Trapping Set Enumerators for Repeat Multiple Accumulate Code Ensembles
|
|
- Joella Shannon Wood
- 6 years ago
- Views:
Transcription
1 Trapping Set Enumerators for Repeat Mutipe Accumuate Code Ensembes Christian Koer, Aexandre Grae i Amat, Jörg Kiewer, and Danie J. Costeo, Jr. Department of Eectrica Engineering, University of Notre Dame, Notre Dame, IN 46556, USA Emai: {dcoste, ckoer}@nd.edu Department of Eectronics, Institut TELECOM-TELECOM Bretagne, 98 Brest, France Emai: aexandre.grae@teecom-bretagne.eu Kipsch Schoo of Eectrica and Computer Engineering, New Mexico State University, Las Cruces, NM 88, USA Emai: jkiewer@nmsu.edu Abstract The seria concatenation of a repetition code with two or more accumuators has the advantage of a simpe encoder structure. Furthermore, the resuting ensembe is asymptoticay good and exhibits minimum distance growing ineary with bock ength. However, in practice these codes cannot be decoded by a maximum ikeihood decoder, and iterative decoding schemes must be empoyed. For ow-density parity-check codes, the notion of trapping sets has been introduced to estimate the performance of these codes under iterative message passing decoding. In this paper, we present a cosed form finite ength ensembe trapping set enumerator for repeat mutipe accumuate codes by creating a treis representation of trapping sets. We aso obtain the asymptotic expressions when the bock ength tends to infinity and evauate them numericay. I. INTRODUCTION Turbo-ike codes [], as we as LDPC codes [], can perform cose to the Shannon imit using suboptima iterative decoding schemes. However, these codes typicay exhibit an error foor at medium to high signa-to-noise ratios (SNRs. In [], the height of the error foor of LDPC codes was inked to so-caed near codewords. Later, in [4], this concept was generaized to trapping sets, substructures in the Tanner graph of a code that may cause the iterative message passing decoder to fai. For certain LDPC codes, sma trapping sets, rather than the minimum distance of the code, dominate the error foor performance. Asymptotic spectra of trapping sets in LDPC code ensembes were computed in [5] for reguar and irreguar LDPC codes and in [6] for protograph-based codes. It was shown that there exist LDPC codes that exhibit a minimum trapping set size growing ineary with bock ength, for certain types of trapping sets. In turbo-ike codes, the concatenation of simpe component codes through intereavers can ead to powerfu code constructions. The simpest exampes are repeat mutipe accumuate (RMA codes. These codes have a ow encoding compexity of O( and can be decoded using reativey few iterations. This work was party supported by NSF grants CCF5-5, CCF8-666, NASA grant NNX7AK56, and the Marie Curie Intra- European Feowship within the 6th European Community Framework Programme. Furthermore, it has been shown in [7] and [8] that the doube seriay concatenated repeat accumuate accumuate (RAA code of rate / or smaer is asymptoticay good and exhibits minimum distance growing ineary with bock ength. Like LDPC codes, turbo-ike codes are decoded in an iterative fashion. Commony, the component codes are decoded with a maximum a posteriori probabiity (MAP decoding agorithm and the extrinsic information provided by a component decoder functions as a priori information for another. For RMA codes, the turbo decoder can be represented as a message passing decoder [9], simiar to the beief propagation decoder, abeit with a different message passing schedue. Thus the turbo decoder may aso be susceptibe to trapping sets. To predict the error foor of a code one generay needs to have fu knowedge of the trapping sets that dominate the error foor, i.e., one needs to know their graph structure and enumerate their mutipicities, and to find the probabiity that the decoder gets trapped in a particuar set. The atter not ony depends on the graph structure of the trapping set but aso on the channe mode, the decoding agorithm, and the particuar decoder impementation that is used. In this paper we address the first part of the probem, the enumeration of subgraphs in an RAA code. We derive a cosed form trapping set enumerator (TSE for genera (a, b trapping sets, as defined in [4] and [5]. A genera (a, b trapping set for a given Tanner graph is a set of a variabe nodes that induces a subgraph containing b odd degree check nodes, which can be thought of as unsatisfied checks, and an arbitrary number of even degree check nodes. If there are ony a few unsatisfied check nodes and a sufficienty arge number of erroneous variabe nodes, the iterative message passing decoder may not be abe to correct the erroneous nodes. The TSE is the average number of (a, b trapping sets in the ensembe composed of a possibe intereaver reaizations. We aso derive asymptotic expressions for the TSE and anayze them. II. TRAPPING SET ENUMERATORS FOR REPEAT ACCUMULATE ACCUMULATE CODE ENSEMBLES The encoder structure of an RAA code C RAA is shown in Fig.. It is a seria concatenation of a repetition code
