Extended Subspace Error Localization for Rate-Adaptive Distributed Source Coding

Size: px
Start display at page:

Download "Extended Subspace Error Localization for Rate-Adaptive Distributed Source Coding"

Transcription

1 Introduction Error Correction Extended Subspace Simulation Extended Subspace Error Localization for Rate-Adaptive Distributed Source Coding Mojtaba Vaezi and Fabrice Labeau McGill University International Symposium on Information Theory Istanbul, Turkey July 11, 2013

2 Introduction Error Correction Extended Subspace Simulation Outline 1 Introduction Definitions Motivation Outline 2 Error Correction in DFT Codes Coding-Theoretic Subspace-Based 3 Extended Subspace Algorithm Application 4 Simulation results

3 Introduction Error Correction Extended Subspace Simulation Definitions Motivation Outline Real BCH-DFT Codes Encoding G x R k X C k zero Y C n y R n DFT padding IDFT W k Σn k Wn H Figure: An (n, k) real BCH-DFT encoding scheme G consists of k columns from the IDFT matrix of order n The remaining n k columns of the IDFT matrix form H Σ n k inserts d = n k consecutive zeros in the transform domain = BCH code H (the extended parity check matrix) is defined such that [H T H T ] = W n

4 Introduction Error Correction Extended Subspace Simulation Definitions Motivation Outline Lossy DSC Practical code construction: Binary codes Problem: Distributed Source Coding (DSC) of continuous-valued sources - Common approach Wyner Ziv encoder Wyner Ziv decoder X Quantizer Slepian-Wolf Encoder Slepian-Wolf Decoder Reconstruction ˆX Y Y Binary codes (e.g., LDPC or Turbo codes) for Slepian-Wolf coding There are quantization loss and binning loss

5 Introduction Error Correction Extended Subspace Simulation Definitions Motivation Outline Lossy DSC Practical code construction: Real field codes - Alternative approach Encoder Decoder X Slepian-Wolf Encoder Q Q 1 Slepian-Wolf Decoder ˆX Y Similarities and differences There are still coding and quantization losses Coding is before quantization error correction in the real field (soft redundancy) Advantages 1 Correlation channel model is more realistic 2 Quantization error can be reduced by a factor of code rate (it vanishes if X and Y are completely correlated) 3 Better performance w.r.t. delay and complexity

6 Introduction Error Correction Extended Subspace Simulation Definitions Motivation Outline Lossy DSC Practical code construction x n Encoder s x ŝ x H Q Decoder n k n k Correlation Channel ˆx n y = x + e Figure: Wyner-Ziv coding using DFT codes: Syndrome approach. Suitable for delay-sensitive networks Highly vulnerable to variations in the correlation channel n

7 Introduction Error Correction Extended Subspace Simulation Definitions Motivation Outline Lossy DSC Practical code construction x n Encoder s x ŝ x H Q Decoder n k n k Correlation Channel ˆx n y = x + e Figure: Wyner-Ziv coding using DFT codes: Syndrome approach. Suitable for delay-sensitive networks Highly vulnerable to variations in the correlation channel Motivation for this works -To make rate-adaptive DSC based on DFT codes -To improve the decoding algorithm n

8 Introduction Error Correction Extended Subspace Simulation Definitions Motivation Outline Outline 1 Error Correction in DFT Codes Coding-Theoretic Approach Subspace-Based Approach 2 Extended Subspace Approach 3 Rate-Adaptive DSC 4 Simulation Results

9 Introduction Error Correction Extended Subspace Simulation Definitions Motivation Outline Outline 1 Error Correction in DFT Codes Coding-Theoretic Approach Subspace-Based Approach 2 Extended Subspace Approach 3 Rate-Adaptive DSC 4 Simulation Results Some related works -[Rath and Guillemot, 2004] -[Duartea and Baraniuk, 2013]

10 Introduction Error Correction Extended Subspace Simulation Coding-Theoretic Subspace-Based Error Correction in DFT Codes Decoding algorithms for a BCH-DFT code: 1 Detection (to determine the number of errors; ν t = n k 2 ) 2 Localization (to find the location of errors; i 1,..., i ν ) 3 Estimation (to calculate the magnitude of errors; e i1,..., e iν )

11 Introduction Error Correction Extended Subspace Simulation Coding-Theoretic Subspace-Based Error Correction in DFT Codes Decoding algorithms for a BCH-DFT code: 1 Detection (to determine the number of errors; ν t = n k 2 ) 2 Localization (to find the location of errors; i 1,..., i ν ) 3 Estimation (to calculate the magnitude of errors; e i1,..., e iν ) s = Hr = H(c + e) = He, s m = 1 ν e ip X α 1+m n p, m = 1,..., d = n k, p=1 and X p = e j2π n ip, p = 1,..., ν. s 1 s 2... s t s 2 s 3... s t+1 S t = s t s t+1... s 2t 1

12 Introduction Error Correction Extended Subspace Simulation Coding-Theoretic Subspace-Based Error Correction in DFT Codes Coding-Theoretic Approach 1 Detection (ν =?) ν = µ iff S µ is nonsingular but S µ+1 is singular 2 Localization (X i =?) Define error-locator polynomial as ν Λ(x) = (1 xx i ) = Λ 0 + Λ 1 x Λ ν x ν i=1 Find Λ 1,..., Λ ν by solving S ν [Λ ν... Λ 1 ] T = [s ν+1... s 2ν ] T Evaluate Λ(ω i ), i = 1... N, ω = e j 2π N, to find the roots 3 Estimation (Y i =?) Determine error magnitudes by solving the set of following linear equations s 1 s 2. s 2t = X 1... X ν X Xν X1 2t... Xν 2t Y 1 Y 2. Y 2ν

13 Introduction Error Correction Extended Subspace Simulation Coding-Theoretic Subspace-Based Error Correction in DFT Codes Subspace-Based Approach Form the error-locator matrix of order m as X 1 X 2... X ν V m = X m 1 1 X m Xν m 1 Define the syndrome matrix (for m = d/2 ) by S m = V m DVd m+1 T s 1 s 2... s d m+1 s 2 s 3... s d m+2 = s m s m+1... s d. where D is a diagonal matrix of size ν with nonzero diagonal elements d p = 1 n e ip X α p, p = 1,..., ν.

