Trapping Set Enumerators for Repeat Multiple Accumulate Code Ensembles

Size: px
Start display at page:

Download "Trapping Set Enumerators for Repeat Multiple Accumulate Code Ensembles"

Transcription

1 Trapping Set Enumerators for Repeat Mutipe Accumuate Code Ensembes Christian Koer, Aexandre Grae i Amat, Jörg Kiewer, and Danie J. Costeo, Jr. Department of Eectrica Engineering, University of Notre Dame, Notre Dame, IN 46556, USA Emai: {dcoste, ckoer}@nd.edu Department of Eectronics, Institut TELECOM-TELECOM Bretagne, 98 Brest, France Emai: aexandre.grae@teecom-bretagne.eu Kipsch Schoo of Eectrica and Computer Engineering, New Mexico State University, Las Cruces, NM 88, USA Emai: jkiewer@nmsu.edu Abstract The seria concatenation of a repetition code with two or more accumuators has the advantage of a simpe encoder structure. Furthermore, the resuting ensembe is asymptoticay good and exhibits minimum distance growing ineary with bock ength. However, in practice these codes cannot be decoded by a maximum ikeihood decoder, and iterative decoding schemes must be empoyed. For ow-density parity-check codes, the notion of trapping sets has been introduced to estimate the performance of these codes under iterative message passing decoding. In this paper, we present a cosed form finite ength ensembe trapping set enumerator for repeat mutipe accumuate codes by creating a treis representation of trapping sets. We aso obtain the asymptotic expressions when the bock ength tends to infinity and evauate them numericay. I. INTRODUCTION Turbo-ike codes [], as we as LDPC codes [], can perform cose to the Shannon imit using suboptima iterative decoding schemes. However, these codes typicay exhibit an error foor at medium to high signa-to-noise ratios (SNRs. In [], the height of the error foor of LDPC codes was inked to so-caed near codewords. Later, in [4], this concept was generaized to trapping sets, substructures in the Tanner graph of a code that may cause the iterative message passing decoder to fai. For certain LDPC codes, sma trapping sets, rather than the minimum distance of the code, dominate the error foor performance. Asymptotic spectra of trapping sets in LDPC code ensembes were computed in [5] for reguar and irreguar LDPC codes and in [6] for protograph-based codes. It was shown that there exist LDPC codes that exhibit a minimum trapping set size growing ineary with bock ength, for certain types of trapping sets. In turbo-ike codes, the concatenation of simpe component codes through intereavers can ead to powerfu code constructions. The simpest exampes are repeat mutipe accumuate (RMA codes. These codes have a ow encoding compexity of O( and can be decoded using reativey few iterations. This work was party supported by NSF grants CCF5-5, CCF8-666, NASA grant NNX7AK56, and the Marie Curie Intra- European Feowship within the 6th European Community Framework Programme. Furthermore, it has been shown in [7] and [8] that the doube seriay concatenated repeat accumuate accumuate (RAA code of rate / or smaer is asymptoticay good and exhibits minimum distance growing ineary with bock ength. Like LDPC codes, turbo-ike codes are decoded in an iterative fashion. Commony, the component codes are decoded with a maximum a posteriori probabiity (MAP decoding agorithm and the extrinsic information provided by a component decoder functions as a priori information for another. For RMA codes, the turbo decoder can be represented as a message passing decoder [9], simiar to the beief propagation decoder, abeit with a different message passing schedue. Thus the turbo decoder may aso be susceptibe to trapping sets. To predict the error foor of a code one generay needs to have fu knowedge of the trapping sets that dominate the error foor, i.e., one needs to know their graph structure and enumerate their mutipicities, and to find the probabiity that the decoder gets trapped in a particuar set. The atter not ony depends on the graph structure of the trapping set but aso on the channe mode, the decoding agorithm, and the particuar decoder impementation that is used. In this paper we address the first part of the probem, the enumeration of subgraphs in an RAA code. We derive a cosed form trapping set enumerator (TSE for genera (a, b trapping sets, as defined in [4] and [5]. A genera (a, b trapping set for a given Tanner graph is a set of a variabe nodes that induces a subgraph containing b odd degree check nodes, which can be thought of as unsatisfied checks, and an arbitrary number of even degree check nodes. If there are ony a few unsatisfied check nodes and a sufficienty arge number of erroneous variabe nodes, the iterative message passing decoder may not be abe to correct the erroneous nodes. The TSE is the average number of (a, b trapping sets in the ensembe composed of a possibe intereaver reaizations. We aso derive asymptotic expressions for the TSE and anayze them. II. TRAPPING SET ENUMERATORS FOR REPEAT ACCUMULATE ACCUMULATE CODE ENSEMBLES The encoder structure of an RAA code C RAA is shown in Fig.. It is a seria concatenation of a repetition code

