LDPC codes for the Cascaded BSC-BAWGN channel

Size: px
Start display at page:

Download "LDPC codes for the Cascaded BSC-BAWGN channel"

Transcription

1 LDPC codes for the Cascaded BSC-BAWGN channel Aravind R. Iyengar, Paul H. Siegel, and Jack K. Wolf University of California, San Diego 9500 Gilman Dr. La Jolla CA 9093 Abstract We study the erformance of LDPC codes over the cascaded BSC-BAWGN channel. This channel belongs to a family of binary-inut, memoryless, symmetric-outut channels, one that we call the CBMSC(,) family. We analyze the belief roagation (BP) decoder over this channel by characterizing the decodable region of an ensemble of LDPC codes. We then give inner and outer bounds for this decodable region based on existing universal bounds on the erformance of a BP decoder. We numerically evaluate the decodable region using density evolution. We also roose other message-assing schemes of interest and give their decodable regions. The erformance of each roosed decoder over the CBMS channel family is evaluated through simulations. Finally, we exlore caacity-aroaching LDPC code ensembles for the CBMSC(, ) family. I. INTRODUCTION Low-density arity-check (LDPC) codes [1], [] have been shown to achieve erformance close to caacity over binaryinut, memoryless, symmetric-outut (BMS [3]) channels like the binary erasure channel (BEC) [4], the binary symmetric channel (BSC) [5] and the binary-inut additive white Gaussian noise channel (BAWGNC) [5], [6], [7]. We consider a class of channels which belong to the same BMS channel family as the BEC, BSC and BAWGNC. Owing to this similarity, much of the terminology and notation used in this aer are reminiscent of the analysis of LDPC ensemble erformance in [3]. However, the channels under consideration exhibit certain differences from the BMS channels in [3] because of their multidimensional channel sace. This aer is organized as follows. In Section II, we introduce the CBMS(, ) channel family and discuss some characteristics of this family of channels. We then consider coding over this channel using LDPC codes and analyze the belief roagation (BP) decoder in Section III. On similar lines, we roose and analyze two other message-assing schemes in Section IV. We give exerimental results for the erformance of the three message-assing decoders in Section V. In Section VI, we exlore good LDPC codes for the CBMS(, ) channel. We conclude by summarizing our findings in Section VII. A. Cascaded channels II. THE CHANNEL MODEL A cascaded channel is one where the outut of one channel is fed as inut to another. The constituent channels of a cascaded channel are called subchannels. The inut of the cascaded channel is the inut to its first subchannel, and the outut is the outut of the last subchannel in the cascade. The oututs (res. inuts) of all subchannels other than the last (res. first) are inaccessible. Note that from the definition, it follows that two subchannels can be cascaded only if the outut alhabet of the first is the same as the inut alhabet of the next. We will assume that the cascaded channel consists of only two subchannels. A generalization to an arbitrary number of subchannels is straightforward. Further, we will call a cascaded channel a cascaded BMS (CBMS) channel if it is a cascade of a BMS channel with a memoryless, symmetric channel. It is easy to see that any CBMS channel is symmetric and memoryless. Since the inut to a CBMS channel is binary, CBMS channels belong to the family of BMS channels. However, unlike simle BMS channels 1, CBMS channels are arameterized by the fidelities of both the constituent subchannels. We note here that a CBMS channel could be a degraded BMS channel belonging to the same channel family as the first subchannel [8], e.g. a BAWGN channel followed by another AWGN channel will give a CBMS channel which is also a BAWGN channel with a larger noise variance. In this case the CBMS channel is in the same family as the first subchannel. However, a BAWGN channel followed by a Lalace channel is also a CBMS channel, one not belonging to the family of BAWGN channels. B. Cascaded BSC-BAWGN channel The cascaded BSC-BAWGN channel, as the name suggests, is a CBMS channel where the first subchannel is a BSC with crossover robability and the second subchannel is a BAWGNC with noise variance. It is denoted as CBMSC(, ) and is deicted in Figure 1. Note that the Fig. 1. The CBMS(, ) channel. channel sace for this channel is given as S = [0, 1/] R +. The family of channels over S is denoted CBMSC(, ). The caacity of cascaded channels has been considered under certain cases of interest in [9], [10], [11], [1]. Since 1 We will refer to BMS channels arameterized by a single variable as simle BMS channels.

