derived from each received smbol r k, k 7. These values are computed from the received vector r =(.,.,.7,.8,.,.3,.9,.5) in the following table. (Note that it would have sufficed to use the unnormalized pair {e r k /σ 2,e r k /σ 2 }.) We also compute the Hadamard transform {p k + p k =,p k p k = I k } of each pair of values for later use.
2 r k p k p k I k r = r = r 2 = r 3 = r 4 = r 5 = r 6 = r 7 = Note that I k =tanh r k /σ 2,so I k r k /σ 2 for small r k. The sign of I k represents a hard decision, whereas the magnitude I k represents the reliabilit of that decision. We then propagate the APP messages through the graph below, using the BCJR (sumproduct) algorithm. Note that in the forward direction α =, α k is the sum-product update of α k and k for 2 k 7, and finall ε 7 = α 7. Similarl, in the backward direction, β 7 = 7, β k is the sum-product update of β k+ and k for 6 k, and finall ε = β.then ε k is the sum-product update of α k and β k+ for k 6. Y Y Y 2 Y 3 Y 4 Y 5 Y 6 Y 7 ε ε ε 2 ε 3 ε 4 ε 5 ε 6 ε α 7 α 2 2 α 3 3 α 4 4 α 5 5 α 6 6 α β β 2 β 3 β 4 β 5 β 6 β 7 For a (3, 2, 2) constraint code C k, the set of past 2-tuples consistent with a value for an incident variable is C k () = {, }, and similarl C k () = {, }. Therefore the sum-product update rule is p( r P ) = p( r Pj )p( r Pj )+ p( r Pj )p( r Pj ); p( r P ) = p( r Pj )p( r Pj )+ p( r Pj )p( r Pj ), where P j and P j are the two pasts upstream of P. Alternativel, following the hint, we ma use the special rule for zero-sum nodes to obtain the Hadamard transform of (p( r P ),p( r P )) simpl b componentwise multiplication of the Hadamard transforms of (p( r Pj ),p( r Pj )) and (p( r Pj ),p( r Pj )). B either method, we obtain the following values for the forward messages α k = {α k,α k } and their Hadamard transforms {α k + α k =,α k α k = A k }, the backward messages βk = {β k,β k } and their Hadamard transforms {,B k }, and the extrinsic information messages ε k = {ε k,ε k } and their Hadamard transforms {,E k }. α k A k α = α k α k α α α α α α
3 β k β k β k B k β 7 = β β β β β β ε k ε k ε k E k ε = β ε ε ε ε ε ε ε 7 = α Notice how the reliabilit of the forward and backward APP messages α k and β k degenerates as more and more intrinsic information messages k are incorporated into them. The APP vectors {p(y k = r),p(y k = r)} for the smbol variables Y k are ultimatel obtained b componentwise multiplication of k and ε k, normalized. We note that for all k, since ε k ε k,we have {p(y 2 k = r),p(y k = r)} { k, k }; i.e., the intrinsic information k dominates. Thus if hard decisions are made on each smbol, the result is the same as if hard decisions had been made smbol-b-smbol based solel on the channel puts r k, and the resulting sequence of hard decisions is not a code sequence in the (8, 7, 2) code. In contrast, suppose that we perform the max-product (equivalent to the min-sum) algorithm with this received sequence. We obtain the following values: α k α k α k α = α α α α α α
4 β k β k β k β 7 = β β β β β β ε k ε k ε k ε = β ε ε ε ε ε ε ε 7 = α In this case, the reliabilit of a forward or backward message is the minimum reliabilit of an intrinsic information that is incorporated into it. Eventuall, this means that the extrinsic information ε dominates the intrinsic information for the least reliable smbol Y, so the original hard decision is corrected in this case. The same correction would be performed b the Viterbi algorithm or b Wagner decoding. The max-product (min-sum) algorithm finds the maximum-likelihood code sequence, whereas the BCJR (sum-product) algorithm computes the APP vector of each bit. A bit decision based on the maximum APP minimizes the bit error probabilit, so the bit error probabilit could be (slightl) lower with the BCJR algorithm. ML sequence detection minimizes the probabilit of decoding to the wrong codeword. The sequence of maximum-app bits from the BCJR algorithm ma not be a codeword, as we have just seen. Compare the complexit of BCJR decoding to Viterbi algorithm decoding (Problem 6.6). The BCJR algorithm is considerabl more complex. For each trellis segment, it has to compute the sum-product update rule three times. The straightforward sum-product update rule involves four multiplications and two additions; the simplified rule requires a single multiplication. B contrast, the VA requires four additions and two comparisons per trellis segment. Computation of the intrinsic APP vector is also more complex, and requires estimation of the noise variance σ 2, which could be a problem. Finall, the logic of the BCJR algorithm is more complex, since it is two-wa rather than one-wa. In short, the VA is significantl simpler than the BCJR algorithm. For this reason, the VA was preferred for trellis decoding for man ears. The BCJR algorithm was resurrected with the advent of turbo codes, where the fact that it produces soft (APP) puts is essential to its role as a part of iterative decoding algorithms. (For this scenario, Wagner decoding is even simpler; see the solution to Problem 6.6.) 4