2 v k Layer Fig.. code. v k x k- x k x k- x k Bock diagram and factor graph representation of an accumuate Fig.. Bock diagram and factor graph (q = of an RAA encoder. The circes represent variabe nodes and the boxes check nodes, respectivey. C rep of rate R rep = /q and two identica rate-, memory-, accumuate codes C acc, = {, }, with generator poynomias g(d = /( + D, connected by intereavers π and π. For the repetition code C rep, we denote the binary input sequence of ength K by u = [u,..., u K ] and the binary output sequence of ength N by x rep = [x rep,...,xrep N ]. Likewise, for encoder C acc, v = [v,..., v N ] and x = [x,...,x N ] denote the input sequence and the codeword, respectivey, where both are of ength N. Note that v = π (x rep and v = π (x. The overa code rate is R = K/N. The factor graph of an RAA code is aso depicted in Fig. for a repetition factor of q =. The circes represent variabe nodes whie the boxes represent check nodes. The information symbos u correspond to the variabe nodes of the first ayer and their degree is equa to the repetition factor q. The variabe nodes of the second ayer correspond to the output of the first accumuator x, and the variabe nodes of the third ayer to the output of the second accumuator x, respectivey. The input bits of the accumuators are represented by the variabe nodes of the next higher ayer. Ony the variabe nodes in the third ayer are transmitted through the channe. This impies that, initiay, ony variabe nodes in the third ayer can be in error, whie the others have a neutra initia vaue. However, in the first decoding iteration, the variabe nodes in ayers and get vaues assigned based on the received sequence. If there are trapping sets containing variabe nodes in those ayers, erroneous vaues that were assigned during the first iteration may never be corrected and may cause the iterative decoder to fai. Therefore, we consider the whoe graph when enumerating for trapping sets. Let Āa,b CRAA be the ensembe-average TSE of an RAA code ensembe, i.e., the average number of (a, b trapping sets. With reference to Fig., we denote by w the number of information bits that participate in an (a, b trapping set of C RAA. Aso, et a i, ao, and b be the number of variabe nodes corresponding to input bits, the number of variabe nodes corresponding to code bits, and the number of unsatisfied checks, respectivey, of code C acc invoved in an (a, b trapping set of C RAA. To proceed, we must define the trapping set enumerators of the component codes A Crep w,qw and ACacc a i,ao,b, for = {, }. Since there are no check nodes in ayer of the factor graph, A Crep w,qw = ( K w is the input-output weight enumerator (IOWE of the repetition code, giving the number of codewords in C rep of input weight w and output weight qw, whie A Cacc a i,ao,b is the input-output trapping set enumerator (IOTSE of code C acc, denoting the number of trapping sets in C acc consisting of a i input variabe nodes (i.e., variabe nodes corresponding to information bits, a o output variabe nodes (i.e., variabe nodes corresponding to code bits, and b unsatisfied checks. With these definitions, the ensembe average TSE ĀCRAA a,b can be computed using the uniform intereaver concept [] as: Ā CRAA a,b = = w,a o,ao : w+ao +ao =a b,b : b +b =b w,a o,ao : w+ao +ao =a b,b : b +b =b A Crep w,qwa Cacc,bACacc qw,a o a o,ao (,b N qw ( N a o Ā CRAA w,a o,b,ao,b, ( where ĀCRAA w,a is caed the ensembe-average conditiona TSE. o,b,ao,b The evauation of ( requires the computation of A Cacc a i,ao,b, which wi be presented in the next section. The extension of ( to more than two seriay concatenated accumuators is straightforward. III. INPUT-OUTPUT TRAPPING SET ENUMERATOR FOR THE ACCUMULATE CODE In the foowing, we address the computation of the IOTSE A Cacc a i,ao,b of an accumuate code by considering an equivaent treis representation of trapping sets in the factor graph. In Fig., the bock diagram of an accumuate code and a singe section of the corresponding factor graph are depicted. From the figure we obtain the foowing reation: v k = x k + x k. ( Four different -tupes (v k, x k, x k are possibe, namey (,,, (,,, (,,, and (,,, such that the parity check is satisfied. Their factor graph representations are shown in Fig. (a, where back circes represent non-zero symbos and empty circes represent zero symbos. Now consider an (a, b trapping set of C RAA, and assume that (some of the variabe nodes of accumuate code C acc corresponding to (v k, x k, x k participate in the trapping set and cause an unsatisfied check. Again, ony four different configurations are possibe. They are depicted in Fig. (b, where back circes

3 (a (b Fig.. Factor graph representations of an accumuate code. Fig. 4. // // // // // // // // Extended Treis Section. correspond to erroneous symbos and a back box means that the check is unsatisfied. Note that a possibe trapping sets can be obtained by propery combining the eight factor graph sections of Fig.. For enumeration purposes, it is simper to refer to an equivaent treis representation. Assign to the variabe nodes and the check nodes in Fig. that participate in a trapping set (the back circes and boxes the vaue. Then the eight factor graph sections in Fig. can be convenienty represented by the equivaent treis section of Fig. 4. We ca this the extended treis section since it extends the standard treis section of an accumuate code to incude a possibe trapping sets. Each edge between two treis states is abeed with a binary -tupe s i /c/s o, where s i denotes the input symbo, s o denotes the output symbo, and c is if the check node in the corresponding equivaent factor graph representation is unsatisfied. The four abes in back correspond to the four configurations of Fig. (a and define the standard treis section of an accumuate code, whie the four abes in red correspond to the four configurations of Fig. (b. Now the IOTSE of the accumuate code can be computed from the treis representation of Fig. 4 by considering a treis consisting of N concatenated treis sections ike the one in Fig. 4 and enumerating a possibe paths. The IOTSE is given in cosed form in the foowing Theorem. Theorem. Let (a i, a o, b be a trapping set with a i information variabe nodes, a o code variabe nodes, and b unsatisfied checks. The input-output trapping set enumerator (IOTSE for the rate-, memory-, convoutiona encoder C acc with generator poynomia g(d = /( + D, terminated to the a-zero state at the end of the treis, and with input and output bock ength N, can be given in cosed form as: A a i,a o,b = ( ( N a o a o m m m n ( a o ( m N a o ( m m a n m n i b, + m ( where m and n must satisfy the constraints m ai b, m min{a o, N a o }, (4 n ai + b a o, n N a o m. Proof: Consider the extended treis section of the encoder g(d = /( + D in Fig. 4. Denote by n the number of ength-one error events // from the zero state to the zero state, caed type- error events, and by m the number of error events that eave the zero state, and remerge ater to the zero state, caed type- error events. Further, et a i, a o, and b be the number of information variabe nodes, the number of code variabe nodes, and the number of unsatisfied checks, respectivey, participating in the trapping set. Aso, et w t denote the tota input weight associated with the transitions (from state zero to state one and (from state one to state zero in the m type- error events. Ony type- error events are responsibe for the weight at the output of the accumuator. From [], we know that the number of permutations of m type- error events resuting in an output weight of a o is ( ( N a o a o. m m (Here, the transitions away from and back to the zero state are not ony caused by the input weight w t but aso by m w t unsatisfied check nodes. The m type- error events incude a o m transitions from the one state to the one state (, and the input weight associated with the transitions is w = a i n w t. (5 Moreover, the foowing equaity hods: w t = ai b + m. (6 Aso, due to termination, a i + b is even. From (5 and (6 it now foows that w = ai +b n m. This weight can be ordered in ( a o m different ways, which gives the n m third binomia coefficient in (. On the other hand, there are N a o m transitions from the zero state to the zero state with an associated input weight n. Therefore, we obtain the. The ast binomia coefficient in ( resuts term ( N a o m n from the ordering of the w t ones in the m transitions and, in ( m a i b ways. +m To summarize, the number of paths in the extended treis consisting of n type- error events and m type- error events is given by: ( ( N a o m a o m ( a o m n m ( N a o m n ( m a i b + m The resut for the encoder g(d = /( + D foows by summing over a possibe vaues of n and m. Coroary. For b =, the expression in ( reduces to the we-known IOWE for the rate-, memory-, accumuate code []..