2 the CBMS(, ) channels are BMS channels, the caacity of the family of these channels can be numerically evaluated [3]. Figure shows the contours of equal caacity in a subset of S. Though we write the arameters of the channel as the ordered air (, ) in accordance with the order of the subchannels, all figures in this aer are deicted with as the ordinate for convenience. Note that the extremal The CBMS(, ) channel can also model other scenarios like an earth-satellite-earth link with a simlistic hard-decision decoder on the satellite and a more owerful soft-decision decoder at the receiver on the earth. In general, all memoryless (multiho) relay channels with thresholding at intermediate nodes can be modeled as CBMS(, ) channels. D. Coding for the CBMS(, ) channel Owing to the asymtotically close-to-otimal erformance of LDPC codes over the subchannels of the CBMS(, ) channel, we will consider coding for the CBMS(, ) channel using LDPC codes and the erformance of these codes with iterative message-assing decoders with emhasis on the asymtotically bit-otimal BP decoder. Note that since message-assing schemes are in general hyothesized on some channel model, estimation of channel arameters lays a key role in decoding. In this case, this translates to the availability of good estimates for and the SNR (defined in db as SNR := 0 log) of the constituent subchannels of the CBMS(, ) channel, which will be assumed. Fig.. Contours of Caacity C(, ) of the family CBMSC(, ) in bits er channel use. channels in this family corresond to the families BSC() and BAWGNC() when = 0 and = 0 resectively. C. Motivation The motivation for considering the CBMS(, ) channel family comes from a new-generation magnetic recording media called bit atterned media (BPM). BPM is claimed to surass conventional magnetic recording media in storage caacities owing to its structure. The sueraramagnetic effect that makes it difficult to reduce the size of bit cells in conventional media is avoided by storing bits on magnetic islands isolated by non-magnetic material. However, this structure brings to fore the challenge of good timing and ositional synchronization of the write head during the write rocess. There is therefore a ossibility of writing data erroneously on the disk [13]. We model this write channel as a BSC, which is followed by a memoryless read channel modelled as a BAWGNC. The CBMS(, ) channel therefore serves as a first-order aroximation of the BPM channel the (coded) information X n (See Figure 1) gets written onto the disk as W n, which is then read as Y n. A more realistic model would be a similar write and read channel cascade where the subchannels have memory, which is a subject for future work. Throughout the aer, we will assume that information theoretic quantities like entroy and caacity are measured in terms of bits. III. THE BELIEF PROPAGATION DECODER Since the CBMS(, ) channel is a BMS channel, the Log- Likelihood Ratio (LLR) of the channel outut is a sufficient statistic for decoding [3]. The BP decoding scheme thus remains the same as in the case of simle BMS channels, excet for the initial channel LLR density. Hence, the analysis of the BP decoder over the CBMS(, ) channel can be erformed using the standard density evolution [3], [6], [8] of the LLR of the channel outut, i.e. the convergence to the tree channel, the restriction to the all-zero codeword and the concentration around the ensemble average arguments [3] can be carried forward to this case. In this case, we have the LLR l to be [ ] (1 )e l + l = ln (1) (1 ) + e l where l = y/, a function of the channel outut y. Note that in case of a BAWGNC, l gives the actual LLR (which can be readily seen by setting = 0). We fix a code ensemble [3] (λ, ρ), and define the decodable region of the ensemble as R (λ,ρ) := (, ) : P (,) (λ,ρ) = 0 () where P (,) (λ,ρ) denotes the robability that the message on a random edge of the Tanner grah of a code in the ensemble (λ, ρ) is in error, averaged over the ensemble, in the limit of infinite blocklength and infinite rounds of message-assing. The boundary of the decodable region is analogous to the threshold value of simle BMS channels [3], [8]. Whereas in the case of simle BMS channels the channel families are totally ordered by degradation [8], the CBMSC(, ) channel family is only artially ordered by degradation. We therefore devote attention to characterizing and bounding the decodable region of an LDPC code ensemble