2 v k Layer Fig.. code. v k x k- x k x k- x k Bock diagram and factor graph representation of an accumuate Fig.. Bock diagram and factor graph (q = of an RAA encoder. The circes represent variabe nodes and the boxes check nodes, respectivey. C rep of rate R rep = /q and two identica rate-, memory-, accumuate codes C acc, = {, }, with generator poynomias g(d = /( + D, connected by intereavers π and π. For the repetition code C rep, we denote the binary input sequence of ength K by u = [u,..., u K ] and the binary output sequence of ength N by x rep = [x rep,...,xrep N ]. Likewise, for encoder C acc, v = [v,..., v N ] and x = [x,...,x N ] denote the input sequence and the codeword, respectivey, where both are of ength N. Note that v = π (x rep and v = π (x. The overa code rate is R = K/N. The factor graph of an RAA code is aso depicted in Fig. for a repetition factor of q =. The circes represent variabe nodes whie the boxes represent check nodes. The information symbos u correspond to the variabe nodes of the first ayer and their degree is equa to the repetition factor q. The variabe nodes of the second ayer correspond to the output of the first accumuator x, and the variabe nodes of the third ayer to the output of the second accumuator x, respectivey. The input bits of the accumuators are represented by the variabe nodes of the next higher ayer. Ony the variabe nodes in the third ayer are transmitted through the channe. This impies that, initiay, ony variabe nodes in the third ayer can be in error, whie the others have a neutra initia vaue. However, in the first decoding iteration, the variabe nodes in ayers and get vaues assigned based on the received sequence. If there are trapping sets containing variabe nodes in those ayers, erroneous vaues that were assigned during the first iteration may never be corrected and may cause the iterative decoder to fai. Therefore, we consider the whoe graph when enumerating for trapping sets. Let Āa,b CRAA be the ensembe-average TSE of an RAA code ensembe, i.e., the average number of (a, b trapping sets. With reference to Fig., we denote by w the number of information bits that participate in an (a, b trapping set of C RAA. Aso, et a i, ao, and b be the number of variabe nodes corresponding to input bits, the number of variabe nodes corresponding to code bits, and the number of unsatisfied checks, respectivey, of code C acc invoved in an (a, b trapping set of C RAA. To proceed, we must define the trapping set enumerators of the component codes A Crep w,qw and ACacc a i,ao,b, for = {, }. Since there are no check nodes in ayer of the factor graph, A Crep w,qw = ( K w is the input-output weight enumerator (IOWE of the repetition code, giving the number of codewords in C rep of input weight w and output weight qw, whie A Cacc a i,ao,b is the input-output trapping set enumerator (IOTSE of code C acc, denoting the number of trapping sets in C acc consisting of a i input variabe nodes (i.e., variabe nodes corresponding to information bits, a o output variabe nodes (i.e., variabe nodes corresponding to code bits, and b unsatisfied checks. With these definitions, the ensembe average TSE ĀCRAA a,b can be computed using the uniform intereaver concept [] as: Ā CRAA a,b = = w,a o,ao : w+ao +ao =a b,b : b +b =b w,a o,ao : w+ao +ao =a b,b : b +b =b A Crep w,qwa Cacc,bACacc qw,a o a o,ao (,b N qw ( N a o Ā CRAA w,a o,b,ao,b, ( where ĀCRAA w,a is caed the ensembe-average conditiona TSE. o,b,ao,b The evauation of ( requires the computation of A Cacc a i,ao,b, which wi be presented in the next section. The extension of ( to more than two seriay concatenated accumuators is straightforward. III. INPUT-OUTPUT TRAPPING SET ENUMERATOR FOR THE ACCUMULATE CODE In the foowing, we address the computation of the IOTSE A Cacc a i,ao,b of an accumuate code by considering an equivaent treis representation of trapping sets in the factor graph. In Fig., the bock diagram of an accumuate code and a singe section of the corresponding factor graph are depicted. From the figure we obtain the foowing reation: v k = x k + x k. ( Four different -tupes (v k, x k, x k are possibe, namey (,,, (,,, (,,, and (,,, such that the parity check is satisfied. Their factor graph representations are shown in Fig. (a, where back circes represent non-zero symbos and empty circes represent zero symbos. Now consider an (a, b trapping set of C RAA, and assume that (some of the variabe nodes of accumuate code C acc corresponding to (v k, x k, x k participate in the trapping set and cause an unsatisfied check. Again, ony four different configurations are possibe. They are depicted in Fig. (b, where back circes
3 (a (b Fig.. Factor graph representations of an accumuate code. Fig. 4. // // // // // // // // Extended Treis Section. correspond to erroneous symbos and a back box means that the check is unsatisfied. Note that a possibe trapping sets can be obtained by propery combining the eight factor graph sections of Fig.. For enumeration purposes, it is simper to refer to an equivaent treis representation. Assign to the variabe nodes and the check nodes in Fig. that participate in a trapping set (the back circes and boxes the vaue. Then the eight factor graph sections in Fig. can be convenienty represented by the equivaent treis section of Fig. 4. We ca this the extended treis section since it extends the standard treis section of an accumuate code to incude a possibe trapping sets. Each edge between two treis states is abeed with a binary -tupe s i /c/s o, where s i denotes the input symbo, s o denotes the output symbo, and c is if the check node in the corresponding equivaent factor graph representation is unsatisfied. The four abes in back correspond to the four configurations of Fig. (a and define the standard treis section of an accumuate code, whie the four abes in red correspond to the four configurations of Fig. (b. Now the IOTSE of the accumuate code can be computed from the treis representation of Fig. 4 by considering a treis consisting of N concatenated treis sections ike the one in Fig. 4 and enumerating a possibe paths. The IOTSE is given in cosed form in the foowing