14 Introduction Error Correction Extended Subspace Simulation Coding-Theoretic Subspace-Based Error Correction in DFT Codes Subspace-Based Approach Eigen-decompose the covariance matrix R m = S m Sm H [ ] e 0 R m = [U e U n ] [U 0 e U n ] H, n - e and n contain the ν largest and m ν smallest eigenvalues -U e and U n contain the eigenvectors corresponding to e and n The columns in U e span the channel-error subspace spanned by V m thus, U H e U n = 0 V H m U n = 0 Let v = [1, x, x 2,..., x m 1 ] T where x is a complex variable, then F (x) m ν j=1 v H u n,j = m ν j=1 m 1 f ji x i. F (x) is sum of m ν polynomials {f ji } m ν j=1 of order m 1. i=0

15 Introduction Error Correction Extended Subspace Simulation Coding-Theoretic Subspace-Based Error Correction in DFT Codes Subspace-Based Approach U n U e Figure: Subspace method: graphical representation

16 Introduction Error Correction Extended Subspace Simulation Coding-Theoretic Subspace-Based Error Correction in DFT Codes Subspace-Based Approach U n Ũ n Ũ e U e Figure: Subspace method: graphical representation

17 Introduction Error Correction Extended Subspace Simulation Coding-Theoretic Subspace-Based Error Correction in DFT Codes Subspace-Based Approach U n Ũ Û n Ũ e U e Figure: Subspace method: graphical representation V m

18 Introduction Error Correction Extended Subspace Simulation Coding-Theoretic Subspace-Based Error Correction in DFT Codes Subspace-Based Approach U n Ũ Û n Ũ e U e Figure: Subspace method: graphical representation V m Subspace vs. coding-theoretic method There are m ν = d 2 ν polynomials rather than just one, and they have higher degrees of freedom Subspace method performs better than the coding-theoretic approach

19 Introduction Error Correction Extended Subspace Simulation Algorithm Application Extended Subspace Decoding Motivation Main idea: Increasing the dimension of the estimated noise subspace the number of polynomials with linearly independent coefficients and/or their degree grow.

20 Introduction Error Correction Extended Subspace Simulation Algorithm Application Extended Subspace Decoding Motivation Main idea: Increasing the dimension of the estimated noise subspace the number of polynomials with linearly independent coefficients and/or their degree grow.

21 Introduction Error Correction Extended Subspace Simulation Algorithm Application Extended Subspace Decoding Motivation Main idea: Increasing the dimension of the estimated noise subspace the number of polynomials with linearly independent coefficients and/or their degree grow. Construction: The extended syndrome matrix S m is defined for d > d, and similar to S m it is decomposable as S m = V m DV T d m+1. To form S m we need d syndrome samples while we only have d samples. s m = 1 n ν p=1 e ip X α 1+m p, m = 1,..., d,

22 Introduction Error Correction Extended Subspace Simulation Algorithm Application Extended Subspace Decoding Extended Syndrome s m = { sm, 1 m d, s m d, d < m d, where s = He, is the extended syndrome of error. Recal: H consists of those k columns of the IDFT matrix of order n not used in H (used in G).

23 Introduction Error Correction Extended Subspace Simulation Algorithm Application Extended Subspace Decoding Extended Syndrome s m = { sm, 1 m d, s m d, d < m d, where s = He, is the extended syndrome of error. Recal: H consists of those k columns of the IDFT matrix of order n not used in H (used in G). Q: How can we compute s?

24 Introduction Error Correction Extended Subspace Simulation Algorithm Application Extended Subspace Decoding Extended Syndrome s m = { sm, 1 m d, s m d, d < m d, where s = He, is the extended syndrome of error. Recal: H consists of those k columns of the IDFT matrix of order n not used in H (used in G). Q: How can we compute s?

25 Introduction Error Correction Extended Subspace Simulation Algorithm Application Extended Subspace Decoding Extended Syndrome s m = { sm, 1 m d, s m d, d < m d, where s = He, is the extended syndrome of error. Recal: H consists of those k columns of the IDFT matrix of order n not used in H (used in G). Q: How can we compute s? Let us try Hr = Hc + He He So to have Hr = s, either Hc must vanish or we should remove it.

26 Introduction Error Correction Extended Subspace Simulation Algorithm Application Extended Subspace Decoding Extended Syndrome Hc = 0 could happen in the special case of rate 1 2 all error indices are even In general, we need to find a way to remove Hc codes when We exploit the gain from the extended subspace decoding by transmitting extra samples Rate-adaptive DFT codes

27 Introduction Error Correction Extended Subspace Simulation Algorithm Application Extended Subspace Decoding Extended Syndrome Hc = 0 could happen in the special case of rate 1 2 all error indices are even In general, we need to find a way to remove Hc codes when We exploit the gain from the extended subspace decoding by transmitting extra samples Rate-adaptive DFT codes

28 Introduction Error Correction Extended Subspace Simulation Algorithm Application Extended Subspace Decoding Extended Syndrome Hc = 0 could happen in the special case of rate 1 2 all error indices are even In general, we need to find a way to remove Hc codes when We exploit the gain from the extended subspace decoding by transmitting extra samples Rate-adaptive DFT codes Applications 1 Rate-adaptive DSC (syndrome & parity approaches) 2 Rate-adaptive channel coding 3 Rate-adaptive distributed joint source-channel coding

29 Introduction Error Correction Extended Subspace Simulation Algorithm Application Rate-Adaptive DSC Syndrome Approach x n Encoder s x ŝ x H Q Decoder n k n k Correlation Channel n y ˆx n Figure: The Wyner-Ziv coding using DFT codes: Syndrome approach.