3 for the family of CBMS(, ) channels. For comleteness, we revisit the definition of degradation. Definition 1 (Degraded channels): A channel Z X is outut degraded with resect to Y X if X Y Z, i.e. X, Y and Z form a Markov chain. A. Characterization of R (λ,ρ) The following can be deduced directly from the channel degradation argument of [8]. Lemma 1 (Monotonicity in ): If (, ) R (λ,ρ), then (, ) R (λ,ρ). In order to rove a similar monotonicity in the arameter, we construct a channel that is equivalent to the CBMS(, ) channel, but is degraded with resect to BAWGNC(). Note that it is not immediately obvious that the CBMS(, ) channel, as in Figure 1, is outut degraded with resect to BAWGNC(). Definition (Inut-distorted channels): Let X Y be a BSC with crossover robability, and let Y Z be any BMS channel with transition robability f Z Y. Then the channel Z X is said to be inut-distorted with resect to the channel Z Y. Note that any CBMS channel with its second subchannel being a BMS channel itself is an inut-distorted channel by definition. Theorem 1 (Equivalence of inut-distortion & degradation): Any inut-distorted channel X Y Z is degraded with resect to the channel Y Z. Proof: By definition, we have X X = ±1, Y Y = X, f Y X (y x) = (1 )δ(y x) + δ(y + x) for some [0, 1/], where δ(x) = f Z Y (z y). Then, f Z X (z x) = y Y f Y,Z X (y, z x) = y Y f Y X (y x)f Z Y (z y) 1 x = 0, and f Z Y ( z y) = 0 else = y Y(1 )δ(y x) + δ(y + x)f Z Y (z y) = (1 )f Z Y (z x) + f Z Y (z x) = (1 )f Z Y (z x) + f Z Y ( z x) (3) Consider the channel system Y Z W where the channel Y Z is given as before, and the channel Z W satisfies W W = Z and f W Z (w z) = (1 )δ(w z)+δ(w+z). Then f W Y (w y) = f Z,W Y (z, w y)dz z Z = f Z Y (z y)f W Z (w z)dz Z = (1 )f Z Y (w y) + f Z Y ( w y) (4) From (3) and (4), we have f Z X = f W Y. Since the channel Y Z degrades to Y W, we conclude that Y Z degrades to X Z. From Theorem 1 and the channel degradation argument of [8], we have the following lemma Lemma (Monotonicity in ): If (, ) R (λ,ρ), then (, ) R (λ,ρ). A consequence of Lemmas 1 and is that if a oint (, ) is found to be in R (λ,ρ), then we can conclude that all channel oints with a smaller and a smaller (oints to the left and below (, ) in the channel sace S ) are also guaranteed to belong to R (λ,ρ). B. Bounds for R (λ,ρ) We now give inner and outer bounds for the decodable region of a code ensemble based on existing universal bounds on the erformance of the BP decoder. Proosition 1 (Bhattacharyya outer bound): Let B (λ,ρ) = (, ) S : B(, ) < B (λ,ρ), where B(, ) is the Bhattacharyya constant [3] associated with the channel CBMSC(, ) and B (λ,ρ) := inf b(x) : b(x) x, x (0, 1], with x b(x) = ). λ( k ρ k 1 (1 x ) k 1 Then, R (λ,ρ) B (λ,ρ). Discussion This follows from the universal uer bound on the Bhattacharyya constant given in [14], [15]. First, any BMS channel is exressed as a convex combination of BSCs of crossover robabilities ranging from 0 to 1/. Noting that the check node rocessing for a density corresonding to a BSC gives the smallest Bhattacharyya constant for the outut density, the above uer bound on the Bhattacharyya arameter can be obtained. Proosition (Entroy outer bound): Let H(λ,ρ) = (, ) S : H(, ) < H (λ,ρ), where H(, ) is the entroy (channel equivocation) [3], [8], [16] associated with the channel CBMSC(, ) and H (λ,ρ) := inf h(x) : h(x) x, x (0, 1/], with h (x) h(x) = ( ( )), λ k ρ 1+(1 x) k 1 kh where h ( ) is the binary entroy function. Then, R (λ,ρ) H (λ,ρ). Discussion This follows from the best case of the extremes of information combining [16]. As in Proosition 1, the smallest entroy of the outut density is obtained for inut densities corresonding to BSC at the check node and BEC at the variable node. Using these best case densities, we obtain the uer bound for the entroy. Proosition 3 (Caacity outer bound): Let C(λ,ρ) := (, ) S : C(, ) > r(λ, ρ) wherec(, ) is the caacity of the channel CBMSC(, ) and r(λ, ρ) = 1 R 1 R0 ρ(x)dx 1 is λ(x)dx 0 the design rate of the code. Then R (λ,ρ) C (λ,ρ). Proof: Since the asymtotic (in blocklength) actual rate r of a code is equal to its design rate r [3], the result follows from the channel coding theorem.