Theorem. Theorem. Let (a i, a o, b be a trapping set with a i information variabe nodes, a o code variabe nodes, and b unsatisfied checks. The input-output trapping set enumerator (IOTSE for the rate-, memory-, convoutiona encoder C acc with generator poynomia g(d = /( + D, terminated to the a-zero state at the end of the treis, and with input and output bock ength N, can be given in cosed form as: A a i,a o,b = ( ( N a o a o m m m n ( a o ( m N a o ( m m a n m n i b, + m ( where m and n must satisfy the constraints m ai b, m min{a o, N a o }, (4 n ai + b a o, n N a o m. Proof: Consider the extended treis section of the encoder g(d = /( + D in Fig. 4. Denote by n the number of ength-one error events // from the zero state to the zero state, caed type- error events, and by m the number of error events that eave the zero state, and remerge ater to the zero state, caed type- error events. Further, et a i, a o, and b be the number of information variabe nodes, the number of code variabe nodes, and the number of unsatisfied checks, respectivey, participating in the trapping set. Aso, et w t denote the tota input weight associated with the transitions (from state zero to state one and (from state one to state zero in the m type- error events. Ony type- error events are responsibe for the weight at the output of the accumuator. From [], we know that the number of permutations of m type- error events resuting in an output weight of a o is ( ( N a o a o. m m (Here, the transitions away from and back to the zero state are not ony caused by the input weight w t but aso by m w t unsatisfied check nodes. The m type- error events incude a o m transitions from the one state to the one state (, and the input weight associated with the transitions is w = a i n w t. (5 Moreover, the foowing equaity hods: w t = ai b + m. (6 Aso, due to termination, a i + b is even. From (5 and (6 it now foows that w = ai +b n m. This weight can be ordered in ( a o m different ways, which gives the n m third binomia coefficient in (. On the other hand, there are N a o m transitions from the zero state to the zero state with an associated input weight n. Therefore, we obtain the. The ast binomia coefficient in ( resuts term ( N a o m n from the ordering of the w t ones in the m transitions and, in ( m a i b ways. +m To summarize, the number of paths in the extended treis consisting of n type- error events and m type- error events is given by: ( ( N a o m a o m ( a o m n m ( N a o m n ( m a i b + m The resut for the encoder g(d = /( + D foows by summing over a possibe vaues of n and m. Coroary. For b =, the expression in ( reduces to the we-known IOWE for the rate-, memory-, accumuate code []..
4 IV. ASYMPTOTIC ENSEMBLE TRAPPING SET ENUMERATOR In order to determine the asymptotic spectra shape of the trapping sets associated with a particuar code ensembe, as the bock ength N tends to infinity, we define the normaized ogarithmic asymptotic TSE r C (, β of a code ensembe C as r C n (, β = imsup ĀC a,b N N, (7 where = a/n, β = b/n, and the supremum is taken over a intermediate variabes. We aso define the functions f Crep and f Cacc as the asymptotic behavior of the IOWE of a repeat code and the asymptotic behavior of the IOTSE of an accumuate code C acc, respectivey: n A Crep f Crep w,qw (ω = im N N (8 n A Cacc a i,ao,b f Cacc ( i, o, β = im, =,, N N where ω = w/k, i = ai /N, o = ao /N, and β = b /N. Using Stiring s approximation for binomia coefficients ( n n k e nh( n k, where H( is the binary entropy function with natura ogarithms, the functions in (8 can be written as: f Crep (ω = H(ω, (9 q and ( f Cacc ( i, o, β = sup ( o H µ µ,ν o + ( ( + o µ H o + ( o i µ H + β (ν + µ ( o µ + ( ( + ( o µ ν i H o µ + µ H β + µ 4µ ( where we have defined the normaized quantities µ = m /N and ν = n /N. Then, using (8- and ( in (7, the asymptotic TSE of a code ensembe C RAA can be written as: r CRAA (, β = sup =ω/q+ o +o β=+β C f rep (ω + f Cacc (ω, o, + + f Cacc ( o, o, β H(ω H( o, with the constraints = ω q + o + o and β = + β. V. NUMERICAL EVALUATION ( In this section, we present a numerica evauation of (. Foowing [6], in the curves for the asymptotic TSE that we present, we keep the ratio = β/ of unsatisfied check nodes to erroneous variabe nodes constant and compute r(, for varying vaues of. In Fig. 5, the unsatisfied checks in the RAA code ensembe are equay distributed between the midde and inner accumuator, i.e., = β = β/. For =, when no unsatisfied checks are present in the factor graph, the spectra shape r(, exhibits a zero stretch in the beginning and turns positive when the number of codewords with normaized weight starts to grow exponentiay in, r(, =. = β = β / =. =.5 =.. =. =. = Fig. 5. Asymptotic TSE for different vaues of and = β = β/. r(, x / β =. / β =. / β =. / β =.4 / β =.5 / β =.6 / β =.7 / β =.8 / β =.9 / β = =. = Fig. 6. Asymptotic TSE for different fractions /β. N with increasing. The presence of unsatisfied checks in the factor graph resuts in a positive initia sope, and we observe a quasi-inear increasing first section of the curve, unti there is a discontinuity in the sope. In the second section, the sope of the curve is simiar for a vaues of, and the curve shifts to the eft with increasing. Aso, as the fraction of unsatisfied checks increases, the sope in the first section aso increases. Because of the arge number of parameters invoved in taking the supremum in (, it is difficut to draw genera concusions about the trapping set structures that are most ikey to cause decoding faiures. The structure of a trapping set is greaty infuenced by the choice of these parameters. We are primariy concerned with trapping set configurations that ead to decoding errors and this requires ω >. The choice of the parameters and β determines how many unsatisfied checks are associated with the midde and inner accumuator, respectivey. For instance, in the extreme case of = β and β =, a the unsatisfied checks are associated with the midde accumuator, and there are no unsatisfied checks in the graph of the inner accumuator. In Fig. 6 we vary the ratio /β, the fraction of unsatisfied check nodes associated with the midde accumuator in the