30 Introduction Error Correction Extended Subspace Simulation Algorithm Application Rate-Adaptive DSC Syndrome Approach x n Encoder s x ŝ x H Q Decoder n k n k Correlation Channel n y ˆx n Figure: The Wyner-Ziv coding using DFT codes: Syndrome approach. Rate Adaptation: 1 Decoder: Request for extra syndrome samples 2 Encoder: Transmit s x = Hx sample by sample 3 Decoder: Compute s y = Hy = s x + s e and s e = s y s x 4 Decoder: Use the extended subspace decoding

31 Introduction Error Correction Extended Subspace Simulation Algorithm Application Rate-Adaptive DSC Parity Approach x k Encoder p ˆp G sys Q Decoder n k n k Correlation Channel k y ˆx k Figure: The Wyner-Ziv coding using DFT codes: Parity approach.

32 Introduction Error Correction Extended Subspace Simulation Algorithm Application Rate-Adaptive DSC Parity Approach x k Encoder p ˆp G sys Q Decoder n k n k Correlation Channel k y ˆx k Figure: The Wyner-Ziv coding using DFT codes: Parity approach. Rate Adaptation: 1 Parity Puncturing: Performance is poor 2 Syndrome Augmentation: Very similar to the syndrome-based DSC

33 Introduction Error Correction Extended Subspace Simulation Numerical results Syndrome-based DSC Relative frequency of correct localization of errors Subspace 0.3 Extended Subspace (1 sample) Extended Subspace (2 samples) 0.2 Extended Subspace (3 samples) Extended Subspace (4 samples) CEQNR (db) Figure: Rate-adaptation using a (10,5) DFT code and extended subspace method. The the code rate is increased from 0.5 to 0.9 by a step of 0.1.

34 Introduction Error Correction Extended Subspace Simulation Numerical results Syndrome-based DSC 1 Relative frequency of correct localization of errors Subspace Extended Subspace 3 errors 4 errors CEQNR (db) Figure: Rate-adaptation for a (17,9) DFT code based on 4 additional syndrome samples.

35 Introduction Error Correction Extended Subspace Simulation Conclusions Summary: The extended subspace algorithm of DFT codes Improves decoding at the expense of increasing the code-rate Is suitable for rate-adaptive DSC Makes possible to correct more than t = n k 2 errors The gain comes from diminishing the effect of quantization error by averaging several error localization polynomials. Generalization: To further improve the subspace decoding without increasing the code rate.

36 Introduction Error Correction Extended Subspace Simulation Thank you!

The extended coset leader weight enumerator

The extended coset leader weight enumerator The extended coset leader weight enumerator Relinde Jurrius Ruud Pellikaan Eindhoven University of Technology, The Netherlands Symposium on Information Theory in the Benelux, 2009 1/14 Outline Codes, weights

More information

ON DISTRIBUTED ARITHMETIC CODES AND SYNDROME BASED TURBO CODES FOR SLEPIAN-WOLF CODING OF NON UNIFORM SOURCES

ON DISTRIBUTED ARITHMETIC CODES AND SYNDROME BASED TURBO CODES FOR SLEPIAN-WOLF CODING OF NON UNIFORM SOURCES 7th European Signal Processing Conference (EUSIPCO 2009) Glasgow, Scotland, August 24-28, 2009 ON DISTRIBUTED ARITHMETIC CODES AND SYNDROME BASED TURBO CODES FOR SLEPIAN-WOLF CODING OF NON UNIFORM SOURCES

More information

Solutions or answers to Final exam in Error Control Coding, October 24, G eqv = ( 1+D, 1+D + D 2)

Solutions or answers to Final exam in Error Control Coding, October 24, G eqv = ( 1+D, 1+D + D 2) Solutions or answers to Final exam in Error Control Coding, October, Solution to Problem a) G(D) = ( +D, +D + D ) b) The rate R =/ and ν i = ν = m =. c) Yes, since gcd ( +D, +D + D ) =+D + D D j. d) An

More information

Non-binary Distributed Arithmetic Coding

Non-binary Distributed Arithmetic Coding Non-binary Distributed Arithmetic Coding by Ziyang Wang Thesis submitted to the Faculty of Graduate and Postdoctoral Studies In partial fulfillment of the requirements For the Masc degree in Electrical

More information

Integer-Forcing Source Coding

Integer-Forcing Source Coding Or Ordentlich Joint work with Uri Erez June 30th, 2014 ISIT, Honolulu, HI, USA Motivation 1 - Universal Quantization [ x1 x 2 ] N(0,K xx) x 1 E 1 x 2 E 2 D (ˆx 1,d) (ˆx 2,d) Motivation 1 - Universal Quantization

More information

Distributed Arithmetic Coding

Distributed Arithmetic Coding Distributed Arithmetic Coding Marco Grangetto, Member, IEEE, Enrico Magli, Member, IEEE, Gabriella Olmo, Senior Member, IEEE Abstract We propose a distributed binary arithmetic coder for Slepian-Wolf coding