4 Proosition 4 (Degradation outer bound): Let D(λ,ρ) = (, ) S : < (λ,ρ), < (λ,ρ), where (λ,ρ) is the threshold for the (λ, ρ) code ensemble over the family BAWGNC(), and (λ,ρ) is that over the family BSC(). Then, R (λ,ρ) D (λ,ρ). Proof: Suose to the contrary that P (,) (λ,ρ) = 0 for some > (λ,ρ). Then, since BAWGNC() degrades to CBMSC(, ), we have P (,0) (λ,ρ) = 0 (, 0) R (λ,ρ) which contradicts the assumtion that (λ,ρ) is the threshold for the BAWGN channel family. A similar argument holds for (λ,ρ). This bound is more easily stated as the contraositive of the claims made in Lemmas 1 and. Figure 3 shows the outer bounds discussed here for two code ensembles. The set B (λ,ρ) H (λ,ρ) C (λ,ρ) D (λ,ρ) is therefore an outer bound for the decodable region. We have observed that the Bhattacharyya bound and the entroy bound have been strictly looser than the caacity bound in all cases we considered, with the Bhattacharyya bound being the loosest. Proosition 5 (Bhattacharyya inner bound): Let B (λ,ρ) = (, ) S : B(, ) < B (λ,ρ), where B (λ,ρ) := infb(x) : b(x) x, x (0, 1], with b(x) = Then, B (λ,ρ) R (λ,ρ). x λ(1 ρ(1 x)). Discussion This follows from the universal lower bound on the Bhattacharyya constant of a BMS channel [14], [15]. In this case, the lower bound is obtained as in Proosition 1, by noting that the check node rocessing for a density corresonding to a BEC gives the largest Bhattacharyya constant for the outut density. Note that the above bound is tight for the BEC, in which case the Bhattacharyya constant is given by the channel erasure robability. The above definition of B (λ,ρ) therefore coincides with the definition of the threshold for the BEC in [3], [8]. Proosition 6 (Entroy inner bound): Let H (λ,ρ) = (, ) S : H(, ) < H (λ,ρ), where H (λ,ρ) := infh (), (0, 1/) : x (0, 1/) : h(x, ) 0, with ) h(x, ) = 1 h (x) ρ (1 ĥ(λ, x, ), ĥ(λ, x, ) = j ( ) j 1 x l (1 x) j 1 l h(, x, j, l), l λ j j 1 l=0 and h(, x, j, l) as in (5). Then, H (λ,ρ) R (λ,ρ). Discussion This follows from the worst case of the extremes of information combining [16]. As in Proosition, the lower bound is obtained by noting that the largest entroy of the outut density is obtained for inut densities corresonding to BEC at the check node and BSC at the variable node. Proosition 7 (Degradation inner bound): Let D (λ,ρ) = (, ) S : Q ( ) 1 < (λ,ρ) where (λ,ρ) is as in Proosition 4, a b = a(1 b) + b(1 a), a, b [0, 1/] D (λ,ρ) C (λ,ρ) H (λ,ρ) B (λ,ρ) (a) (3, 6) regular code ensemble λ(x) = x, ρ(x) = x x 10 3 D (λ,ρ) C (λ,ρ) H (λ,ρ) B (λ,ρ) (b) Rate-0.9 code ensemble otimized[5] for the BAWGNC λ(x) = x x x x x, ρ(x) = 0.5x x 45, henceforth referred to as the Otimized rate-0.9 code ensemble. Fig. 3. Outer bounds for the decodable region R (λ,ρ). The sets corresond to the region under the curves marked in the figure. and Q( ) is the Q-function of the standard normal distribution. Then, D (λ,ρ) R (λ,ρ). Proof: Let X Y Z be the CBMS(, ) channel. Consider the channel X Y Z W, where W = +1, Z 0 sgn(z) =. We have W W = ±1 = X, 1, Z < 0 and W X (w x) = (1 )δ(w x) + δ(w + x), with = Q ( 1 ). Thus, X W is a BSC with crossover robability. Thus, if < (λ,ρ), the threshold for the family BSC(),