5 r(, =. =. =. = β, β = q = 5 q = 4 q = Fig. 7. Asymptotic TSE of the RAA code ensembe for different repetition factors q. Fig. 8. r(, 8 x RAA RAAA RAAAA =.5 q=, = β, β = = Asymptotic TSE for the RAA, RAAA, and RAAAA code ensembes. RAA code ensembe. For arger /β, when reativey more unsatisfied check nodes are present in the midde accumuator, the sope in the first section is smaer and the infuence of varying /β on the sope becomes greater as /β gets coser to one. However, the infuence that varying has on the sope is much greater than the infuence of varying /β. Aso, for arger vaues of, the variance of the curves with /β is greater. In Figs. 7 and 8 we dispay the infuence of the repetition factor q and the number of concatenated accumuators, respectivey, on the shape of the asymptotic TSE. In both cases the greatest effect on the sope in the first section was observed when = β, i.e., when a unsatisfied check nodes are associated with the outermost accumuator. In the other extreme case, when a the unsatisfied check nodes are associated with the inner accumuator, the sope in the first section did not change. In Fig. 7, the reduction in sope in the first section caused by increasing the repetition factor q is ony margina and the curves amost ie on top of each other. However, increasing the number of seriay concatenated accumuators decreases the sope in the first section, as can be seen in Fig. 8. Finay, we note that increasing the repetition factor q or adding more accumuators increases the minimum distance of the code, and thus the transition from the quasiinear section of the asymptotic TSE to the more steepy increasing section takes pace at higher vaues of. VI. CONCLUSIONS We have presented a simpe cosed form method to enumerate genera (a, b trapping sets for RAA code ensembes. The trapping set enumerator is first obtained for finite bock engths N and its asymptotic expression is derived by etting N go to infinity. Simiar to [5] and [6], we observe that, when unsatisfied check nodes are present in the factor graph, the asymptotic TSE ies stricty above the asymptotic spectra shape for the case when no unsatisfied check nodes exist in the graph. Athough the RAA code ensembe is asymptoticay good and exhibits minimum distance growing ineary with bock ength, in contrast to reguar and some protographbased irreguar LDPC codes, there exists no region where the minimum trapping set size grows ineary with bock ength. It can, at best, grow ony subineary in the bock ength, since the asymptotic TSE of the RAA code ensembe is aways positive if unsatisfied check nodes are present in the graph. Whie the method presented in this paper aows us to enumerate a genera (a, b trapping sets, the infuence that these trapping sets have on the error foor must sti be evauated separatey. As noted earier, the probabiity that the decoder gets stuck in particuar types of trapping sets depends on the channe, the decoding agorithm, and the particuar decoder impementation. In future work we hope to evauate this probabiity for the turbo decoder and the beief propagation decoder, in order to obtain a reiabe estimate of the height of the error foor for RMA codes. REFERENCES [] C. Berrou, A. Gavieux, and P. Thitimajshima, Near Shannon imit error-correcting coding and decoding: Turbo-codes, in Proc. IEEE Int. Conf. Commun. (ICC, (Geneva, Switzerand, pp. 64 7, May 99. [] R. G. Gaager, Low-Density Parity-Check Codes. Cambridge, MA: MIT Press, 96. [] D. J. C. MacKay and M. Posto, Weaknesses of Marguis and Ramanujan-Marguis ow-density parity-check codes, Eectronic Notes in Theoretica Computer Science, vo. 74,. [4] T. J. Richardson, Error foors of LDPC codes, in Proc. 4st Annua Aerton Conf. on Commun., Contr., and Comp., pp ,. [5] O. Mienkovic, E. Sojanin, and P. Whiting, Asymptotic spectra of trapping sets in reguar and irreguar LDPC code ensembes, IEEE Trans. Inf. Theory, vo. 5, pp. 9 55, Jan. 7. [6] S. Abu-Surra, W. E. Ryan, and D. Divsaar, Ensembe trapping set enumerators for protograph-based LDPC codes, in Proc. 45th Annua Aerton Conf. on Commun., Contro, and Computing, (Monticeo, IL, pp., Sept. 7. [7] H. D. Pfister, On the Capacity of Finite State Channes and the Anaysis of Convoutiona Accumuate-m Codes. San Diego, CA: Ph.D. Thesis, University of Caifornia,. [8] J. Kiewer, K. S. Zigangirov, and D. J. Costeo, Jr., New resuts on the minimum distance of repeat mutipe accumuate codes, in Proc. 45th Annua Aerton Conf. on Commun., Contro, and Computing, (Monticeo, IL, Sept. 7. [9] F. Kschischang, B. Frey, and H.-A. Loeiger, Factor graphs and the sum-product agorithm, IEEE Trans. Inf. Theory, vo. 47, pp , Feb.. [] S. Benedetto, D. Divsaar, G. Montorsi, and F. Poara, Seria concatenation of intereaved codes: Performance anaysis, design, and iterative decoding, IEEE Trans. Inf. Theory, vo. 44, pp , May 998. [] D. Divsaar, H. Jin, and R. J. McEiece, Coding theorems for turboike codes, in Proc. 6th Annua Aerton Conf. on Commun., Contro, and Computing, (Monticeo, IL, pp., Sept. 998.
Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University
Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver
More informationIterative Decoding Performance Bounds for LDPC Codes on Noisy Channels
Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University
More informationOn the Achievable Extrinsic Information of Inner Decoders in Serial Concatenation
On the Achievabe Extrinsic Information of Inner Decoders in Seria Concatenation Jörg Kiewer, Axe Huebner, and Danie J. Costeo, Jr. Department of Eectrica Engineering, University of Notre Dame, Notre Dame,
More informationImproved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization
Improved Min-Sum Decoding of LDPC Codes sing -Dimensiona Normaization Juntan Zhang and Marc Fossorier Department of Eectrica Engineering niversity of Hawaii at Manoa Honouu, HI 968 Emai: juntan, marc@spectra.eng.hawaii.edu
More informationSequential Decoding of Polar Codes with Arbitrary Binary Kernel
Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient
More informationA Brief Introduction to Markov Chains and Hidden Markov Models
A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,
More informationFast Blind Recognition of Channel Codes
Fast Bind Recognition of Channe Codes Reza Moosavi and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the origina artice. 213 IEEE. Persona use of this materia is permitted.
More information2146 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 6, JUNE 2013
246 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 6, NO. 6, JUNE 203 On Achieving an Asymptoticay Error-Free Fixed-Point of Iterative Decoding for Perfect APrioriInformation Jörg Kiewer, Senior Member, IEEE,
More informationBayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?
Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine
More informationError Floor Approximation for LDPC Codes in the AWGN Channel
submitted to IEEE TRANSACTIONS ON INFORMATION THEORY VERSION: JUNE 4, 2013 1 Error Foor Approximation for LDPC Codes in the AWGN Channe Brian K. Buter, Senior Member, IEEE, Pau H. Siege, Feow, IEEE arxiv:1202.2826v2
More informationMaximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem
1 Maximum ikeihood decoding of treis codes in fading channes with no receiver CSI is a poynomia-compexity probem Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department
More informationForty-Seventh Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 30 - October 2, 2009
Forty-Seventh Annua Aerton Conference Aerton House, UIUC, Iinois, USA September 30 - October 2, 2009 On systematic design of universay capacity approaching rate-compatibe sequences of LDPC code ensembes
More informationArticle An Efficient Method to Construct Parity-Check Matrices for Recursively Encoding Spatially Coupled LDPC Codes
entropy Artice An Efficient Method to Construct Parity-Check Matrices for Recursivey Encoding Spatiay Couped LDPC Codes Zhongwei Si, Sijie Wang and Junyang Ma Key Laboratory of Universa Wireess Communications,
More informationMinimum Distance Bounds for Multiple-Serially Concatenated Code Ensembles
Minimum Distance Bounds for Multiple-Serially Concatenated Code Ensembles Christian Koller,Jörg Kliewer, Kamil S. Zigangirov,DanielJ.Costello,Jr. ISIT 28, Toronto, Canada, July 6 -, 28 Department of Electrical
More informationEfficiently Generating Random Bits from Finite State Markov Chains
1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown
More informationLimited magnitude error detecting codes over Z q
Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica
More informationBICM Performance Improvement via Online LLR Optimization
BICM Performance Improvement via Onine LLR Optimization Jinhong Wu, Mostafa E-Khamy, Jungwon Lee and Inyup Kang Samsung Mobie Soutions Lab San Diego, USA 92121 Emai: {Jinhong.W, Mostafa.E, Jungwon2.Lee,
More informationMore Scattering: the Partial Wave Expansion
More Scattering: the Partia Wave Expansion Michae Fower /7/8 Pane Waves and Partia Waves We are considering the soution to Schrödinger s equation for scattering of an incoming pane wave in the z-direction
More informationExplicit overall risk minimization transductive bound
1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,
More informationMinimum Distance and Convergence Analysis of Hamming-Accumulate-Acccumulate Codes
1 Minimum Distance and Convergence Analysis of Hamming-Accumulate-Acccumulate Codes Alexandre Graell i Amat and Raphaël Le Bidan arxiv:0905.4545v1 [cs.it] 28 May 2009 Abstract In this letter we consider
More informationSome Measures for Asymmetry of Distributions
Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester
More informationAn Algorithm for Pruning Redundant Modules in Min-Max Modular Network
An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai
More informationASummaryofGaussianProcesses Coryn A.L. Bailer-Jones
ASummaryofGaussianProcesses Coryn A.L. Baier-Jones Cavendish Laboratory University of Cambridge caj@mrao.cam.ac.uk Introduction A genera prediction probem can be posed as foows. We consider that the variabe
More informationAsynchronous Control for Coupled Markov Decision Systems
INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of
More informationCS229 Lecture notes. Andrew Ng
CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view
More information6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7
6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17 Soution 7 Probem 1: Generating Random Variabes Each part of this probem requires impementation in MATLAB. For the
More informationarxiv: v1 [math.co] 17 Dec 2018
On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic
More informationNearly Optimal Constructions of PIR and Batch Codes
arxiv:700706v [csit] 5 Jun 07 Neary Optima Constructions of PIR and Batch Codes Hia Asi Technion - Israe Institute of Technoogy Haifa 3000, Israe shea@cstechnionaci Abstract In this work we study two famiies
More informationFirst-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries
c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische
More informationAnalysis of Emerson s Multiple Model Interpolation Estimation Algorithms: The MIMO Case
Technica Report PC-04-00 Anaysis of Emerson s Mutipe Mode Interpoation Estimation Agorithms: The MIMO Case João P. Hespanha Dae E. Seborg University of Caifornia, Santa Barbara February 0, 004 Anaysis
More informationNearest Neighbor Decoding and Pilot-Aided Channel Estimation for Fading Channels
Nearest Neighbor Decoding and Piot-Aided Channe Estimation for Fading Channes A. Taufiq Asyhari, Tobias Koch and Abert Guién i Fàbregas arxiv:30.223v2 [cs.it] 8 Apr 204 Abstract We study the information
More informationNOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS
NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS TONY ALLEN, EMILY GEBHARDT, AND ADAM KLUBALL 3 ADVISOR: DR. TIFFANY KOLBA 4 Abstract. The phenomenon of noise-induced stabiization occurs
More informationXSAT of linear CNF formulas
XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open
More informationA. Distribution of the test statistic
A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch
More informationThe Group Structure on a Smooth Tropical Cubic
The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,
More information8 Digifl'.11 Cth:uits and devices
8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,
More informationUtilization of multi-dimensional sou correlation in multi-dimensional sin check codes. Izhar, Mohd Azri Mohd; Zhou, Xiaobo; Author(s) Tad
JAIST Reposi https://dspace.j Tite Utiization of muti-dimensiona sou correation in muti-dimensiona sin check codes Izhar, Mohd Azri Mohd; Zhou, Xiaobo; Author(s) Tad Citation Teecommunication Systems,
More informationT.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA
ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network
More informationThe Binary Space Partitioning-Tree Process Supplementary Material
The inary Space Partitioning-Tree Process Suppementary Materia Xuhui Fan in Li Scott. Sisson Schoo of omputer Science Fudan University ibin@fudan.edu.cn Schoo of Mathematics and Statistics University of
More informationPartial permutation decoding for MacDonald codes
Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics
More information$, (2.1) n="# #. (2.2)
Chapter. Eectrostatic II Notes: Most of the materia presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartoo, Chap... Mathematica Considerations.. The Fourier series and the Fourier
More informationMelodic contour estimation with B-spline models using a MDL criterion
Meodic contour estimation with B-spine modes using a MDL criterion Damien Loive, Ney Barbot, Oivier Boeffard IRISA / University of Rennes 1 - ENSSAT 6 rue de Kerampont, B.P. 80518, F-305 Lannion Cedex
More informationEfficient Generation of Random Bits from Finite State Markov Chains
Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown
More informationLecture Note 3: Stationary Iterative Methods
MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or
More informationAsymptotic Properties of a Generalized Cross Entropy Optimization Algorithm
1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete
More informationLinear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach
Linear Network Coding for Mutipe Groupcast Sessions: An Interference Aignment Approach Abhik Kumar Das, Siddhartha Banerjee and Sriram Vishwanath Dept. of ECE, The University of Texas at Austin, TX, USA
More informationManipulation in Financial Markets and the Implications for Debt Financing
Manipuation in Financia Markets and the Impications for Debt Financing Leonid Spesivtsev This paper studies the situation when the firm is in financia distress and faces bankruptcy or debt restructuring.
More informationAn explicit Jordan Decomposition of Companion matrices
An expicit Jordan Decomposition of Companion matrices Fermín S V Bazán Departamento de Matemática CFM UFSC 88040-900 Forianópois SC E-mai: fermin@mtmufscbr S Gratton CERFACS 42 Av Gaspard Coriois 31057
More informationsensors Beamforming Based Full-Duplex for Millimeter-Wave Communication Article
sensors Artice Beamforming Based Fu-Dupex for Miimeter-Wave Communication Xiao Liu 1,2,3, Zhenyu Xiao 1,2,3, *, Lin Bai 1,2,3, Jinho Choi 4, Pengfei Xia 5 and Xiang-Gen Xia 6 1 Schoo of Eectronic and Information
More informationMARKOV CHAINS AND MARKOV DECISION THEORY. Contents
MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After
More informationUnconditional security of differential phase shift quantum key distribution
Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice
More informationMATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES
MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is
More informationUniformly Reweighted Belief Propagation: A Factor Graph Approach
Uniformy Reweighted Beief Propagation: A Factor Graph Approach Henk Wymeersch Chamers University of Technoogy Gothenburg, Sweden henkw@chamers.se Federico Penna Poitecnico di Torino Torino, Itay federico.penna@poito.it
More informationA Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes
A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr
More informationLimits on Support Recovery with Probabilistic Models: An Information-Theoretic Framework