More information

Rate-adaptive turbo-syndrome scheme for Slepian-Wolf Coding

Rate-adaptive turbo-syndrome scheme for Slepian-Wolf Coding Rate-adaptive turbo-syndrome scheme for Slepian-Wolf Coding Aline Roumy, Khaled Lajnef, Christine Guillemot 1 INRIA- Rennes, Campus de Beaulieu, 35042 Rennes Cedex, France Email: aroumy@irisa.fr Abstract

More information

1 Vandermonde matrices

1 Vandermonde matrices ECE 771 Lecture 6 BCH and RS codes: Designer cyclic codes Objective: We will begin with a result from linear algebra regarding Vandermonde matrices This result is used to prove the BCH distance properties,

More information

Error Correction in DFT Codes Subject to Low-Level Quantization Noise

Error Correction in DFT Codes Subject to Low-Level Quantization Noise Error Correction in DFT Codes Subject to Low-Level Quantization Noise Georgios Takos, Student Member, IEEE and Christoforos N. Hadjicostis*, Senior Member, IEEE 1 Abstract This paper analyzes the effects

More information

More advanced codes 0 1 ( , 1 1 (

More advanced codes 0 1 ( , 1 1 ( p. 1/24 More advanced codes The Shor code was the first general-purpose quantum error-correcting code, but since then many others have been discovered. An important example, discovered independently of

More information

Introduction into Quantum Computations Alexei Ashikhmin Bell Labs

Introduction into Quantum Computations Alexei Ashikhmin Bell Labs Introduction into Quantum Computations Alexei Ashikhmin Bell Labs Workshop on Quantum Computing and its Application March 16, 2017 Qubits Unitary transformations Quantum Circuits Quantum Measurements Quantum

More information

Tutorial on Principal Component Analysis

Tutorial on Principal Component Analysis Tutorial on Principal Component Analysis Copyright c 1997, 2003 Javier R. Movellan. This is an open source document. Permission is granted to copy, distribute and/or modify this document under the terms

More information

A Hyper-Trellis based Turbo Decoder for Wyner-Ziv Video Coding

A Hyper-Trellis based Turbo Decoder for Wyner-Ziv Video Coding A Hyper-Trellis based Turbo Decoder for Wyner-Ziv Video Coding Arun Avudainayagam, John M. Shea and Dapeng Wu Wireless Information Networking Group (WING) Department of Electrical and Computer Engineering

More information

Recognition of a code in a noisy environment

Recognition of a code in a noisy environment Introduction Recognition of a code Conclusion Université de Limoges - XLIM - DMI INRIA Rocquencourt - Projet CODES ISIT Nice - June 29, 2007 Introduction Recognition of a code Conclusion Outline 1 Introduction

More information

Coding for Computing. ASPITRG, Drexel University. Jie Ren 2012/11/14

Coding for Computing. ASPITRG, Drexel University. Jie Ren 2012/11/14 Coding for Computing ASPITRG, Drexel University Jie Ren 2012/11/14 Outline Background and definitions Main Results Examples and Analysis Proofs Background and definitions Problem Setup Graph Entropy Conditional

More information

16.36 Communication Systems Engineering

16.36 Communication Systems Engineering MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

More information

Hyper-Trellis Decoding of Pixel-Domain Wyner-Ziv Video Coding

Hyper-Trellis Decoding of Pixel-Domain Wyner-Ziv Video Coding 1 Hyper-Trellis Decoding of Pixel-Domain Wyner-Ziv Video Coding Arun Avudainayagam, John M. Shea, and Dapeng Wu Wireless Information Networking Group (WING) Department of Electrical and Computer Engineering

More information

Performance of Polar Codes for Channel and Source Coding

Performance of Polar Codes for Channel and Source Coding Performance of Polar Codes for Channel and Source Coding Nadine Hussami AUB, Lebanon, Email: njh03@aub.edu.lb Satish Babu Korada and üdiger Urbanke EPFL, Switzerland, Email: {satish.korada,ruediger.urbanke}@epfl.ch

More information

CS6304 / Analog and Digital Communication UNIT IV - SOURCE AND ERROR CONTROL CODING PART A 1. What is the use of error control coding? The main use of error control coding is to reduce the overall probability

More information

Lecture 8. Principal Component Analysis. Luigi Freda. ALCOR Lab DIAG University of Rome La Sapienza. December 13, 2016

Lecture 8. Principal Component Analysis. Luigi Freda. ALCOR Lab DIAG University of Rome La Sapienza. December 13, 2016 Lecture 8 Principal Component Analysis Luigi Freda ALCOR Lab DIAG University of Rome La Sapienza December 13, 2016 Luigi Freda ( La Sapienza University) Lecture 8 December 13, 2016 1 / 31 Outline 1 Eigen

More information

SOURCE CODING WITH SIDE INFORMATION AT THE DECODER (WYNER-ZIV CODING) FEB 13, 2003

SOURCE CODING WITH SIDE INFORMATION AT THE DECODER (WYNER-ZIV CODING) FEB 13, 2003 SOURCE CODING WITH SIDE INFORMATION AT THE DECODER (WYNER-ZIV CODING) FEB 13, 2003 SLEPIAN-WOLF RESULT { X i} RATE R x ENCODER 1 DECODER X i V i {, } { V i} ENCODER 0 RATE R v Problem: Determine R, the

More information

Distributed Source Coding Using LDPC Codes

Distributed Source Coding Using LDPC Codes Distributed Source Coding Using LDPC Codes Telecommunications Laboratory Alex Balatsoukas-Stimming Technical University of Crete May 29, 2010 Telecommunications Laboratory (TUC) Distributed Source Coding

More information

DIAGONALIZATION. In order to see the implications of this definition, let us consider the following example Example 1. Consider the matrix