4 IV. ASYMPTOTIC ENSEMBLE TRAPPING SET ENUMERATOR In order to determine the asymptotic spectra shape of the trapping sets associated with a particuar code ensembe, as the bock ength N tends to infinity, we define the normaized ogarithmic asymptotic TSE r C (, β of a code ensembe C as r C n (, β = imsup ĀC a,b N N, (7 where = a/n, β = b/n, and the supremum is taken over a intermediate variabes. We aso define the functions f Crep and f Cacc as the asymptotic behavior of the IOWE of a repeat code and the asymptotic behavior of the IOTSE of an accumuate code C acc, respectivey: n A Crep f Crep w,qw (ω = im N N (8 n A Cacc a i,ao,b f Cacc ( i, o, β = im, =,, N N where ω = w/k, i = ai /N, o = ao /N, and β = b /N. Using Stiring s approximation for binomia coefficients ( n n k e nh( n k, where H( is the binary entropy function with natura ogarithms, the functions in (8 can be written as: f Crep (ω = H(ω, (9 q and ( f Cacc ( i, o, β = sup ( o H µ µ,ν o + ( ( + o µ H o + ( o i µ H + β (ν + µ ( o µ + ( ( + ( o µ ν i H o µ + µ H β + µ 4µ ( where we have defined the normaized quantities µ = m /N and ν = n /N. Then, using (8- and ( in (7, the asymptotic TSE of a code ensembe C RAA can be written as: r CRAA (, β = sup =ω/q+ o +o β=+β C f rep (ω + f Cacc (ω, o, + + f Cacc ( o, o, β H(ω H( o, with the constraints = ω q + o + o and β = + β. V. NUMERICAL EVALUATION ( In this section, we present a numerica evauation of (. Foowing [6], in the curves for the asymptotic TSE that we present, we keep the ratio = β/ of unsatisfied check nodes to erroneous variabe nodes constant and compute r(, for varying vaues of. In Fig. 5, the unsatisfied checks in the RAA code ensembe are equay distributed between the midde and inner accumuator, i.e., = β = β/. For =, when no unsatisfied checks are present in the factor graph, the spectra shape r(, exhibits a zero stretch in the beginning and turns positive when the number of codewords with normaized weight starts to grow exponentiay in, r(, =. = β = β / =. =.5 =.. =. =. = Fig. 5. Asymptotic TSE for different vaues of and = β = β/. r(, x / β =. / β =. / β =. / β =.4 / β =.5 / β =.6 / β =.7 / β =.8 / β =.9 / β = =. = Fig. 6. Asymptotic TSE for different fractions /β. N with increasing. The presence of unsatisfied checks in the factor graph resuts in a positive initia sope, and we observe a quasi-inear increasing first section of the curve, unti there is a discontinuity in the sope. In the second section, the sope of the curve is simiar for a vaues of, and the curve shifts to the eft with increasing. Aso, as the fraction of unsatisfied checks increases, the sope in the first section aso increases. Because of the arge number of parameters invoved in taking the supremum in (, it is difficut to draw genera concusions about the trapping set structures that are most ikey to cause decoding faiures. The structure of a trapping set is greaty infuenced by the choice of these parameters. We are primariy concerned with trapping set configurations that ead to decoding errors and this requires ω >. The choice of the parameters and β determines how many unsatisfied checks are associated with the midde and inner accumuator, respectivey. For instance, in the extreme case of = β and β =, a the unsatisfied checks are associated with the midde accumuator, and there are no unsatisfied checks in the graph of the inner accumuator. In Fig. 6 we vary the ratio /β, the fraction of unsatisfied check nodes associated with the midde accumuator in the