5 Problem 9. (Iterative decoding on the BEC) (a) Using a graph of the (8, 4, 4) code like that of Figure of Chapter 3 for iterative decoding, decode the received sequence (,,,?,,?,?,?). We ma use the equivalent normal graph of Figure 3(b) of Chapter, which ma be converted to a directed normal graph (encoder) as shown in Figure 5 of Chapter, repeated below. - = H HHHH - = XXX H XX H HHHH HHHH XX XXX 2 - = H H jz- + HHH HHH 9 3 = XX H HHHH Hj- : X + X XXX X 4 - = XX Hz- XXX j + XX X XXXX 5 = 9 z- : + 6 = = 7 = The directed input edges show that (,, 2, 4 ) is an information set for this code. Given (,, 2, 4 )=(,,, ), the sum-product algorithm fills in the erasures b following the directed state edges as shown above. On the first iteration, the first check ields 3 =; on the second iteration, the second and third checks ield 5 = 6 = ; and on the third and last iteration, the last check ields 7 =. Then tr to decode the received sequence (,,,,?,?,?,?). Wh does decoding fail in the latter case? Give both a local answer (based on the graph) and a global answer (based on the code). As shown in the graph below, iterative decoding stalls because at the initial iteration, the first check checks, and each of the last three checks has two or more erased inputs, so none of the checks ields an new smbol values. The smbols ( 4, 5, 6, 7 )and thelast three checks are called a stopping set, because at least two of the smbols are involved in each of the three checks; therefore if all are erased, no progress can be made. 5
6 - = H HHHH - = XX H HHHH XXX H HHHH XX XXX 2 - = H H jz- + 3 = 9 H XX : j- HHHHHHHH + XXX X XX 4 - = XX XXH z- j XXX + X XX 5 = 9 XXz- : + 6 = = 7 = In this case, however, even a global (ML) decoder must fail, because there are two codewords with (,, 2, 3 )=(,,, ), namel and. (b) For the received sequence (,,,,?,?,?, ), show that iterative decoding fails but that global (i.e., ML) decoding succeeds. In this case, there is onl one codeword with (,, 2, 3, 7 )=(,,,, ), namel, so global (ML) decoding will succeed. On the other hand, iterative decoding will fail, because the smbols ( 4, 5, 6 )and the last three checks form a stopping set of this graph: : = X - XX + X XX XXXX 5 = 9 z-: + 6 = = Problem 9.2 (Simulation of LDPC decoding on a BEC) (a) Perform a simulation of iterative decoding of a regular (d λ =3,d ρ =6) LDPC code on a BEC with p =.45 (i.e., on Figure 9 of Chapter 3), and show how decoding gets stuck at the first fixed point (q l r.35,q r l.89). Ab how man iterations does it take to get stuck? We start with q r l = and use the sum-product update relationships developed for this case in Chapter 3: q l r =(.45)(q r l ) 2 ; q r l = ( q l r ) 5. 6
7 We obtain the following sequence: q r l q l r The point is that it takes a ver finite number of iterations to get stuck, ab 5 3 full iterations, depending on how we define stuck. (b) B simulation of iterative decoding, compute the coordinates of the fixed point to six significant digits. B the above simulation, the fixed point to six significant digits is at (q r l,q l r ) = ( , ). 7
8 Problem 9.3 (Iterative decoding threshold) B analsis or simulation, show that the smallest p such that the equation x = ( px 2 ) 5 has a solution in the interval < x< is p = Explain the significance of this calculation for iterative decoding of LDPC codes on a BEC. A simulation such as that in Problem 9.2 will succeed for p =.429 and get stuck for p =.43. Therefore p is somewhere between these two values. The significance of this calculation is that a rate-/2 regular (d λ =3,d ρ = 6) LDPC code with iterative decoding can be used on an BEC with p <p = This is not as good as a random linear rate-/2 code with an ML decoder, which should be able to be used on an BEC with p <.5, but it is prett good. It has now been shown that there exist irregular rate-/2 LDPC codes that can be used with iterative decoding on an BEC with p <.5. Problem 9.4 (Stabilit condition) (a) Show that if the minimum left degree of an irregular LDPC code is 3, then the stabilit condition necessaril holds. If λ(x) = d λ d x d = λ 3 x 2 +,then λ () =, so the stabilit condition pλ ()ρ () < necessaril holds. (b) Argue that such a left degree distribution λ(x) cannot be capacit-approaching, in view of Theorem 3.2. If λ(x) = λ 3 x 2 +, then in the neighborhood of the top right point (, ) of the EXIT chart, the curve q l r = pλ(q r l ) is approximatel quadratic, q l r pλ 3 (q r l ) 2,whereas the curve q r l = ρ( q l r ) is approximatel linear, q r l ρ ()q l r. Therefore there must be a gap of nonnegligible area between these two curves in the neighborhood of the (, ) point. B the area theorem, if the gap between the two curves has a nonnegligible area, then capacit cannot be approached