DIAGONALIZATION. In order to see the implications of this definition, let us consider the following example Example 1. Consider the matrix DIAGONALIZATION Definition We say that a matrix A of size n n is diagonalizable if there is a basis of R n consisting of eigenvectors of A ie if there are n linearly independent vectors v v n such that

More information

The Jordan Normal Form and its Applications

The Jordan Normal Form and its Applications The and its Applications Jeremy IMPACT Brigham Young University A square matrix A is a linear operator on {R, C} n. A is diagonalizable if and only if it has n linearly independent eigenvectors. What happens

More information

12.4 Known Channel (Water-Filling Solution)

12.4 Known Channel (Water-Filling Solution) ECEn 665: Antennas and Propagation for Wireless Communications 54 2.4 Known Channel (Water-Filling Solution) The channel scenarios we have looed at above represent special cases for which the capacity

More information

Part III Advanced Coding Techniques

Part III Advanced Coding Techniques Part III Advanced Coding Techniques José Vieira SPL Signal Processing Laboratory Departamento de Electrónica, Telecomunicações e Informática / IEETA Universidade de Aveiro, Portugal 2010 José Vieira (IEETA,

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land Ingmar Land, SIPCom8-1: Information Theory and Coding (2005 Spring) p.1 Overview Basic Concepts of Channel Coding Block Codes I:

More information

ERROR CORRECTING CODES

ERROR CORRECTING CODES ERROR CORRECTING CODES To send a message of 0 s and 1 s from my computer on Earth to Mr. Spock s computer on the planet Vulcan we use codes which include redundancy to correct errors. n q Definition. A

More information

One Lesson of Information Theory

One Lesson of Information Theory Institut für One Lesson of Information Theory Prof. Dr.-Ing. Volker Kühn Institute of Communications Engineering University of Rostock, Germany Email: volker.kuehn@uni-rostock.de http://www.int.uni-rostock.de/

More information

Secret Key and Private Key Constructions for Simple Multiterminal Source Models

Secret Key and Private Key Constructions for Simple Multiterminal Source Models Secret Key and Private Key Constructions for Simple Multiterminal Source Models arxiv:cs/05050v [csit] 3 Nov 005 Chunxuan Ye Department of Electrical and Computer Engineering and Institute for Systems

More information

Least-Squares Performance of Analog Product Codes

Least-Squares Performance of Analog Product Codes Copyright 004 IEEE Published in the Proceedings of the Asilomar Conference on Signals, Systems and Computers, 7-0 ovember 004, Pacific Grove, California, USA Least-Squares Performance of Analog Product

More information

ELEC E7210: Communication Theory. Lecture 10: MIMO systems

ELEC E7210: Communication Theory. Lecture 10: MIMO systems ELEC E7210: Communication Theory Lecture 10: MIMO systems Matrix Definitions, Operations, and Properties (1) NxM matrix a rectangular array of elements a A. an 11 1....... a a 1M. NM B D C E ermitian transpose

More information

Multiterminal Source Coding with an Entropy-Based Distortion Measure

Multiterminal Source Coding with an Entropy-Based Distortion Measure Multiterminal Source Coding with an Entropy-Based Distortion Measure Thomas Courtade and Rick Wesel Department of Electrical Engineering University of California, Los Angeles 4 August, 2011 IEEE International

More information

Digital Communications III (ECE 154C) Introduction to Coding and Information Theory

Digital Communications III (ECE 154C) Introduction to Coding and Information Theory Digital Communications III (ECE 154C) Introduction to Coding and Information Theory Tara Javidi These lecture notes were originally developed by late Prof. J. K. Wolf. UC San Diego Spring 2014 1 / 8 I

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

Cyclic Redundancy Check Codes

Cyclic Redundancy Check Codes Cyclic Redundancy Check Codes Lectures No. 17 and 18 Dr. Aoife Moloney School of Electronics and Communications Dublin Institute of Technology Overview These lectures will look at the following: Cyclic

More information

Econ Slides from Lecture 7

Econ Slides from Lecture 7 Econ 205 Sobel Econ 205 - Slides from Lecture 7 Joel Sobel August 31, 2010 Linear Algebra: Main Theory A linear combination of a collection of vectors {x 1,..., x k } is a vector of the form k λ ix i for

More information

Code design: Computer search

Code design: Computer search Code design: Computer search Low rate codes Represent the code by its generator matrix Find one representative for each equivalence class of codes Permutation equivalences? Do NOT try several generator

More information

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination

More information

The Concept of Soft Channel Encoding and its Applications in Wireless Relay Networks

The Concept of Soft Channel Encoding and its Applications in Wireless Relay Networks The Concept of Soft Channel Encoding and its Applications in Wireless Relay Networks Gerald Matz Institute of Telecommunications Vienna University of Technology institute of telecommunications Acknowledgements

More information

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005 Chapter 7 Error Control Coding Mikael Olofsson 2005 We have seen in Chapters 4 through 6 how digital modulation can be used to control error probabilities. This gives us a digital channel that in each

More information

Vector spaces. EE 387, Notes 8, Handout #12

Vector spaces. EE 387, Notes 8, Handout #12 Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is

More information

EE 229B ERROR CONTROL CODING Spring 2005

EE 229B ERROR CONTROL CODING Spring 2005 EE 229B ERROR CONTROL CODING Spring 2005 Solutions for Homework 1 1. Is there room? Prove or disprove : There is a (12,7) binary linear code with d min = 5. If there were a (12,7) binary linear code with

More information

Quantization for Distributed Estimation

Quantization for Distributed Estimation 0 IEEE International Conference on Internet of Things ithings 0), Green Computing and Communications GreenCom 0), and Cyber-Physical-Social Computing CPSCom 0) Quantization for Distributed Estimation uan-yu