5 r(, =. =. =. = β, β = q = 5 q = 4 q = Fig. 7. Asymptotic TSE of the RAA code ensembe for different repetition factors q. Fig. 8. r(, 8 x RAA RAAA RAAAA =.5 q=, = β, β = = Asymptotic TSE for the RAA, RAAA, and RAAAA code ensembes. RAA code ensembe. For arger /β, when reativey more unsatisfied check nodes are present in the midde accumuator, the sope in the first section is smaer and the infuence of varying /β on the sope becomes greater as /β gets coser to one. However, the infuence that varying has on the sope is much greater than the infuence of varying /β. Aso, for arger vaues of, the variance of the curves with /β is greater. In Figs. 7 and 8 we dispay the infuence of the repetition factor q and the number of concatenated accumuators, respectivey, on the shape of the asymptotic TSE. In both cases the greatest effect on the sope in the first section was observed when = β, i.e., when a unsatisfied check nodes are associated with the outermost accumuator. In the other extreme case, when a the unsatisfied check nodes are associated with the inner accumuator, the sope in the first section did not change. In Fig. 7, the reduction in sope in the first section caused by increasing the repetition factor q is ony margina and the curves amost ie on top of each other. However, increasing the number of seriay concatenated accumuators decreases the sope in the first section, as can be seen in Fig. 8. Finay, we note that increasing the repetition factor q or adding more accumuators increases the minimum distance of the code, and thus the transition from the quasiinear section of the asymptotic TSE to the more steepy increasing section takes pace at higher vaues of. VI. CONCLUSIONS We have presented a simpe cosed form method to enumerate genera (a, b trapping sets for RAA code ensembes. The trapping set enumerator is first obtained for finite bock engths N and its asymptotic expression is derived by etting N go to infinity. Simiar to [5] and [6], we observe that, when unsatisfied check nodes are present in the factor graph, the asymptotic TSE ies stricty above the asymptotic spectra shape for the case when no unsatisfied check nodes exist in the graph. Athough the RAA code ensembe is asymptoticay good and exhibits minimum distance growing ineary with bock ength, in contrast to reguar and some protographbased irreguar LDPC codes, there exists no region where the minimum trapping set size grows ineary with bock ength. It can, at best, grow ony subineary in the bock ength, since the asymptotic TSE of the RAA code ensembe is aways positive if unsatisfied check nodes are present in the graph. Whie the method presented in this paper aows us to enumerate a genera (a, b trapping sets, the infuence that these trapping sets have on the error foor must sti be evauated separatey. As noted earier, the probabiity that the decoder gets stuck in particuar types of trapping sets depends on the channe, the decoding agorithm, and the particuar decoder impementation. In future work we hope to evauate this probabiity for the turbo decoder and the beief propagation decoder, in order to obtain a reiabe estimate of the height of the error foor for RMA codes. REFERENCES [] C. Berrou, A. Gavieux, and P. Thitimajshima, Near Shannon imit error-correcting coding and decoding: Turbo-codes, in Proc. IEEE Int. Conf. Commun. (ICC, (Geneva, Switzerand, pp. 64 7, May 99. [] R. G. Gaager, Low-Density Parity-Check Codes. Cambridge, MA: MIT Press, 96. [] D. J. C. MacKay and M. Posto, Weaknesses of Marguis and Ramanujan-Marguis ow-density parity-check codes, Eectronic Notes in Theoretica Computer Science, vo. 74,. [4] T. J. Richardson, Error foors of LDPC codes, in Proc. 4st Annua Aerton Conf. on Commun., Contr., and Comp., pp ,. [5] O. Mienkovic, E. Sojanin, and P. Whiting, Asymptotic spectra of trapping sets in reguar and irreguar LDPC code ensembes, IEEE Trans. Inf. Theory, vo. 5, pp. 9 55, Jan. 7. [6] S. Abu-Surra, W. E. Ryan, and D. Divsaar, Ensembe trapping set enumerators for protograph-based LDPC codes, in Proc. 45th Annua Aerton Conf. on Commun., Contro, and Computing, (Monticeo, IL, pp., Sept. 7. [7] H. D. Pfister, On the Capacity of Finite State Channes and the Anaysis of Convoutiona Accumuate-m Codes. San Diego, CA: Ph.D. Thesis, University of Caifornia,. [8] J. Kiewer, K. S. Zigangirov, and D. J. Costeo, Jr., New resuts on the minimum distance of repeat mutipe accumuate codes, in Proc. 45th Annua Aerton Conf. on Commun., Contro, and Computing, (Monticeo, IL, Sept. 7. [9] F. Kschischang, B. Frey, and H.-A. Loeiger, Factor graphs and the sum-product agorithm, IEEE Trans. Inf. Theory, vo. 47, pp , Feb.. [] S. Benedetto, D. Divsaar, G. Montorsi, and F. Poara, Seria concatenation of intereaved codes: Performance anaysis, design, and iterative decoding, IEEE Trans. Inf. Theory, vo. 44, pp , May 998. [] D. Divsaar, H. Jin, and R. J. McEiece, Coding theorems for turboike codes, in Proc. 6th Annua Aerton Conf. on Commun., Contro, and Computing, (Monticeo, IL, pp., Sept. 998.

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

On the Achievable Extrinsic Information of Inner Decoders in Serial Concatenation

On the Achievable Extrinsic Information of Inner Decoders in Serial Concatenation On the Achievabe Extrinsic Information of Inner Decoders in Seria Concatenation Jörg Kiewer, Axe Huebner, and Danie J. Costeo, Jr. Department of Eectrica Engineering, University of Notre Dame, Notre Dame,

More information

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization Improved Min-Sum Decoding of LDPC Codes sing -Dimensiona Normaization Juntan Zhang and Marc Fossorier Department of Eectrica Engineering niversity of Hawaii at Manoa Honouu, HI 968 Emai: juntan, marc@spectra.eng.hawaii.edu

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Fast Blind Recognition of Channel Codes

Fast Blind Recognition of Channel Codes Fast Bind Recognition of Channe Codes Reza Moosavi and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the origina artice. 213 IEEE. Persona use of this materia is permitted.