arbitraril closel. Problem 9.5 (Sum-product update rule for zero-sum nodes) (a) Prove that the algorithm of Section implements the sum-product update rule for a zero-sum node, up to scale. [Hint: observe that in the product j (w w ), the terms with positive signs sum to w, whereas the terms with negative signs sum to w.] Following the hint, we have W = W = (w + w ); W = W = (w w ). j j j j In the latter equation, we observe that the terms with positive signs sum to w,whereas the terms with negative signs sum to w, so the second product equals w w. The same terms occur in the former equation, but all with positive signs, so the first product equals w + w,w. Therefore the pair (W ) is the Hadamard transform of (w,w ), so we ma obtain (w,w )from(w,w )btaking theinverse Hadamard transform (up to scale): w = W + W ; w = W W. 8
9 (b) Show that if we interchange w and w in an even number of incoming APP vectors, then the going APP vector {w,w } is unchanged. On the other hand, show that if we interchange w and w in an odd number of incoming APP vectors, then the components w and w of the going APP vector are interchanged. Interchanging w and w changes the sign of W, while leaving W unchanged. Therefore if there an even number of such interchanges, W and W are unchanged, and so therefore are w and w. If there an odd number of such interchanges, then the sign of W is changed, which results in an interchange between w and w. (c) Show that if we replace APP weight vectors {w,w } b log likelihood ratios Λ = ln w /w, then the zero-sum sum-product update rule reduces to the tanh rule ( ) + tanh Λ /2 Λ =ln j, tanh Λ /2 where the hperbolic tangent is defined b tanh x = (e x e x )/(e x + e x ). Since Λ /2=ln(w /w ) /2,wehave (w /w /w ) /2 w tanh Λ ) /2 (w /2= w = =. (w /w /w ) /2 + w W ) /2 +(w w W W tanh Λ /2= W = W. j W (Note that if (w,w ) are normalized so that w = W + w =, then tanh Λ /2= W.) Consequentl j j It follows that ( ) + tanh Λ /2 W + W ln j =ln =ln w j tanh Λ /2 W W w =Λ. (d) Show that the tanh rule ma alternativel be written as tanh Λ /2= tanh Λ /2. As with the expression for tanh Λ /2above,wehave W tanh Λ /2=, W whichwehaveshown abovetobeequal to j tanh Λ /2. j 9
Capacity-approaching codes
Chapter 13 Capacity-approaching codes We have previously discussed codes on graphs and the sum-product decoding algorithm in general terms. In this chapter we will give a brief overview of some particular
More informationLDPC Codes. Slides originally from I. Land p.1
Slides originally from I. Land p.1 LDPC Codes Definition of LDPC Codes Factor Graphs to use in decoding Decoding for binary erasure channels EXIT charts Soft-Output Decoding Turbo principle applied to
More informationPerformance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels
Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering
More informationLecture 4 : Introduction to Low-density Parity-check Codes
Lecture 4 : Introduction to Low-density Parity-check Codes LDPC codes are a class of linear block codes with implementable decoders, which provide near-capacity performance. History: 1. LDPC codes were
More informationSENS'2006 Second Scientific Conference with International Participation SPACE, ECOLOGY, NANOTECHNOLOGY, SAFETY June 2006, Varna, Bulgaria
SENS'6 Second Scientific Conference with International Participation SPACE, ECOLOGY, NANOTECHNOLOGY, SAFETY 4 6 June 6, Varna, Bulgaria SIMULATION ANALYSIS OF THE VITERBI CONVOLUTIONAL DECODING ALGORITHM
More informationAn Introduction to Low-Density Parity-Check Codes
An Introduction to Low-Density Parity-Check Codes Paul H. Siegel Electrical and Computer Engineering University of California, San Diego 5/ 3/ 7 Copyright 27 by Paul H. Siegel Outline Shannon s Channel
More informationCodes on graphs and iterative decoding
Codes on graphs and iterative decoding Bane Vasić Error Correction Coding Laboratory University of Arizona Prelude Information transmission 0 0 0 0 0 0 Channel Information transmission signal 0 0 threshold
More informationNAME... Soc. Sec. #... Remote Location... (if on campus write campus) FINAL EXAM EE568 KUMAR. Sp ' 00
NAME... Soc. Sec. #... Remote Location... (if on campus write campus) FINAL EXAM EE568 KUMAR Sp ' 00 May 3 OPEN BOOK exam (students are permitted to bring in textbooks, handwritten notes, lecture notes
More informationIntroduction to Low-Density Parity Check Codes. Brian Kurkoski
Introduction to Low-Density Parity Check Codes Brian Kurkoski kurkoski@ice.uec.ac.jp Outline: Low Density Parity Check Codes Review block codes History Low Density Parity Check Codes Gallager s LDPC code
More information5. Density evolution. Density evolution 5-1
5. Density evolution Density evolution 5-1 Probabilistic analysis of message passing algorithms variable nodes factor nodes x1 a x i x2 a(x i ; x j ; x k ) x3 b x4 consider factor graph model G = (V ;
More informationDigital Communications