5 " h(, x, j,l) = log «# " x j 1 l + (1 ) log 1 x 1 + «# x j 1 l. (5) 1 1 x we have P (λ,ρ) = 0. Since the channel X Z degrades to the channel X W, P (λ,ρ) = 0 P(,) (λ,ρ) = 0. Hence, if (, ) D (λ,ρ), then (, ) R (λ,ρ). Proosition 8 (Soft bit inner bound): Let S (λ,ρ) = (, ) S : S(, ) < 4 (λ,ρ) (1 (λ,ρ) ) where S(, ) is the Soft bit value [15] of the CBMS(, ) channel and (λ,ρ) is as in Proosition 4. Then, S (λ,ρ) R (λ,ρ). Discussion This follows from the one-dimensional noniterative bound based on the Soft bit value given in [15]. Figure 4 shows the inner bounds for the two code ensembles considered before. We note here that the degradation inner bound and the soft bit inner bound are tight on the -axis, i.e. on the -axis, the D and S bounds meet the D bound. The set B (λ,ρ) H (λ,ρ) D (λ,ρ) S (λ,ρ) is therefore an inner bound to the decodable region R (λ,ρ). Note that in the case of the (3, 6) regular code ensemble, the soft bit inner bound is tighter than all other inner bounds. This, however, is not true in the case of the otimized rate-0.9 code ensemble (See Figure 4). C. Decodable region The actual decodable region was found using density evolution. By fixing, we are guaranteed by Lemma the existence of a threshold the largest for which the decoder gives a zero error. The boundary of R (λ,ρ) is therefore estimated by finding the for a fixed set of values within the range [0, (λ,ρ) ], where (λ,ρ) is as in Proosition 4. This is shown in Figure 5 for our examle code ensembles. We conjecture that the decodable region of a code ensemble, like most of the bounds we have obtained, is a convex subset of the channel sace S x D (λ,ρ) S (λ,ρ) H (λ,ρ) B (λ,ρ) (a) (3, 6) regular code ensemble. IV. MESSAGE-PASSING In this section, we roose two alternative message-assing schemes to the BP decoder. The schemes and the motivation for considering them are discussed below. A. Decoding schemes Hard Decision decoder (HD): Here we threshold the outut of the CBMS(, ) channel and consider the channel to now function as a BSC with crossover robability = Q ( ) 1 where and Q( ) are as defined in Proosition 7. We then erform BP for this modified BSC. The rationale is that a good code for the BSC should be able to tackle the written-in errors well. Gaussian Noise decoder (GN): In this case, we have a decoder that ignores the first subchannel and erforms BP under the assumtion that the channel is a simle BAWGN channel. Analysing the erformance of this decoder is useful, e.g. in the case of magnetic recording, to understand the enalty aid in naively assuming that the information written on to a disk is error-free. Note that since we ignore the first 4 B (λ,ρ) H (λ,ρ) D (λ,ρ) S (λ,ρ) (b) Otimized rate 0.9 code ensemble. Fig. 4. Inner bounds for the decodable region R (λ,ρ). subchannel here, the estimation of is not necessary, and therefore the decoder is slightly less comlex than the other two decoders in this resect. B. Decodable regions The degradation inner bound D of the BP decoder gives the decodable region for the HD decoder. This is true because the construction in the roof of Proosition 7 is the same as the oeration erformed in the HD decoder.

6 (a) (3, 6) regular code ensemble. Fig. 6. Decodable regions for the BP, HD, and GN decoders for (3, 6) regular code ensemble. (b) Otimized rate 0.9 code ensemble. Fig. 5. BP Decodable region R (λ,ρ). For the GN decoder, since the decoder assumes a wrong channel model, we use density evolution with the LLR calculated as l = y/, where y is the channel outut conditioned on the transmission of a 1 f Y X (y 1) = 1 π 1 π (y 1) (1 )ex ( ) (y + 1) ex (. ) + In this case, we can make no claim of the monotonicity in of the decoder erformance. The decodable region for the GN decoder is found as in the case of the BP decoder, however by using the modified LLR density. In Figure 6, we give the decodable regions for the HD, GN and BP decoders for the (3, 6) regular code ensemble. We make two observations from this figure first, the nonmonotonicity of the erformance of the GN decoder aarent from the shae of its decodable region, and second, the similarity in the erformance of the HD and BP decoders for small (large SNR) and large. Also note that the decodable region of the GN decoder is another inner bound to the decodable region of the BP decoder. The non-monotonicity of the GN decoder in, for large enough is because the decoder in this case is being fooled into believing that the channel is reliable when it is not. For large and small, the erformance of the HD decoder and the BP decoder coincide because the CBMS channel in this case is very similar to the BSC, i.e. the behaviour of the cascaded channel is dominated by the behavior of the first subchannel. Also, as exected, the HD and the GN decoders are as good as the BP decoder when the channel is dominated by the BSC and the BAWGNC resectively. V. EXPERIMENTAL RESULTS In this section, we shall exlore the erformance of binary LDPC codes on the CBMS(, ) channel with the three different message-assing schemes roosed in earlier sections. A rate-1/ binary LDPC code of blocklength 4096 bits that was randomly samled (with multile edges between nodes avoided) from the Gallager (3, 6) regular ensemble was used to estimate the decoder erformance. The values used for ranged from 1% through 5%. Since the CBMS(, ) channel is memoryless, all the decoding schemes have the same comlexity and this comlexity scales as O(Ln(d v q + rd c q log q)) where L is the maximum number of iterations erformed, n is the blocklength of the