More information

2146 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 6, JUNE 2013

2146 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 6, JUNE 2013 246 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 6, NO. 6, JUNE 203 On Achieving an Asymptoticay Error-Free Fixed-Point of Iterative Decoding for Perfect APrioriInformation Jörg Kiewer, Senior Member, IEEE,

More information

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with? Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine

More information

Error Floor Approximation for LDPC Codes in the AWGN Channel

Error Floor Approximation for LDPC Codes in the AWGN Channel submitted to IEEE TRANSACTIONS ON INFORMATION THEORY VERSION: JUNE 4, 2013 1 Error Foor Approximation for LDPC Codes in the AWGN Channe Brian K. Buter, Senior Member, IEEE, Pau H. Siege, Feow, IEEE arxiv:1202.2826v2

More information

Maximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem

Maximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem 1 Maximum ikeihood decoding of treis codes in fading channes with no receiver CSI is a poynomia-compexity probem Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department

More information

Forty-Seventh Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 30 - October 2, 2009

Forty-Seventh Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 30 - October 2, 2009 Forty-Seventh Annua Aerton Conference Aerton House, UIUC, Iinois, USA September 30 - October 2, 2009 On systematic design of universay capacity approaching rate-compatibe sequences of LDPC code ensembes

More information

Article An Efficient Method to Construct Parity-Check Matrices for Recursively Encoding Spatially Coupled LDPC Codes

Article An Efficient Method to Construct Parity-Check Matrices for Recursively Encoding Spatially Coupled LDPC Codes entropy Artice An Efficient Method to Construct Parity-Check Matrices for Recursivey Encoding Spatiay Couped LDPC Codes Zhongwei Si, Sijie Wang and Junyang Ma Key Laboratory of Universa Wireess Communications,

More information

Minimum Distance Bounds for Multiple-Serially Concatenated Code Ensembles

Minimum Distance Bounds for Multiple-Serially Concatenated Code Ensembles Minimum Distance Bounds for Multiple-Serially Concatenated Code Ensembles Christian Koller,Jörg Kliewer, Kamil S. Zigangirov,DanielJ.Costello,Jr. ISIT 28, Toronto, Canada, July 6 -, 28 Department of Electrical

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

Limited magnitude error detecting codes over Z q

Limited magnitude error detecting codes over Z q Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica

More information

BICM Performance Improvement via Online LLR Optimization

BICM Performance Improvement via Online LLR Optimization BICM Performance Improvement via Onine LLR Optimization Jinhong Wu, Mostafa E-Khamy, Jungwon Lee and Inyup Kang Samsung Mobie Soutions Lab San Diego, USA 92121 Emai: {Jinhong.W, Mostafa.E, Jungwon2.Lee,

More information

More Scattering: the Partial Wave Expansion

More Scattering: the Partial Wave Expansion More Scattering: the Partia Wave Expansion Michae Fower /7/8 Pane Waves and Partia Waves We are considering the soution to Schrödinger s equation for scattering of an incoming pane wave in the z-direction

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

Minimum Distance and Convergence Analysis of Hamming-Accumulate-Acccumulate Codes

Minimum Distance and Convergence Analysis of Hamming-Accumulate-Acccumulate Codes 1 Minimum Distance and Convergence Analysis of Hamming-Accumulate-Acccumulate Codes Alexandre Graell i Amat and Raphaël Le Bidan arxiv:0905.4545v1 [cs.it] 28 May 2009 Abstract In this letter we consider

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

ASummaryofGaussianProcesses Coryn A.L. Bailer-Jones

ASummaryofGaussianProcesses Coryn A.L. Bailer-Jones ASummaryofGaussianProcesses Coryn A.L. Baier-Jones Cavendish Laboratory University of Cambridge caj@mrao.cam.ac.uk Introduction A genera prediction probem can be posed as foows. We consider that the variabe

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7 6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17 Soution 7 Probem 1: Generating Random Variabes Each part of this probem requires impementation in MATLAB. For the

More information

arxiv: v1 [math.co] 17 Dec 2018

arxiv: v1 [math.co] 17 Dec 2018 On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic

More information

Nearly Optimal Constructions of PIR and Batch Codes

Nearly Optimal Constructions of PIR and Batch Codes arxiv:700706v [csit] 5 Jun 07 Neary Optima Constructions of PIR and Batch Codes Hia Asi Technion - Israe Institute of Technoogy Haifa 3000, Israe shea@cstechnionaci Abstract In this work we study two famiies

More information

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische

More information

Analysis of Emerson s Multiple Model Interpolation Estimation Algorithms: The MIMO Case

Analysis of Emerson s Multiple Model Interpolation Estimation Algorithms: The MIMO Case Technica Report PC-04-00 Anaysis of Emerson s Mutipe Mode Interpoation Estimation Agorithms: The MIMO Case João P. Hespanha Dae E. Seborg University of Caifornia, Santa Barbara February 0, 004 Anaysis

More information

Nearest Neighbor Decoding and Pilot-Aided Channel Estimation for Fading Channels

Nearest Neighbor Decoding and Pilot-Aided Channel Estimation for Fading Channels Nearest Neighbor Decoding and Piot-Aided Channe Estimation for Fading Channes A. Taufiq Asyhari, Tobias Koch and Abert Guién i Fàbregas arxiv:30.223v2 [cs.it] 8 Apr 204 Abstract We study the information

More information

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS TONY ALLEN, EMILY GEBHARDT, AND ADAM KLUBALL 3 ADVISOR: DR. TIFFANY KOLBA 4 Abstract. The phenomenon of noise-induced stabiization occurs