Digital Communications Chapter 8: Trellis and Graph Based Codes Saeedeh Moloudi May 7, 2014 Outline 1 Introduction 2 Convolutional Codes 3 Decoding of Convolutional Codes 4 Turbo Codes May 7, 2014 Proakis-Salehi
More informationMessage-Passing Decoding for Low-Density Parity-Check Codes Harish Jethanandani and R. Aravind, IIT Madras
Message-Passing Decoding for Low-Density Parity-Check Codes Harish Jethanandani and R. Aravind, IIT Madras e-mail: hari_jethanandani@yahoo.com Abstract Low-density parity-check (LDPC) codes are discussed
More informationCodes on graphs and iterative decoding
Codes on graphs and iterative decoding Bane Vasić Error Correction Coding Laboratory University of Arizona Funded by: National Science Foundation (NSF) Seagate Technology Defense Advanced Research Projects
More informationLDPC Codes. Intracom Telecom, Peania
LDPC Codes Alexios Balatsoukas-Stimming and Athanasios P. Liavas Technical University of Crete Dept. of Electronic and Computer Engineering Telecommunications Laboratory December 16, 2011 Intracom Telecom,
More informationIterative Timing Recovery
Iterative Timing Recovery John R. Barry School of Electrical and Computer Engineering, Georgia Tech Atlanta, Georgia U.S.A. barry@ece.gatech.edu 0 Outline Timing Recovery Tutorial Problem statement TED:
More informationAn Introduction to Low Density Parity Check (LDPC) Codes
An Introduction to Low Density Parity Check (LDPC) Codes Jian Sun jian@csee.wvu.edu Wireless Communication Research Laboratory Lane Dept. of Comp. Sci. and Elec. Engr. West Virginia University June 3,
More informationDecoding the Tail-Biting Convolutional Codes with Pre-Decoding Circular Shift
Decoding the Tail-Biting Convolutional Codes with Pre-Decoding Circular Shift Ching-Yao Su Directed by: Prof. Po-Ning Chen Department of Communications Engineering, National Chiao-Tung University July
More informationChapter 7: Channel coding:convolutional codes
Chapter 7: : Convolutional codes University of Limoges meghdadi@ensil.unilim.fr Reference : Digital communications by John Proakis; Wireless communication by Andreas Goldsmith Encoder representation Communication
More informationLow-density parity-check (LDPC) codes
Low-density parity-check (LDPC) codes Performance similar to turbo codes Do not require long interleaver to achieve good performance Better block error performance Error floor occurs at lower BER Decoding
More informationECEN 655: Advanced Channel Coding
ECEN 655: Advanced Channel Coding Course Introduction Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 655: Advanced Channel Coding 1 / 19 Outline 1 History
More informationEE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes
EE229B - Final Project Capacity-Approaching Low-Density Parity-Check Codes Pierre Garrigues EECS department, UC Berkeley garrigue@eecs.berkeley.edu May 13, 2005 Abstract The class of low-density parity-check
More informationJoint Iterative Decoding of LDPC Codes and Channels with Memory
Joint Iterative Decoding of LDPC Codes and Channels with Memory Henry D. Pfister and Paul H. Siegel University of California, San Diego 3 rd Int l Symposium on Turbo Codes September 1, 2003 Outline Channels
More informationLOW-density parity-check (LDPC) codes were invented
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 1, JANUARY 2008 51 Extremal Problems of Information Combining Yibo Jiang, Alexei Ashikhmin, Member, IEEE, Ralf Koetter, Senior Member, IEEE, and Andrew
More informationModern Coding Theory. Daniel J. Costello, Jr School of Information Theory Northwestern University August 10, 2009
Modern Coding Theory Daniel J. Costello, Jr. Coding Research Group Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556 2009 School of Information Theory Northwestern University
More informationSIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land
SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land Ingmar Land, SIPCom8-1: Information Theory and Coding (2005 Spring) p.1 Overview Basic Concepts of Channel Coding Block Codes I:
More informationLower Bounds on the Graphical Complexity of Finite-Length LDPC Codes
Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International
More informationMessage Passing Algorithm and Linear Programming Decoding for LDPC and Linear Block Codes
Message Passing Algorithm and Linear Programming Decoding for LDPC and Linear Block Codes Institute of Electronic Systems Signal and Information Processing in Communications Nana Traore Shashi Kant Tobias
More informationFactor Graphs and Message Passing Algorithms Part 1: Introduction
Factor Graphs and Message Passing Algorithms Part 1: Introduction Hans-Andrea Loeliger December 2007 1 The Two Basic Problems 1. Marginalization: Compute f k (x k ) f(x 1,..., x n ) x 1,..., x n except
More informationSchool of Computer and Communication Sciences. Information Theory and Coding Notes on Random Coding December 12, 2003.
ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE School of Computer and Communication Sciences Handout 8 Information Theor and Coding Notes on Random Coding December 2, 2003 Random Coding In this note we prove
More informationLow-density parity-check codes
Low-density parity-check codes From principles to practice Dr. Steve Weller steven.weller@newcastle.edu.au School of Electrical Engineering and Computer Science The University of Newcastle, Callaghan,
More informationInformation Theoretic Imaging
Information Theoretic Imaging WU Faculty: J. A. O Sullivan WU Doctoral Student: Naveen Singla Boeing Engineer: James Meany First Year Focus: Imaging for Data Storage Image Reconstruction Data Retrieval
More informationBounds on Mutual Information for Simple Codes Using Information Combining
ACCEPTED FOR PUBLICATION IN ANNALS OF TELECOMM., SPECIAL ISSUE 3RD INT. SYMP. TURBO CODES, 003. FINAL VERSION, AUGUST 004. Bounds on Mutual Information for Simple Codes Using Information Combining Ingmar
More informationLecture 12. Block Diagram
Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data
More informationOn Generalized EXIT Charts of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels
2012 IEEE International Symposium on Information Theory Proceedings On Generalied EXIT Charts of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels H Mamani 1, H Saeedi 1, A Eslami
More informationCHAPTER 8 Viterbi Decoding of Convolutional Codes
MIT 6.02 DRAFT Lecture Notes Fall 2011 (Last update: October 9, 2011) Comments, questions or bug reports? Please contact hari at mit.edu CHAPTER 8 Viterbi Decoding of Convolutional Codes This chapter describes
More informationIterative Quantization. Using Codes On Graphs
Iterative Quantization Using Codes On Graphs Emin Martinian and Jonathan S. Yedidia 2 Massachusetts Institute of Technology 2 Mitsubishi Electric Research Labs Lossy Data Compression: Encoding: Map source
More informationSuccessive Cancellation Decoding of Single Parity-Check Product Codes
Successive Cancellation Decoding of Single Parity-Check Product Codes Mustafa Cemil Coşkun, Gianluigi Liva, Alexandre Graell i Amat and Michael Lentmaier Institute of Communications and Navigation, German
More informationTrellis-based Detection Techniques
Chapter 2 Trellis-based Detection Techniques 2.1 Introduction In this chapter, we provide the reader with a brief introduction to the main detection techniques which will be relevant for the low-density
More informationIntroduction to Convolutional Codes, Part 1
Introduction to Convolutional Codes, Part 1 Frans M.J. Willems, Eindhoven University of Technology September 29, 2009 Elias, Father of Coding Theory Textbook Encoder Encoder Properties Systematic Codes
More informationCapacity-approaching codes
Chapter 3 Capacity-approaching coes We have previously iscusse coes on graphs an the sum-prouct ecoing algorithm in general terms. In this chapter we will give a brief overview of some particular classes
More informationBelief-Propagation Decoding of LDPC Codes
LDPC Codes: Motivation Belief-Propagation Decoding of LDPC Codes Amir Bennatan, Princeton University Revolution in coding theory Reliable transmission, rates approaching capacity. BIAWGN, Rate =.5, Threshold.45
More informationPOLAR CODES FOR ERROR CORRECTION: ANALYSIS AND DECODING ALGORITHMS
ALMA MATER STUDIORUM UNIVERSITÀ DI BOLOGNA CAMPUS DI CESENA SCUOLA DI INGEGNERIA E ARCHITETTURA CORSO DI LAUREA MAGISTRALE IN INGEGNERIA ELETTRONICA E TELECOMUNICAZIONI PER L ENERGIA POLAR CODES FOR ERROR
More informationEstimation-Theoretic Representation of Mutual Information
Estimation-Theoretic Representation of Mutual Information Daniel P. Palomar and Sergio Verdú Department of Electrical Engineering Princeton University Engineering Quadrangle, Princeton, NJ 08544, USA {danielp,verdu}@princeton.edu
More informationCode design: Computer search
Code design: Computer search Low rate codes Represent the code by its generator matrix Find one representative for each equivalence class of codes Permutation equivalences? Do NOT try several generator
More informationConvolutional Codes ddd, Houshou Chen. May 28, 2012
Representation I, II Representation III, IV trellis of Viterbi decoding Turbo codes Convolutional Codes ddd, Houshou Chen Department of Electrical Engineering National Chung Hsing University Taichung,
More informationThe Turbo Principle in Wireless Communications
The Turbo Principle in Wireless Communications Joachim Hagenauer Institute for Communications Engineering () Munich University of Technology (TUM) D-80290 München, Germany Nordic Radio Symposium, Oulu,
More informationTurbo Codes for Deep-Space Communications
TDA Progress Report 42-120 February 15, 1995 Turbo Codes for Deep-Space Communications D. Divsalar and F. Pollara Communications Systems Research Section Turbo codes were recently proposed by Berrou, Glavieux,