More information

Computational Methods. Eigenvalues and Singular Values

Computational Methods. Eigenvalues and Singular Values Computational Methods Eigenvalues and Singular Values Manfred Huber 2010 1 Eigenvalues and Singular Values Eigenvalues and singular values describe important aspects of transformations and of data relations

More information

Decoding linear codes via systems solving: complexity issues

Decoding linear codes via systems solving: complexity issues Decoding linear codes via systems solving: complexity issues Stanislav Bulygin (joint work with Ruud Pellikaan) University of Kaiserslautern June 19, 2008 Outline Outline of the talk Introduction: codes

More information

Design of Optimal Quantizers for Distributed Source Coding

Design of Optimal Quantizers for Distributed Source Coding Design of Optimal Quantizers for Distributed Source Coding David Rebollo-Monedero, Rui Zhang and Bernd Girod Information Systems Laboratory, Electrical Eng. Dept. Stanford University, Stanford, CA 94305

More information

Principal Component Analysis

Principal Component Analysis CSci 5525: Machine Learning Dec 3, 2008 The Main Idea Given a dataset X = {x 1,..., x N } The Main Idea Given a dataset X = {x 1,..., x N } Find a low-dimensional linear projection The Main Idea Given

More information

ECE Information theory Final

ECE Information theory Final ECE 776 - Information theory Final Q1 (1 point) We would like to compress a Gaussian source with zero mean and variance 1 We consider two strategies In the first, we quantize with a step size so that the

More information

Basic Principles of Video Coding

Basic Principles of Video Coding Basic Principles of Video Coding Introduction Categories of Video Coding Schemes Information Theory Overview of Video Coding Techniques Predictive coding Transform coding Quantization Entropy coding Motion

More information

On Scalable Source Coding for Multiple Decoders with Side Information

On Scalable Source Coding for Multiple Decoders with Side Information On Scalable Source Coding for Multiple Decoders with Side Information Chao Tian School of Computer and Communication Sciences Laboratory for Information and Communication Systems (LICOS), EPFL, Lausanne,

More information

Graph Coloring and Conditional Graph Entropy

Graph Coloring and Conditional Graph Entropy Graph Coloring and Conditional Graph Entropy Vishal Doshi, Devavrat Shah, Muriel Médard, Sidharth Jaggi Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge,

More information

Low-density parity-check (LDPC) codes

Low-density parity-check (LDPC) codes Low-density parity-check (LDPC) codes Performance similar to turbo codes Do not require long interleaver to achieve good performance Better block error performance Error floor occurs at lower BER Decoding

More information

(a) II and III (b) I (c) I and III (d) I and II and III (e) None are true.

(a) II and III (b) I (c) I and III (d) I and II and III (e) None are true. 1 Which of the following statements is always true? I The null space of an m n matrix is a subspace of R m II If the set B = {v 1,, v n } spans a vector space V and dimv = n, then B is a basis for V III

More information

U Logo Use Guidelines

U Logo Use Guidelines COMP2610/6261 - Information Theory Lecture 22: Hamming Codes U Logo Use Guidelines Mark Reid and Aditya Menon logo is a contemporary n of our heritage. presents our name, d and our motto: arn the nature

More information

On Scalable Coding in the Presence of Decoder Side Information

On Scalable Coding in the Presence of Decoder Side Information On Scalable Coding in the Presence of Decoder Side Information Emrah Akyol, Urbashi Mitra Dep. of Electrical Eng. USC, CA, US Email: {eakyol, ubli}@usc.edu Ertem Tuncel Dep. of Electrical Eng. UC Riverside,

More information

Slepian-Wolf Code Design via Source-Channel Correspondence

Slepian-Wolf Code Design via Source-Channel Correspondence Slepian-Wolf Code Design via Source-Channel Correspondence Jun Chen University of Illinois at Urbana-Champaign Urbana, IL 61801, USA Email: junchen@ifpuiucedu Dake He IBM T J Watson Research Center Yorktown

More information

ELEC546 MIMO Channel Capacity

ELEC546 MIMO Channel Capacity ELEC546 MIMO Channel Capacity Vincent Lau Simplified Version.0 //2004 MIMO System Model Transmitter with t antennas & receiver with r antennas. X Transmitted Symbol, received symbol Channel Matrix (Flat

More information

Math 314H Solutions to Homework # 3

Math 314H Solutions to Homework # 3 Math 34H Solutions to Homework # 3 Complete the exercises from the second maple assignment which can be downloaded from my linear algebra course web page Attach printouts of your work on this problem to

More information

On Compression Encrypted Data part 2. Prof. Ja-Ling Wu The Graduate Institute of Networking and Multimedia National Taiwan University

On Compression Encrypted Data part 2. Prof. Ja-Ling Wu The Graduate Institute of Networking and Multimedia National Taiwan University On Compression Encrypted Data part 2 Prof. Ja-Ling Wu The Graduate Institute of Networking and Multimedia National Taiwan University 1 Brief Summary of Information-theoretic Prescription At a functional

More information

MA 265 FINAL EXAM Fall 2012

MA 265 FINAL EXAM Fall 2012 MA 265 FINAL EXAM Fall 22 NAME: INSTRUCTOR S NAME:. There are a total of 25 problems. You should show work on the exam sheet, and pencil in the correct answer on the scantron. 2. No books, notes, or calculators

More information

Dr. Cathy Liu Dr. Michael Steinberger. A Brief Tour of FEC for Serial Link Systems

Dr. Cathy Liu Dr. Michael Steinberger. A Brief Tour of FEC for Serial Link Systems Prof. Shu Lin Dr. Cathy Liu Dr. Michael Steinberger U.C.Davis Avago SiSoft A Brief Tour of FEC for Serial Link Systems Outline Introduction Finite Fields and Vector Spaces Linear Block Codes Cyclic Codes

More information

Remark 1 By definition, an eigenvector must be a nonzero vector, but eigenvalue could be zero.