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

The Group Structure on a Smooth Tropical Cubic

The Group Structure on a Smooth Tropical Cubic The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

Utilization of multi-dimensional sou correlation in multi-dimensional sin check codes. Izhar, Mohd Azri Mohd; Zhou, Xiaobo; Author(s) Tad

Utilization of multi-dimensional sou correlation in multi-dimensional sin check codes. Izhar, Mohd Azri Mohd; Zhou, Xiaobo; Author(s) Tad JAIST Reposi https://dspace.j Tite Utiization of muti-dimensiona sou correation in muti-dimensiona sin check codes Izhar, Mohd Azri Mohd; Zhou, Xiaobo; Author(s) Tad Citation Teecommunication Systems,

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

The Binary Space Partitioning-Tree Process Supplementary Material

The Binary Space Partitioning-Tree Process Supplementary Material The inary Space Partitioning-Tree Process Suppementary Materia Xuhui Fan in Li Scott. Sisson Schoo of omputer Science Fudan University ibin@fudan.edu.cn Schoo of Mathematics and Statistics University of

More information

Partial permutation decoding for MacDonald codes

Partial permutation decoding for MacDonald codes Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics

More information

$, (2.1) n="# #. (2.2)

$, (2.1) n=# #. (2.2) Chapter. Eectrostatic II Notes: Most of the materia presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartoo, Chap... Mathematica Considerations.. The Fourier series and the Fourier

More information

Melodic contour estimation with B-spline models using a MDL criterion

Melodic contour estimation with B-spline models using a MDL criterion Meodic contour estimation with B-spine modes using a MDL criterion Damien Loive, Ney Barbot, Oivier Boeffard IRISA / University of Rennes 1 - ENSSAT 6 rue de Kerampont, B.P. 80518, F-305 Lannion Cedex

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

Lecture Note 3: Stationary Iterative Methods

Lecture Note 3: Stationary Iterative Methods MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or

More information

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm 1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete

More information

Linear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach

Linear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach Linear Network Coding for Mutipe Groupcast Sessions: An Interference Aignment Approach Abhik Kumar Das, Siddhartha Banerjee and Sriram Vishwanath Dept. of ECE, The University of Texas at Austin, TX, USA

More information

Manipulation in Financial Markets and the Implications for Debt Financing

Manipulation in Financial Markets and the Implications for Debt Financing Manipuation in Financia Markets and the Impications for Debt Financing Leonid Spesivtsev This paper studies the situation when the firm is in financia distress and faces bankruptcy or debt restructuring.

More information

An explicit Jordan Decomposition of Companion matrices

An explicit Jordan Decomposition of Companion matrices An expicit Jordan Decomposition of Companion matrices Fermín S V Bazán Departamento de Matemática CFM UFSC 88040-900 Forianópois SC E-mai: fermin@mtmufscbr S Gratton CERFACS 42 Av Gaspard Coriois 31057

More information

sensors Beamforming Based Full-Duplex for Millimeter-Wave Communication Article

sensors Beamforming Based Full-Duplex for Millimeter-Wave Communication Article sensors Artice Beamforming Based Fu-Dupex for Miimeter-Wave Communication Xiao Liu 1,2,3, Zhenyu Xiao 1,2,3, *, Lin Bai 1,2,3, Jinho Choi 4, Pengfei Xia 5 and Xiang-Gen Xia 6 1 Schoo of Eectronic and Information

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

Unconditional security of differential phase shift quantum key distribution

Unconditional security of differential phase shift quantum key distribution Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice

More information

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is

More information

Uniformly Reweighted Belief Propagation: A Factor Graph Approach

Uniformly Reweighted Belief Propagation: A Factor Graph Approach Uniformy Reweighted Beief Propagation: A Factor Graph Approach Henk Wymeersch Chamers University of Technoogy Gothenburg, Sweden henkw@chamers.se Federico Penna Poitecnico di Torino Torino, Itay federico.penna@poito.it

More information

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr

More information

Limits on Support Recovery with Probabilistic Models: An Information-Theoretic Framework

Limits on Support Recovery with Probabilistic Models: An Information-Theoretic Framework Limits on Support Recovery with Probabiistic Modes: An Information-Theoretic Framewor Jonathan Scarett and Voan Cevher arxiv:5.744v3 cs.it 3 Aug 6 Abstract The support recovery probem consists of determining

More information

A simple reliability block diagram method for safety integrity verification

A simple reliability block diagram method for safety integrity verification Reiabiity Engineering and System Safety 92 (2007) 1267 1273 www.esevier.com/ocate/ress A simpe reiabiity bock diagram method for safety integrity verification Haitao Guo, Xianhui Yang epartment of Automation,

More information

Delay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channels

Delay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channels Deay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channes Jian Tan, Yang Yang, Ness B. Shroff, Hesham E Gama Department of Eectrica and Computer Engineering The Ohio State University,

More information

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK Aexander Arkhipov, Michae Schne German Aerospace Center DLR) Institute of Communications and Navigation Oberpfaffenhofen, 8224 Wessing, Germany

More information

Quasi-Cyclic Asymptotically Regular LDPC Codes

Quasi-Cyclic Asymptotically Regular LDPC Codes 2010 IEEE Information Theory Workshop - ITW 2010 Dublin Quasi-Cyclic Asymptotically Regular LDPC Codes David G. M. Mitchell, Roxana Smarandache, Michael Lentmaier, and Daniel J. Costello, Jr. Dept. of

More information

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS ISEE 1 SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS By Yingying Fan and Jinchi Lv University of Southern Caifornia This Suppementary Materia