More informationBOUNDS ON THE MAP THRESHOLD OF ITERATIVE DECODING SYSTEMS WITH ERASURE NOISE. A Thesis CHIA-WEN WANG
BOUNDS ON THE MAP THRESHOLD OF ITERATIVE DECODING SYSTEMS WITH ERASURE NOISE A Thesis by CHIA-WEN WANG Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the
More informationOne Lesson of Information Theory
Institut für One Lesson of Information Theory Prof. Dr.-Ing. Volker Kühn Institute of Communications Engineering University of Rostock, Germany Email: volker.kuehn@uni-rostock.de http://www.int.uni-rostock.de/
More informationOn Accuracy of Gaussian Assumption in Iterative Analysis for LDPC Codes
ISIT 26, Seattle, USA, July 9-4, 26 On Accuracy of Gaussian Assumption in Iterative Analysis for LDPC Codes Kai Xie Electrical and Computer Engineering Dept, Lehigh University, Bethlehem, PA 85, USA Email:
More informationRCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths
RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths Kasra Vakilinia, Dariush Divsalar*, and Richard D. Wesel Department of Electrical Engineering, University
More informationNotes 3: Stochastic channels and noisy coding theorem bound. 1 Model of information communication and noisy channel
Introduction to Coding Theory CMU: Spring 2010 Notes 3: Stochastic channels and noisy coding theorem bound January 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami We now turn to the basic
More informationEE 229B ERROR CONTROL CODING Spring 2005
EE 229B ERROR CONTROL CODING Spring 2005 Solutions for Homework 1 1. Is there room? Prove or disprove : There is a (12,7) binary linear code with d min = 5. If there were a (12,7) binary linear code with
More informationThe PPM Poisson Channel: Finite-Length Bounds and Code Design
August 21, 2014 The PPM Poisson Channel: Finite-Length Bounds and Code Design Flavio Zabini DEI - University of Bologna and Institute for Communications and Navigation German Aerospace Center (DLR) Balazs
More informationSingle-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes
Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes Brian M. Kurkoski, Kazuhiko Yamaguchi and Kingo Kobayashi kurkoski@ice.uec.ac.jp Dept. of Information and Communications Engineering
More informationSPA decoding on the Tanner graph
SPA decoding on the Tanner graph x,(i) q j,l = P(v l = x check sums A l \ {h j } at the ith iteration} x,(i) σ j,l = Σ P(s = 0 v = x,{v : t B(h )\{l}}) q {vt : t B(h j )\{l}} j l t j t B(h j )\{l} j,t
More informationSlepian-Wolf Code Design via Source-Channel Correspondence
Slepian-Wolf Code Design via Source-Channel Correspondence Jun Chen University of Illinois at Urbana-Champaign Urbana, IL 61801, USA Email: junchen@ifpuiucedu Dake He IBM T J Watson Research Center Yorktown
More informationTHE seminal paper of Gallager [1, p. 48] suggested to evaluate
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 11, NOVEMBER 2004 2657 Extrinsic Information Transfer Functions: Model and Erasure Channel Properties Alexei Ashikhmin, Member, IEEE, Gerhard Kramer,
More informationIterative Encoding of Low-Density Parity-Check Codes
Iterative Encoding of Low-Density Parity-Check Codes David Haley, Alex Grant and John Buetefuer Institute for Telecommunications Research University of South Australia Mawson Lakes Blvd Mawson Lakes SA
More informationChannel Codes for Short Blocks: A Survey
11th International ITG Conference on Systems, Communications and Coding February 6, 2017 Channel Codes for Short Blocks: A Survey Gianluigi Liva, gianluigi.liva@dlr.de Fabian Steiner, fabian.steiner@tum.de
More informationCapacity-approaching codes
Chapter 3 Capacity-approaching coes We have previously iscusse coes on graphs an the sum-prouct ecoing algorithm in general terms. In this chapter we will give a brief overview of some particular classes
More informationABSTRACT. The original low-density parity-check (LDPC) codes were developed by Robert
ABSTRACT Title of Thesis: OPTIMIZATION OF PERMUTATION KEY FOR π-rotation LDPC CODES Nasim Vakili Pourtaklo, Master of Science, 2006 Dissertation directed by: Associate Professor Steven Tretter Department
More informationP(c y) = W n (y c)p(c)
ENEE 739C: Adanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 9 (draft; /7/3). Codes defined on graphs. The problem of attaining capacity. Iteratie decoding. http://www.enee.umd.edu/
More informationOne-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information
One-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information ZOU Sheng and Brian M. Kurkoski kurkoski@ice.uec.ac.jp University of Electro-Communications Tokyo, Japan University of
More informationAppendix D: Basics of convolutional codes
Appendix D: Basics of convolutional codes Convolutional encoder: In convolutional code (B. P. Lathi, 2009; S. G. Wilson, 1996; E. Biglieri, 2005; T. Oberg, 2001), the block of n code bits generated by