Remark 1 By definition, an eigenvector must be a nonzero vector, but eigenvalue could be zero. Sec 5 Eigenvectors and Eigenvalues In this chapter, vector means column vector Definition An eigenvector of an n n matrix A is a nonzero vector x such that A x λ x for some scalar λ A scalar λ is called

More information

arxiv: v1 [eess.sp] 22 Oct 2017

arxiv: v1 [eess.sp] 22 Oct 2017 A Binary Wyner-Ziv Code Design Based on Compound LDGM-LDPC Structures Mahdi Nangir 1, Mahmoud Ahmadian-Attari 1, and Reza Asvadi 2,* arxiv:1710.07985v1 [eess.sp] 22 Oct 2017 1 Faculty of Electrical Engineering,

More information

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet

More information

EE5585 Data Compression May 2, Lecture 27

EE5585 Data Compression May 2, Lecture 27 EE5585 Data Compression May 2, 2013 Lecture 27 Instructor: Arya Mazumdar Scribe: Fangying Zhang Distributed Data Compression/Source Coding In the previous class we used a H-W table as a simple example,

More information

Convergence of Eigenspaces in Kernel Principal Component Analysis

Convergence of Eigenspaces in Kernel Principal Component Analysis Convergence of Eigenspaces in Kernel Principal Component Analysis Shixin Wang Advanced machine learning April 19, 2016 Shixin Wang Convergence of Eigenspaces April 19, 2016 1 / 18 Outline 1 Motivation

More information

MATH3302. Coding and Cryptography. Coding Theory

MATH3302. Coding and Cryptography. Coding Theory MATH3302 Coding and Cryptography Coding Theory 2010 Contents 1 Introduction to coding theory 2 1.1 Introduction.......................................... 2 1.2 Basic definitions and assumptions..............................

More information

Physical Layer and Coding

Physical Layer and Coding Physical Layer and Coding Muriel Médard Professor EECS Overview A variety of physical media: copper, free space, optical fiber Unified way of addressing signals at the input and the output of these media:

More information

Linear Algebra Practice Problems

Linear Algebra Practice Problems Linear Algebra Practice Problems Math 24 Calculus III Summer 25, Session II. Determine whether the given set is a vector space. If not, give at least one axiom that is not satisfied. Unless otherwise stated,

More information

A Practical and Optimal Symmetric Slepian-Wolf Compression Strategy Using Syndrome Formers and Inverse Syndrome Formers

A Practical and Optimal Symmetric Slepian-Wolf Compression Strategy Using Syndrome Formers and Inverse Syndrome Formers A Practical and Optimal Symmetric Slepian-Wolf Compression Strategy Using Syndrome Formers and Inverse Syndrome Formers Peiyu Tan and Jing Li (Tiffany) Electrical and Computer Engineering Dept, Lehigh

More information

Network coding for multicast relation to compression and generalization of Slepian-Wolf

Network coding for multicast relation to compression and generalization of Slepian-Wolf Network coding for multicast relation to compression and generalization of Slepian-Wolf 1 Overview Review of Slepian-Wolf Distributed network compression Error exponents Source-channel separation issues

More information

Optimum Soft Decision Decoding of Linear Block Codes

Optimum Soft Decision Decoding of Linear Block Codes Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is

More information

Lecture 14: Hamming and Hadamard Codes

Lecture 14: Hamming and Hadamard Codes CSCI-B69: A Theorist s Toolkit, Fall 6 Oct 6 Lecture 4: Hamming and Hadamard Codes Lecturer: Yuan Zhou Scribe: Kaiyuan Zhu Recap Recall from the last lecture that error-correcting codes are in fact injective

More information

Math 3191 Applied Linear Algebra

Math 3191 Applied Linear Algebra Math 9 Applied Linear Algebra Lecture 9: Diagonalization Stephen Billups University of Colorado at Denver Math 9Applied Linear Algebra p./9 Section. Diagonalization The goal here is to develop a useful

More information

Berlekamp-Massey decoding of RS code

Berlekamp-Massey decoding of RS code IERG60 Coding for Distributed Storage Systems Lecture - 05//06 Berlekamp-Massey decoding of RS code Lecturer: Kenneth Shum Scribe: Bowen Zhang Berlekamp-Massey algorithm We recall some notations from lecture

More information

D.5 Quantum error correction

D.5 Quantum error correction D. QUANTUM ALGORITHMS 157 Figure III.34: E ects of decoherence on a qubit. On the left is a qubit yi that is mostly isoloated from its environment i. Ontheright,aweakinteraction between the qubit and the

More information

Quasi-cyclic Low Density Parity Check codes with high girth

Quasi-cyclic Low Density Parity Check codes with high girth Quasi-cyclic Low Density Parity Check codes with high girth, a work with Marta Rossi, Richard Bresnan, Massimilliano Sala Summer Doctoral School 2009 Groebner bases, Geometric codes and Order Domains Dept

More information

Lecture 11: Polar codes construction

Lecture 11: Polar codes construction 15-859: Information Theory and Applications in TCS CMU: Spring 2013 Lecturer: Venkatesan Guruswami Lecture 11: Polar codes construction February 26, 2013 Scribe: Dan Stahlke 1 Polar codes: recap of last

More information

MATH32031: Coding Theory Part 15: Summary

MATH32031: Coding Theory Part 15: Summary MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,