7 BP 1% % 3% 4% 5% HD 1% % 3% 4% 5% GN 1% % 3% 4% 5% Fig. 7. Performance of the decoders for increasing. = 1% BP HD GN = 3% BP HD GN = 5% BP HD GN Fig. 8. Performance comarison of the BP, HD, and GN decoders for different values. code, d v and d c are the maximum variable and check node degrees resectively in the Tanner grah of the code, r is the normalized redundancy of the code, given as r = 1 r where r is the design rate. q is the size of the Galois field over which the code is defined (q = ). Figure 7 shows the erformance of each decoder over the range of values. In Figure 8, we comare the three decoders for different values of. We see from Figure 8 that the BP decoder outerforms both the HD and the GN decoders, as exected. However, with increasing, the HD decoder erforms better than the GN decoder at high SNR values, i.e. as the channel becomes more like the BSC (small, large ), the HD decoder handles the channel better than the GN decoder. Note that beyond a certain, the erformance of the GN decoder is non-monotonic in, e.g. when = 5%, the first reduces and then increases with increasing SNR (See Figure 7). Also notice that the ga between the BP and the HD decoder (Figure 8) at a high SNR reduces as increases, going from 1.5 db when = 1% to 0.8 db when = 5%. These agree with the observations made in Section IV-B from the decodable regions of these decoders. VI. GOOD CODES FOR THE CBMS(, ) CHANNEL From Figure 3(b), we see that the otimized rate-0.9 code comes very close to achieving caacity on the BAWGNC