More informationA Relation between Conditional and Unconditional Soft Bit Densities of Binary Input Memoryless Symmetric Channels
A Relation between Conditional and Unconditional Soft Bit Densities of Binary Input Memoryless Symmetric Channels Wolfgang Rave Vodafone Chair Mobile Communications Systems, Technische Universität Dresden
More informationIntroducing Low-Density Parity-Check Codes
Introducing Low-Density Parity-Check Codes Sarah J. Johnson School of Electrical Engineering and Computer Science The University of Newcastle Australia email: sarah.johnson@newcastle.edu.au Topic 1: Low-Density
More informationRalf Koetter, Andrew C. Singer, and Michael Tüchler
Ralf Koetter, Andrew C. Singer, and Michael Tüchler Capitalizing on the tremendous performance gains of turbo codes and the turbo decoding algorithm, turbo equalization is an iterative equalization and
More informationTHE EFFECT OF PUNCTURING ON THE CONVOLUTIONAL TURBO-CODES PERFORMANCES
THE EFFECT OF PUNCTURING ON THE CONVOLUTIONAL TURBO-COES PERFORMANCES Horia BALTA 1, Lucian TRIFINA, Anca RUSINARU 1 Electronics and Telecommunications Faculty, Bd. V. Parvan, 1900 Timisoara, ROMANIA,
More informationMessage Passing Algorithm with MAP Decoding on Zigzag Cycles for Non-binary LDPC Codes
Message Passing Algorithm with MAP Decoding on Zigzag Cycles for Non-binary LDPC Codes Takayuki Nozaki 1, Kenta Kasai 2, Kohichi Sakaniwa 2 1 Kanagawa University 2 Tokyo Institute of Technology July 12th,
More informationTurbo Compression. Andrej Rikovsky, Advisor: Pavol Hanus
Turbo Compression Andrej Rikovsky, Advisor: Pavol Hanus Abstract Turbo codes which performs very close to channel capacity in channel coding can be also used to obtain very efficient source coding schemes.
More informationPerformance of small signal sets
42 Chapter 5 Performance of small signal sets In this chapter, we show how to estimate the performance of small-to-moderate-sized signal constellations on the discrete-time AWGN channel. With equiprobable
More informationState-of-the-Art Channel Coding
Institut für State-of-the-Art Channel Coding Prof. Dr.-Ing. Volker Kühn Institute of Communications Engineering University of Rostock, Germany Email: volker.kuehn@uni-rostock.de http://www.int.uni-rostock.de/
More informationECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture)
ECE 564/645 - Digital Communications, Spring 018 Homework # Due: March 19 (In Lecture) 1. Consider a binary communication system over a 1-dimensional vector channel where message m 1 is sent by signaling
More informationBASICS OF DETECTION AND ESTIMATION THEORY
BASICS OF DETECTION AND ESTIMATION THEORY 83050E/158 In this chapter we discuss how the transmitted symbols are detected optimally from a noisy received signal (observation). Based on these results, optimal
More informationarxiv:cs/ v2 [cs.it] 1 Oct 2006
A General Computation Rule for Lossy Summaries/Messages with Examples from Equalization Junli Hu, Hans-Andrea Loeliger, Justin Dauwels, and Frank Kschischang arxiv:cs/060707v [cs.it] 1 Oct 006 Abstract
More informationJoint Equalization and Decoding for Nonlinear Two-Dimensional Intersymbol Interference Channels with Application to Optical Storage
Joint Equalization and Decoding for Nonlinear Two-Dimensional Intersymbol Interference Channels with Application to Optical Storage 1 arxiv:cs/0509008v1 [cs.it] 4 Sep 2005 Naveen Singla and Joseph A. O
More information9 Forward-backward algorithm, sum-product on factor graphs
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 9 Forward-backward algorithm, sum-product on factor graphs The previous
More informationAPPLICATIONS. Quantum Communications
SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction
More informationCapacity-Achieving Ensembles for the Binary Erasure Channel With Bounded Complexity
Capacity-Achieving Ensembles for the Binary Erasure Channel With Bounded Complexity Henry D. Pfister, Member, Igal Sason, Member, and Rüdiger Urbanke Abstract We present two sequences of ensembles of non-systematic
More informationNotes on a posteriori probability (APP) metrics for LDPC
Notes on a posteriori probability (APP) metrics for LDPC IEEE 802.3an Task Force November, 2004 Raju Hormis, Xiaodong Wang Columbia University, NY e-mail: raju@ee.columbia.edu Outline Section 55.3.11.3
More informationUNIVERSITÀ DEGLI STUDI DI PARMA
UNIVERSITÀ DEGLI STUDI DI PARMA DIPARTIMENTO DI INGEGNERIA DELL INFORMAZIONE Dottorato di Ricerca in Tecnologie dell Informazione XX Ciclo Dario Fertonani LOW-COMPLEXITY ITERATIVE RECEIVERS Dissertazione
More informationOPTIMAL FINITE ALPHABET SOURCES OVER PARTIAL RESPONSE CHANNELS. A Thesis DEEPAK KUMAR
OPTIMAL FINITE ALPHABET SOURCES OVER PARTIAL RESPONSE CHANNELS A Thesis by DEEPAK KUMAR Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for
More informationStatus of Knowledge on Non-Binary LDPC Decoders