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 2, FEBRUARY

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 2, FEBRUARY IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 2, FEBRUARY 206 857 Optima Energy and Data Routing in Networks With Energy Cooperation Berk Gurakan, Student Member, IEEE, OmurOze,Member, IEEE,

More information

Transmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance

Transmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance Transmit ntenna Seection for Physica-Layer Networ Coding ased on Eucidean Distance 1 arxiv:179.445v1 [cs.it] 13 Sep 17 Vaibhav Kumar, arry Cardiff, and Mar F. Fanagan Schoo of Eectrica and Eectronic Engineering,

More information

The Streaming-DMT of Fading Channels

The Streaming-DMT of Fading Channels The Streaming-DMT of Fading Channes Ashish Khisti Member, IEEE, and Star C. Draper Member, IEEE arxiv:30.80v3 cs.it] Aug 04 Abstract We consider the sequentia transmission of a stream of messages over

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

Tracking Control of Multiple Mobile Robots

Tracking Control of Multiple Mobile Robots Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart

More information

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems Componentwise Determination of the Interva Hu Soution for Linear Interva Parameter Systems L. V. Koev Dept. of Theoretica Eectrotechnics, Facuty of Automatics, Technica University of Sofia, 1000 Sofia,

More information

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR 1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,

More information

Asymptotic Gains of Generalized Selection Combining

Asymptotic Gains of Generalized Selection Combining Asymptotic Gains of Generaized Seection Combining Yao a Z Wang S Pasupathy Dept of ECpE Dept of ECE Dept of ECE Iowa State Univ Iowa State Univ Univ of Toronto, Emai: mayao@iastateedu Emai: zhengdao@iastateedu

More information

arxiv: v2 [cond-mat.stat-mech] 14 Nov 2008

arxiv: v2 [cond-mat.stat-mech] 14 Nov 2008 Random Booean Networks Barbara Drosse Institute of Condensed Matter Physics, Darmstadt University of Technoogy, Hochschustraße 6, 64289 Darmstadt, Germany (Dated: June 27) arxiv:76.335v2 [cond-mat.stat-mech]

More information

Reliability: Theory & Applications No.3, September 2006

Reliability: Theory & Applications No.3, September 2006 REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate

More information

On Non-Optimally Expanding Sets in Grassmann Graphs

On Non-Optimally Expanding Sets in Grassmann Graphs ectronic Cooquium on Computationa Compexity, Report No. 94 (07) On Non-Optimay xpanding Sets in Grassmann Graphs Irit Dinur Subhash Khot Guy Kinder Dor Minzer Mui Safra Abstract The paper investigates

More information

School of Electrical Engineering, University of Bath, Claverton Down, Bath BA2 7AY

School of Electrical Engineering, University of Bath, Claverton Down, Bath BA2 7AY The ogic of Booean matrices C. R. Edwards Schoo of Eectrica Engineering, Universit of Bath, Caverton Down, Bath BA2 7AY A Booean matrix agebra is described which enabes man ogica functions to be manipuated

More information

VI.G Exact free energy of the Square Lattice Ising model

VI.G Exact free energy of the Square Lattice Ising model VI.G Exact free energy of the Square Lattice Ising mode As indicated in eq.(vi.35), the Ising partition function is reated to a sum S, over coections of paths on the attice. The aowed graphs for a square

More information

A Branch and Cut Algorithm to Design. LDPC Codes without Small Cycles in. Communication Systems

A Branch and Cut Algorithm to Design. LDPC Codes without Small Cycles in. Communication Systems A Branch and Cut Agorithm to Design LDPC Codes without Sma Cyces in Communication Systems arxiv:1709.09936v1 [cs.it] 28 Sep 2017 Banu Kabakuak 1, Z. Caner Taşkın 1, and Ai Emre Pusane 2 1 Department of

More information

STA 216 Project: Spline Approach to Discrete Survival Analysis

STA 216 Project: Spline Approach to Discrete Survival Analysis : Spine Approach to Discrete Surviva Anaysis November 4, 005 1 Introduction Athough continuous surviva anaysis differs much from the discrete surviva anaysis, there is certain ink between the two modeing

More information

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance Send Orders for Reprints to reprints@benthamscience.ae 340 The Open Cybernetics & Systemics Journa, 015, 9, 340-344 Open Access Research of Data Fusion Method of Muti-Sensor Based on Correation Coefficient

More information

Nonlinear Analysis of Spatial Trusses

Nonlinear Analysis of Spatial Trusses Noninear Anaysis of Spatia Trusses João Barrigó October 14 Abstract The present work addresses the noninear behavior of space trusses A formuation for geometrica noninear anaysis is presented, which incudes

More information

A GENERAL METHOD FOR EVALUATING OUTAGE PROBABILITIES USING PADÉ APPROXIMATIONS

A GENERAL METHOD FOR EVALUATING OUTAGE PROBABILITIES USING PADÉ APPROXIMATIONS A GENERAL METHOD FOR EVALUATING OUTAGE PROBABILITIES USING PADÉ APPROXIMATIONS Jack W. Stokes, Microsoft Corporation One Microsoft Way, Redmond, WA 9852, jstokes@microsoft.com James A. Ritcey, University

More information

V.B The Cluster Expansion

V.B The Cluster Expansion V.B The Custer Expansion For short range interactions, speciay with a hard core, it is much better to repace the expansion parameter V( q ) by f( q ) = exp ( βv( q )), which is obtained by summing over

More information

Chemical Kinetics Part 2

Chemical Kinetics Part 2 Integrated Rate Laws Chemica Kinetics Part 2 The rate aw we have discussed thus far is the differentia rate aw. Let us consider the very simpe reaction: a A à products The differentia rate reates the rate