Limits on Support Recovery with Probabiistic Modes: An Information-Theoretic Framewor Jonathan Scarett and Voan Cevher arxiv:5.744v3 cs.it 3 Aug 6 Abstract The support recovery probem consists of determining
More informationA simple reliability block diagram method for safety integrity verification
Reiabiity Engineering and System Safety 92 (2007) 1267 1273 www.esevier.com/ocate/ress A simpe reiabiity bock diagram method for safety integrity verification Haitao Guo, Xianhui Yang epartment of Automation,
More informationDelay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channels
Deay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channes Jian Tan, Yang Yang, Ness B. Shroff, Hesham E Gama Department of Eectrica and Computer Engineering The Ohio State University,
More informationESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK
ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK Aexander Arkhipov, Michae Schne German Aerospace Center DLR) Institute of Communications and Navigation Oberpfaffenhofen, 8224 Wessing, Germany
More informationQuasi-Cyclic Asymptotically Regular LDPC Codes
2010 IEEE Information Theory Workshop - ITW 2010 Dublin Quasi-Cyclic Asymptotically Regular LDPC Codes David G. M. Mitchell, Roxana Smarandache, Michael Lentmaier, and Daniel J. Costello, Jr. Dept. of
More informationSUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS
ISEE 1 SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS By Yingying Fan and Jinchi Lv University of Southern Caifornia This Suppementary Materia
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 2, FEBRUARY
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 2, FEBRUARY 206 857 Optima Energy and Data Routing in Networks With Energy Cooperation Berk Gurakan, Student Member, IEEE, OmurOze,Member, IEEE,
More informationTransmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance
Transmit ntenna Seection for Physica-Layer Networ Coding ased on Eucidean Distance 1 arxiv:179.445v1 [cs.it] 13 Sep 17 Vaibhav Kumar, arry Cardiff, and Mar F. Fanagan Schoo of Eectrica and Eectronic Engineering,
More informationThe Streaming-DMT of Fading Channels
The Streaming-DMT of Fading Channes Ashish Khisti Member, IEEE, and Star C. Draper Member, IEEE arxiv:30.80v3 cs.it] Aug 04 Abstract We consider the sequentia transmission of a stream of messages over
More informationCryptanalysis of PKP: A New Approach
Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in
More informationTracking Control of Multiple Mobile Robots
Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart
More informationComponentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems
Componentwise Determination of the Interva Hu Soution for Linear Interva Parameter Systems L. V. Koev Dept. of Theoretica Eectrotechnics, Facuty of Automatics, Technica University of Sofia, 1000 Sofia,
More informationMaximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR
1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,
More informationAsymptotic Gains of Generalized Selection Combining
Asymptotic Gains of Generaized Seection Combining Yao a Z Wang S Pasupathy Dept of ECpE Dept of ECE Dept of ECE Iowa State Univ Iowa State Univ Univ of Toronto, Emai: mayao@iastateedu Emai: zhengdao@iastateedu
More informationarxiv: v2 [cond-mat.stat-mech] 14 Nov 2008
Random Booean Networks Barbara Drosse Institute of Condensed Matter Physics, Darmstadt University of Technoogy, Hochschustraße 6, 64289 Darmstadt, Germany (Dated: June 27) arxiv:76.335v2 [cond-mat.stat-mech]
More informationReliability: Theory & Applications No.3, September 2006
REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate
More informationOn Non-Optimally Expanding Sets in Grassmann Graphs
ectronic Cooquium on Computationa Compexity, Report No. 94 (07) On Non-Optimay xpanding Sets in Grassmann Graphs Irit Dinur Subhash Khot Guy Kinder Dor Minzer Mui Safra Abstract The paper investigates
More informationSchool of Electrical Engineering, University of Bath, Claverton Down, Bath BA2 7AY
The ogic of Booean matrices C. R. Edwards Schoo of Eectrica Engineering, Universit of Bath, Caverton Down, Bath BA2 7AY A Booean matrix agebra is described which enabes man ogica functions to be manipuated
More informationVI.G Exact free energy of the Square Lattice Ising model
VI.G Exact free energy of the Square Lattice Ising mode As indicated in eq.(vi.35), the Ising partition function is reated to a sum S, over coections of paths on the attice. The aowed graphs for a square
More informationA Branch and Cut Algorithm to Design. LDPC Codes without Small Cycles in. Communication Systems
A Branch and Cut Agorithm to Design LDPC Codes without Sma Cyces in Communication Systems arxiv:1709.09936v1 [cs.it] 28 Sep 2017 Banu Kabakuak 1, Z. Caner Taşkın 1, and Ai Emre Pusane 2 1 Department of
More informationSTA 216 Project: Spline Approach to Discrete Survival Analysis
: Spine Approach to Discrete Surviva Anaysis November 4, 005 1 Introduction Athough continuous surviva anaysis differs much from the discrete surviva anaysis, there is certain ink between the two modeing
More informationResearch of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance
Send Orders for Reprints to reprints@benthamscience.ae 340 The Open Cybernetics & Systemics Journa, 015, 9, 340-344 Open Access Research of Data Fusion Method of Muti-Sensor Based on Correation Coefficient
More informationNonlinear Analysis of Spatial Trusses
Noninear Anaysis of Spatia Trusses João Barrigó October 14 Abstract The present work addresses the noninear behavior of space trusses A formuation for geometrica noninear anaysis is presented, which incudes
More informationA GENERAL METHOD FOR EVALUATING OUTAGE PROBABILITIES USING PADÉ APPROXIMATIONS