Status of Knowledge on Non-Binary LDPC Decoders Part I: From Binary to Non-Binary Belief Propagation Decoding D. Declercq 1 1 ETIS - UMR8051 ENSEA/Cergy-University/CNRS France IEEE SSC SCV Tutorial, Santa
More informationConstruction and Performance Evaluation of QC-LDPC Codes over Finite Fields
MEE10:83 Construction and Performance Evaluation of QC-LDPC Codes over Finite Fields Ihsan Ullah Sohail Noor This thesis is presented as part of the Degree of Master of Sciences in Electrical Engineering
More informationDistance Properties of Short LDPC Codes and Their Impact on the BP, ML and Near-ML Decoding Performance
Distance Properties of Short LDPC Codes and Their Impact on the BP, ML and Near-ML Decoding Performance Irina E. Bocharova 1,2, Boris D. Kudryashov 1, Vitaly Skachek 2, Yauhen Yakimenka 2 1 St. Petersburg
More informationRate-Compatible Low Density Parity Check Codes for Capacity-Approaching ARQ Schemes in Packet Data Communications
Rate-Compatible Low Density Parity Check Codes for Capacity-Approaching ARQ Schemes in Packet Data Communications Jing Li (Tiffany) Electrical Engineering Dept, Texas A&M University College Station, TX
More informationAnalysis of Sum-Product Decoding of Low-Density Parity-Check Codes Using a Gaussian Approximation
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 2, FEBRUARY 2001 657 Analysis of Sum-Product Decoding of Low-Density Parity-Check Codes Using a Gaussian Approximation Sae-Young Chung, Member, IEEE,
More informationSoft-Output Trellis Waveform Coding
Soft-Output Trellis Waveform Coding Tariq Haddad and Abbas Yongaçoḡlu School of Information Technology and Engineering, University of Ottawa Ottawa, Ontario, K1N 6N5, Canada Fax: +1 (613) 562 5175 thaddad@site.uottawa.ca
More informationThe Concept of Soft Channel Encoding and its Applications in Wireless Relay Networks
The Concept of Soft Channel Encoding and its Applications in Wireless Relay Networks Gerald Matz Institute of Telecommunications Vienna University of Technology institute of telecommunications Acknowledgements
More informationOptimizing Flash based Storage Systems
Optimizing Flash based Storage Systems 1 Lifetime Reliability Latency Throughput 2 Projects Reliability/Latency/Throughput: Error Correction Code (ECC) Parallelization and Incremental Redundancy Lifetime:
More information8 Basics of Hypothesis Testing
8 Basics of Hypothesis Testing 4 Problems Problem : The stochastic signal S is either 0 or E with equal probability, for a known value E > 0. Consider an observation X = x of the stochastic variable X
More informationTHIS paper is aimed at designing efficient decoding algorithms
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBER 1999 2333 Sort-and-Match Algorithm for Soft-Decision Decoding Ilya Dumer, Member, IEEE Abstract Let a q-ary linear (n; k)-code C be used
More informationDensity Evolution for Asymmetric Memoryless Channels: The Perfect Projection Condition and the Typicality of the Linear LDPC Code Ensemble
Density Evolution for Asymmetric Memoryless Channels: The Perfect Projection Condition and the Typicality of the Linear LDPC Code Ensemble Chih-Chun Wang, Sanjeev R. Kulkarni, H. Vincent Poor This work
More informationCodes on Graphs. Telecommunications Laboratory. Alex Balatsoukas-Stimming. Technical University of Crete. November 27th, 2008
Codes on Graphs Telecommunications Laboratory Alex Balatsoukas-Stimming Technical University of Crete November 27th, 2008 Telecommunications Laboratory (TUC) Codes on Graphs November 27th, 2008 1 / 31
More informationSoft-Output Decision-Feedback Equalization with a Priori Information
Soft-Output Decision-Feedback Equalization with a Priori Information Renato R. opes and John R. Barry School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta, Georgia 333-5
More informationTurbo Codes. Manjunatha. P. Professor Dept. of ECE. June 29, J.N.N. College of Engineering, Shimoga.
Turbo Codes Manjunatha. P manjup.jnnce@gmail.com Professor Dept. of ECE J.N.N. College of Engineering, Shimoga June 29, 2013 [1, 2, 3, 4, 5, 6] Note: Slides are prepared to use in class room purpose, may
More informationUTA EE5362 PhD Diagnosis Exam (Spring 2011)
EE5362 Spring 2 PhD Diagnosis Exam ID: UTA EE5362 PhD Diagnosis Exam (Spring 2) Instructions: Verify that your exam contains pages (including the cover shee. Some space is provided for you to show your
More informationUnequal Error Protection Turbo Codes
Unequal Error Protection Turbo Codes Diploma Thesis Neele von Deetzen Arbeitsbereich Nachrichtentechnik School of Engineering and Science Bremen, February 28th, 2005 Unequal Error Protection Turbo Codes
More informationCommunication by Regression: Sparse Superposition Codes
Communication by Regression: Sparse Superposition Codes Department of Statistics, Yale University Coauthors: Antony Joseph and Sanghee Cho February 21, 2013, University of Texas Channel Communication Set-up
More information