More information

ECEN 655: Advanced Channel Coding

ECEN 655: Advanced Channel Coding ECEN 655: Advanced Channel Coding Course Introduction Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 655: Advanced Channel Coding 1 / 19 Outline 1 History

More information

MAC Module 12 Eigenvalues and Eigenvectors. Learning Objectives. Upon completing this module, you should be able to:

MAC Module 12 Eigenvalues and Eigenvectors. Learning Objectives. Upon completing this module, you should be able to: MAC Module Eigenvalues and Eigenvectors Learning Objectives Upon completing this module, you should be able to: Solve the eigenvalue problem by finding the eigenvalues and the corresponding eigenvectors

More information

MAC Module 12 Eigenvalues and Eigenvectors

MAC Module 12 Eigenvalues and Eigenvectors MAC 23 Module 2 Eigenvalues and Eigenvectors Learning Objectives Upon completing this module, you should be able to:. Solve the eigenvalue problem by finding the eigenvalues and the corresponding eigenvectors

More information

EE512: Error Control Coding

EE512: Error Control Coding EE51: Error Control Coding Solution for Assignment on BCH and RS Codes March, 007 1. To determine the dimension and generator polynomial of all narrow sense binary BCH codes of length n = 31, we have to

More information

Math 520 Exam 2 Topic Outline Sections 1 3 (Xiao/Dumas/Liaw) Spring 2008

Math 520 Exam 2 Topic Outline Sections 1 3 (Xiao/Dumas/Liaw) Spring 2008 Math 520 Exam 2 Topic Outline Sections 1 3 (Xiao/Dumas/Liaw) Spring 2008 Exam 2 will be held on Tuesday, April 8, 7-8pm in 117 MacMillan What will be covered The exam will cover material from the lectures

More information

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1) Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every

More information

Lecture 2 Linear Codes

Lecture 2 Linear Codes Lecture 2 Linear Codes 2.1. Linear Codes From now on we want to identify the alphabet Σ with a finite field F q. For general codes, introduced in the last section, the description is hard. For a code of

More information

Error Correction Review

Error Correction Review Error Correction Review A single overall parity-check equation detects single errors. Hamming codes used m equations to correct one error in 2 m 1 bits. We can use nonbinary equations if we create symbols

More information

Eigenvalues and Eigenvectors

Eigenvalues and Eigenvectors Eigenvalues and Eigenvectors week -2 Fall 26 Eigenvalues and eigenvectors The most simple linear transformation from R n to R n may be the transformation of the form: T (x,,, x n ) (λ x, λ 2,, λ n x n

More information

arxiv: v1 [cs.it] 19 Aug 2008

arxiv: v1 [cs.it] 19 Aug 2008 Distributed Source Coding using Abelian Group Codes arxiv:0808.2659v1 [cs.it] 19 Aug 2008 Dinesh Krithivasan and S. Sandeep Pradhan, Department of Electrical Engineering and Computer Science, University

More information

Chapter 5. Cyclic Codes

Chapter 5. Cyclic Codes Wireless Information Transmission System Lab. Chapter 5 Cyclic Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Description of Cyclic Codes Generator and Parity-Check

More information

1 Principal Components Analysis

1 Principal Components Analysis Lecture 3 and 4 Sept. 18 and Sept.20-2006 Data Visualization STAT 442 / 890, CM 462 Lecture: Ali Ghodsi 1 Principal Components Analysis Principal components analysis (PCA) is a very popular technique for

More information

Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG

Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Cung Nguyen and Robert G. Redinbo Department of Electrical and Computer Engineering University of California, Davis, CA email: cunguyen,

More information

Cyclic Codes. Saravanan Vijayakumaran August 26, Department of Electrical Engineering Indian Institute of Technology Bombay

Cyclic Codes. Saravanan Vijayakumaran August 26, Department of Electrical Engineering Indian Institute of Technology Bombay 1 / 25 Cyclic Codes Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay August 26, 2014 2 / 25 Cyclic Codes Definition A cyclic shift

More information

Chapter 2: Source coding

Chapter 2: Source coding Chapter 2: meghdadi@ensil.unilim.fr University of Limoges Chapter 2: Entropy of Markov Source Chapter 2: Entropy of Markov Source Markov model for information sources Given the present, the future is independent

More information

Linear Algebra. F n = {all vectors of dimension n over field F} Linear algebra is about vectors. Concretely, vectors look like this:

Linear Algebra. F n = {all vectors of dimension n over field F} Linear algebra is about vectors. Concretely, vectors look like this: 15-251: Great Theoretical Ideas in Computer Science Lecture 23 Linear Algebra Linear algebra is about vectors. Concretely, vectors look like this: They are arrays of numbers. fig. by Peter Dodds # of numbers,

More information

Coding on a Trellis: Convolutional Codes

Coding on a Trellis: Convolutional Codes .... Coding on a Trellis: Convolutional Codes Telecommunications Laboratory Alex Balatsoukas-Stimming Technical University of Crete November 6th, 2008 Telecommunications Laboratory (TUC) Coding on a Trellis:

More information

MATH 304 Linear Algebra Lecture 10: Linear independence. Wronskian.

MATH 304 Linear Algebra Lecture 10: Linear independence. Wronskian. MATH 304 Linear Algebra Lecture 10: Linear independence. Wronskian. Spanning set Let S be a subset of a vector space V. Definition. The span of the set S is the smallest subspace W V that contains S. If

More information

Multi-Hypothesis based Distributed Video Coding using LDPC Codes

Multi-Hypothesis based Distributed Video Coding using LDPC Codes Multi-Hypothesis based Distributed Video Coding using LDPC Codes Kiran Misra, Shirish Karande, Hayder Radha Department of Electrical and Computer Engineering 2120, Engineering Building Michigan State University

More information