A GENERAL METHOD FOR EVALUATING OUTAGE PROBABILITIES USING PADÉ APPROXIMATIONS Jack W. Stokes, Microsoft Corporation One Microsoft Way, Redmond, WA 9852, jstokes@microsoft.com James A. Ritcey, University
More informationV.B The Cluster Expansion
V.B The Custer Expansion For short range interactions, speciay with a hard core, it is much better to repace the expansion parameter V( q ) by f( q ) = exp ( βv( q )), which is obtained by summing over
More informationChemical Kinetics Part 2
Integrated Rate Laws Chemica Kinetics Part 2 The rate aw we have discussed thus far is the differentia rate aw. Let us consider the very simpe reaction: a A à products The differentia rate reates the rate
More informationSource and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems
Source and Reay Matrices Optimization for Mutiuser Muti-Hop MIMO Reay Systems Yue Rong Department of Eectrica and Computer Engineering, Curtin University, Bentey, WA 6102, Austraia Abstract In this paper,
More informationCentralized Coded Caching of Correlated Contents
Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1
More informationMulti-server queueing systems with multiple priority classes
Muti-server queueing systems with mutipe priority casses Mor Harcho-Bater Taayui Osogami Aan Scheer-Wof Adam Wierman Abstract We present the first near-exact anaysis of an M/PH/ queue with m > 2 preemptive-resume
More informationORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION
J. Korean Math. Soc. 46 2009, No. 2, pp. 281 294 ORHOGONAL MLI-WAVELES FROM MARIX FACORIZAION Hongying Xiao Abstract. Accuracy of the scaing function is very crucia in waveet theory, or correspondingy,
More informationOn Efficient Decoding of Polar Codes with Large Kernels
On Efficient Decoding of Poar Codes with Large Kernes Sarit Buzago, Arman Fazei, Pau H. Siege, Veeresh Taranai, andaexander Vardy University of Caifornia San Diego, La Joa, CA 92093, USA {sbuzago, afazeic,
More informationSteepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1
Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rues 1 R.J. Marks II, S. Oh, P. Arabshahi Λ, T.P. Caude, J.J. Choi, B.G. Song Λ Λ Dept. of Eectrica Engineering Boeing Computer Services University
More informationConverting Z-number to Fuzzy Number using. Fuzzy Expected Value
ISSN 1746-7659, Engand, UK Journa of Information and Computing Science Vo. 1, No. 4, 017, pp.91-303 Converting Z-number to Fuzzy Number using Fuzzy Expected Vaue Mahdieh Akhbari * Department of Industria
More informationV.B The Cluster Expansion
V.B The Custer Expansion For short range interactions, speciay with a hard core, it is much better to repace the expansion parameter V( q ) by f(q ) = exp ( βv( q )) 1, which is obtained by summing over
More informationProblem set 6 The Perron Frobenius theorem.
Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator
More informationUniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete
Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity
More informationMultiplexing Two Information Sources over Fading. Channels: A Cross-layer Design Perspective
TO APPEAR IN EURASIP SIGNAL PROCESSING JOURNAL, 4TH QUARTER 2005 Mutipexing Two Information Sources over Fading Channes: A Cross-ayer Design Perspective Zhiyu Yang and Lang Tong Abstract We consider the
More informationControl with Minimum Communication Cost per Symbol
Contro with Minimum Communication Cost per ymbo Justin Pearson, João P. Hespanha, Danie Liberzon Abstract We address the probem of stabiizing a continuous-time inear time-invariant process under communication
More informationScalable Spectrum Allocation for Large Networks Based on Sparse Optimization
Scaabe Spectrum ocation for Large Networks ased on Sparse Optimization innan Zhuang Modem R&D Lab Samsung Semiconductor, Inc. San Diego, C Dongning Guo, Ermin Wei, and Michae L. Honig Department of Eectrica
More informationAlgorithms to solve massively under-defined systems of multivariate quadratic equations
Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations
More informationSchool of Electrical Engineering, University of Bath, Claverton Down, Bath BA2 7AY
The ogic of Booean matrices C. R. Edwards Schoo of Eectrica Engineering, Universit of Bath, Caverton Down, Bath BA2 7AY A Booean matrix agebra is described which enabes man ogica functions to be manipuated
More informationDelay Analysis of Maximum Weight Scheduling in Wireless Ad Hoc Networks
1 Deay Anaysis o Maximum Weight Scheduing in Wireess Ad Hoc Networks ong Bao e, Krishna Jagannathan, and Eytan Modiano Abstract This paper studies deay properties o the weknown maximum weight scheduing
More informationHaar Decomposition and Reconstruction Algorithms
Jim Lambers MAT 773 Fa Semester 018-19 Lecture 15 and 16 Notes These notes correspond to Sections 4.3 and 4.4 in the text. Haar Decomposition and Reconstruction Agorithms Decomposition Suppose we approximate
More informationAn approximate method for solving the inverse scattering problem with fixed-energy data
J. Inv. I-Posed Probems, Vo. 7, No. 6, pp. 561 571 (1999) c VSP 1999 An approximate method for soving the inverse scattering probem with fixed-energy data A. G. Ramm and W. Scheid Received May 12, 1999
More informationSEMINAR 2. PENDULUMS. V = mgl cos θ. (2) L = T V = 1 2 ml2 θ2 + mgl cos θ, (3) d dt ml2 θ2 + mgl sin θ = 0, (4) θ + g l
Probem 7. Simpe Penduum SEMINAR. PENDULUMS A simpe penduum means a mass m suspended by a string weightess rigid rod of ength so that it can swing in a pane. The y-axis is directed down, x-axis is directed
More informationCoded Caching for Files with Distinct File Sizes
Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering
More information