8 with a threshold of while caacity is C However, it falls well short of the caacity on the BSC. The threshold for this code on the BSC was observed to be while a caacity of 0.9 bits er channel use was achieved by a channel with C This suggests that a code otimized for the BAWGNC might be far from otimal on the BSC. In Figure 9, we show the decodable regions of the BP decoder for two code ensembles of rate 0.75, one otimized for the BAWGNC C g = (0.4035x x x x x x x, 0.5x x 16 ) with the decodable region R g, and another otimized for the BSC C s = ( x x x x x x, x 3 ) with decodable region R s. These otimized codes were obtained from [17] C (λ,ρ) R s R g Fig. 9. Decodable region estimates for the two otimized code ensembles C g and C s of rate Also shown in the figure is the caacity outer bound for the decodable region of a code of rate The ideal rate-0.75 code for the CBMSC(, ) family has C (λ,ρ) as its decodable region. We see from Figure 9 that the code otimized for the BSC erforms better (is closer to the caacity bound) than the code otimized for the BAWGNc excet near the - axis, i.e. the BAWGNC otimized code is suerior only when the channel is dominated by the BAWGN subchannel. This suggests that a good strategy to obtain good codes for the CBMS(, ) channel is to otimize a code for the BSC, rather than otimizing for the BAWGNC. A better scheme would be to otimize the degree distributions for a fixed rate code over both the BAWGNC and BSC simultaneously, which is clearly a more comlex otimization roblem. VII. CONCLUSION We have introduced a new class of BMS channels that model many scenarios including the BPM recording channel. We analyzed the theoretical decodable regions of LDPC codes under BP decoding over the family of CBMS(, ) channels by giving inner and outer bounds to the decodable region based on channel arameters like the entroy, the Bhattacharyya constant, the Soft bit value and the caacity, and also based on the channel ordering introduced by degradation. We also numerically estimated the decodable regions for three roosed message-assing decoders, including the BP decoder using density evolution. We conducted erformance estimation for a rate-1/ (3, 6)- regular LDPC code of blocklength 4096 bits with the three roosed message-assing schemes and showed the decoder characteristics suggested by theory. In articular, we showed that ignoring the BSC (as in the GN decoder) can result in a large enalty in erformance, more so when the channel SNR is high. By looking at codes otmized for the BSC and BAWGNC, we noted that otimizing a code over the BSC works better than otimizing for the BAWGNC. Both these suggest that the first subchannel, the BSC, lays a very key role in the CBMS(, ) channel, and any good code construction for the channel should take into account its effects. REFERENCES [1] R. G. Gallager, Low Density Parity Check Codes. Cambridge, Massachusetts: MIT Press, [] D. MacKay and R. Neal, Near Shannon limit erformance of low density arity check codes, Electronics Letters, vol. 33, no. 6, , Mar [3] T. Richardson and R. Urbanke, Modern Coding Theory. Cambridge University Press, 008. [4] M. Luby, M. Mitzenmacher, M. Shokrollahi, and D. Sielman, Efficient erasure correcting codes, IEEE Trans. Inform. Theory, vol. 47, no., , Feb 001. [5] A. Amraoui, Asymtotic and finite-length otimization of LDPC codes, Ph.D. dissertation, EPFL, Switzerland, 006. [6] S.-Y. Chung, J. Forney, G.D., T. Richardson, and R. Urbanke, On the design of low-density arity-check codes within db of the Shannon limit, Communications Letters, IEEE, vol. 5, no., , Feb 001. [7] S.-Y. Chung, On the construction of some caacity achieving coding schemes, Ph.D. dissertation, MIT, Cambridge, Massachusetts, 000. [8] T. Richardson and R. Urbanke, The caacity of low-density aritycheck codes under message-assing decoding, IEEE Trans. Inform. Theory, vol. 47, no., , Feb 001. [9] C. A. Desoer, Communication through channels in cascade, Ph.D. dissertation, MIT, Cambridge, Massachusetts, [10] R. Silverman, On binary channels and their cascades, IRE Trans. Inform. Theory, vol. 1, no. 3,. 19 7, December [11] M. Simon, On the caacity of a cascade of identical discrete memoryless nonsingular channels (corres.), IEEE Trans. Inform. Theory, vol. 16, no. 1, , Jan [1] A. Kiely and J. Coffey, On the caacity of a cascade of channels, IEEE Trans. Inform. Theory, vol. 39, no. 4, , Jul [13] B. Livshitz, A. Inomata, H. N. Bertram, and V. Lomakin, Semianalytical aroach for analysis of in conventional and staggered bit atterned media, IEEE Trans. Magnetics (Acceted), 009. [14] A. Khandekar and R. J. McEliece, A lower bound on the iterative decoding threshold of irregular LDPC code ensembles, in Proc. 36th Conf. Information Sciences and Systems, Princeton, New Jersey, Mar. 00. [15] C.-C. Wang, S. R. Kulkarni, and H. V. Poor, Finite-dimensional bounds on Z m and binary LDPC codes with belief roagation decoders, IEEE Trans. Inform. Theory, vol. 53, no. 1, , Jan [16] I. Sutskover, S. Shamai, and J. Ziv, Extremes of information combining, IEEE Trans. Inform. Theory, vol. 51, no. 4, , Aril 005. [17] A. Amraoui and R. Urbanke, LDPCOt, Accessed June 9, 009, htt://igdemos.efl.ch/ldcot/.

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel

Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel Ohad Barak, David Burshtein and Meir Feder School of Electrical Engineering Tel-Aviv University Tel-Aviv 69978, Israel Abstract

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

On Generalized EXIT Charts of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels

On Generalized EXIT Charts of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels 2012 IEEE International Symposium on Information Theory Proceedings On Generalied EXIT Charts of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels H Mamani 1, H Saeedi 1, A Eslami

More information

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes EE229B - Final Project Capacity-Approaching Low-Density Parity-Check Codes Pierre Garrigues EECS department, UC Berkeley garrigue@eecs.berkeley.edu May 13, 2005 Abstract The class of low-density parity-check

More information

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering

More information

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code.

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code. Convolutional Codes Goals Lecture Be able to encode using a convolutional code Be able to decode a convolutional code received over a binary symmetric channel or an additive white Gaussian channel Convolutional

More information

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits

More information

Interactive Hypothesis Testing Against Independence

Interactive Hypothesis Testing Against Independence 013 IEEE International Symosium on Information Theory Interactive Hyothesis Testing Against Indeendence Yu Xiang and Young-Han Kim Deartment of Electrical and Comuter Engineering University of California,

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

An Introduction to Low Density Parity Check (LDPC) Codes

An Introduction to Low Density Parity Check (LDPC) Codes An Introduction to Low Density Parity Check (LDPC) Codes Jian Sun jian@csee.wvu.edu Wireless Communication Research Laboratory Lane Dept. of Comp. Sci. and Elec. Engr. West Virginia University June 3,