More information

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems Source and Reay Matrices Optimization for Mutiuser Muti-Hop MIMO Reay Systems Yue Rong Department of Eectrica and Computer Engineering, Curtin University, Bentey, WA 6102, Austraia Abstract In this paper,

More information

Centralized Coded Caching of Correlated Contents

Centralized Coded Caching of Correlated Contents Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1

More information

Multi-server queueing systems with multiple priority classes

Multi-server queueing systems with multiple priority classes Muti-server queueing systems with mutipe priority casses Mor Harcho-Bater Taayui Osogami Aan Scheer-Wof Adam Wierman Abstract We present the first near-exact anaysis of an M/PH/ queue with m > 2 preemptive-resume

More information

ORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION

ORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION J. Korean Math. Soc. 46 2009, No. 2, pp. 281 294 ORHOGONAL MLI-WAVELES FROM MARIX FACORIZAION Hongying Xiao Abstract. Accuracy of the scaing function is very crucia in waveet theory, or correspondingy,

More information

On Efficient Decoding of Polar Codes with Large Kernels

On Efficient Decoding of Polar Codes with Large Kernels On Efficient Decoding of Poar Codes with Large Kernes Sarit Buzago, Arman Fazei, Pau H. Siege, Veeresh Taranai, andaexander Vardy University of Caifornia San Diego, La Joa, CA 92093, USA {sbuzago, afazeic,

More information

Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1

Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1 Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rues 1 R.J. Marks II, S. Oh, P. Arabshahi Λ, T.P. Caude, J.J. Choi, B.G. Song Λ Λ Dept. of Eectrica Engineering Boeing Computer Services University

More information

Converting Z-number to Fuzzy Number using. Fuzzy Expected Value

Converting Z-number to Fuzzy Number using. Fuzzy Expected Value ISSN 1746-7659, Engand, UK Journa of Information and Computing Science Vo. 1, No. 4, 017, pp.91-303 Converting Z-number to Fuzzy Number using Fuzzy Expected Vaue Mahdieh Akhbari * Department of Industria

More information

V.B The Cluster Expansion

V.B The Cluster Expansion V.B The Custer Expansion For short range interactions, speciay with a hard core, it is much better to repace the expansion parameter V( q ) by f(q ) = exp ( βv( q )) 1, which is obtained by summing over

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

Multiplexing Two Information Sources over Fading. Channels: A Cross-layer Design Perspective

Multiplexing Two Information Sources over Fading. Channels: A Cross-layer Design Perspective TO APPEAR IN EURASIP SIGNAL PROCESSING JOURNAL, 4TH QUARTER 2005 Mutipexing Two Information Sources over Fading Channes: A Cross-ayer Design Perspective Zhiyu Yang and Lang Tong Abstract We consider the

More information

Control with Minimum Communication Cost per Symbol

Control with Minimum Communication Cost per Symbol Contro with Minimum Communication Cost per ymbo Justin Pearson, João P. Hespanha, Danie Liberzon Abstract We address the probem of stabiizing a continuous-time inear time-invariant process under communication

More information

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization Scaabe Spectrum ocation for Large Networks ased on Sparse Optimization innan Zhuang Modem R&D Lab Samsung Semiconductor, Inc. San Diego, C Dongning Guo, Ermin Wei, and Michae L. Honig Department of Eectrica

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

School of Electrical Engineering, University of Bath, Claverton Down, Bath BA2 7AY

School of Electrical Engineering, University of Bath, Claverton Down, Bath BA2 7AY The ogic of Booean matrices C. R. Edwards Schoo of Eectrica Engineering, Universit of Bath, Caverton Down, Bath BA2 7AY A Booean matrix agebra is described which enabes man ogica functions to be manipuated

More information

Delay Analysis of Maximum Weight Scheduling in Wireless Ad Hoc Networks

Delay Analysis of Maximum Weight Scheduling in Wireless Ad Hoc Networks 1 Deay Anaysis o Maximum Weight Scheduing in Wireess Ad Hoc Networks ong Bao e, Krishna Jagannathan, and Eytan Modiano Abstract This paper studies deay properties o the weknown maximum weight scheduing

More information

Haar Decomposition and Reconstruction Algorithms

Haar Decomposition and Reconstruction Algorithms Jim Lambers MAT 773 Fa Semester 018-19 Lecture 15 and 16 Notes These notes correspond to Sections 4.3 and 4.4 in the text. Haar Decomposition and Reconstruction Agorithms Decomposition Suppose we approximate

More information

An approximate method for solving the inverse scattering problem with fixed-energy data

An approximate method for solving the inverse scattering problem with fixed-energy data J. Inv. I-Posed Probems, Vo. 7, No. 6, pp. 561 571 (1999) c VSP 1999 An approximate method for soving the inverse scattering probem with fixed-energy data A. G. Ramm and W. Scheid Received May 12, 1999

More information

SEMINAR 2. PENDULUMS. V = mgl cos θ. (2) L = T V = 1 2 ml2 θ2 + mgl cos θ, (3) d dt ml2 θ2 + mgl sin θ = 0, (4) θ + g l

SEMINAR 2. PENDULUMS. V = mgl cos θ. (2) L = T V = 1 2 ml2 θ2 + mgl cos θ, (3) d dt ml2 θ2 + mgl sin θ = 0, (4) θ + g l Probem 7. Simpe Penduum SEMINAR. PENDULUMS A simpe penduum means a mass m suspended by a string weightess rigid rod of ength so that it can swing in a pane. The y-axis is directed down, x-axis is directed

More information

Coded Caching for Files with Distinct File Sizes

Coded Caching for Files with Distinct File Sizes Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering

More information