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

Optimal Rate and Maximum Erasure Probability LDPC Codes in Binary Erasure Channel

Optimal Rate and Maximum Erasure Probability LDPC Codes in Binary Erasure Channel Optimal Rate and Maximum Erasure Probability LDPC Codes in Binary Erasure Channel H. Tavakoli Electrical Engineering Department K.N. Toosi University of Technology, Tehran, Iran tavakoli@ee.kntu.ac.ir

More information

Low-density parity-check codes

Low-density parity-check codes Low-density parity-check codes From principles to practice Dr. Steve Weller steven.weller@newcastle.edu.au School of Electrical Engineering and Computer Science The University of Newcastle, Callaghan,

More information

Training sequence optimization for frequency selective channels with MAP equalization

Training sequence optimization for frequency selective channels with MAP equalization 532 ISCCSP 2008, Malta, 12-14 March 2008 raining sequence otimization for frequency selective channels with MAP equalization Imed Hadj Kacem, Noura Sellami Laboratoire LEI ENIS, Route Sokra km 35 BP 3038

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Analysis of Sum-Product Decoding of Low-Density Parity-Check Codes Using a Gaussian Approximation

Analysis of Sum-Product Decoding of Low-Density Parity-Check Codes Using a Gaussian Approximation IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 2, FEBRUARY 2001 657 Analysis of Sum-Product Decoding of Low-Density Parity-Check Codes Using a Gaussian Approximation Sae-Young Chung, Member, IEEE,

More information

LOW-density parity-check (LDPC) codes were invented

LOW-density parity-check (LDPC) codes were invented IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 1, JANUARY 2008 51 Extremal Problems of Information Combining Yibo Jiang, Alexei Ashikhmin, Member, IEEE, Ralf Koetter, Senior Member, IEEE, and Andrew

More information

On the Typicality of the Linear Code Among the LDPC Coset Code Ensemble

On the Typicality of the Linear Code Among the LDPC Coset Code Ensemble 5 Conference on Information Sciences and Systems The Johns Hopkins University March 16 18 5 On the Typicality of the Linear Code Among the LDPC Coset Code Ensemble C.-C. Wang S.R. Kulkarni and H.V. Poor

More information

Construction of High-Girth QC-LDPC Codes

Construction of High-Girth QC-LDPC Codes MITSUBISHI ELECTRIC RESEARCH LABORATORIES htt://wwwmerlcom Construction of High-Girth QC-LDPC Codes Yige Wang, Jonathan Yedidia, Stark Draer TR2008-061 Setember 2008 Abstract We describe a hill-climbing

More information

Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes

Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes Xiaojie Zhang and Paul H. Siegel University of California, San Diego, La Jolla, CA 9093, U Email:{ericzhang, psiegel}@ucsd.edu

More information

EE/Stats 376A: Information theory Winter Lecture 5 Jan 24. Lecturer: David Tse Scribe: Michael X, Nima H, Geng Z, Anton J, Vivek B.

EE/Stats 376A: Information theory Winter Lecture 5 Jan 24. Lecturer: David Tse Scribe: Michael X, Nima H, Geng Z, Anton J, Vivek B. EE/Stats 376A: Information theory Winter 207 Lecture 5 Jan 24 Lecturer: David Tse Scribe: Michael X, Nima H, Geng Z, Anton J, Vivek B. 5. Outline Markov chains and stationary distributions Prefix codes

More information

An Introduction to Low-Density Parity-Check Codes

An Introduction to Low-Density Parity-Check Codes An Introduction to Low-Density Parity-Check Codes Paul H. Siegel Electrical and Computer Engineering University of California, San Diego 5/ 3/ 7 Copyright 27 by Paul H. Siegel Outline Shannon s Channel

More information

ECEN 655: Advanced Channel Coding

ECEN 655: Advanced Channel Coding ECEN 655: Advanced Channel Coding Course Introduction Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 655: Advanced Channel Coding 1 / 19 Outline 1 History

More information

Why We Can Not Surpass Capacity: The Matching Condition

Why We Can Not Surpass Capacity: The Matching Condition Why We Can Not Surpass Capacity: The Matching Condition Cyril Méasson EPFL CH-1015 Lausanne cyril.measson@epfl.ch, Andrea Montanari LPT, ENS F-75231 Paris montanar@lpt.ens.fr Rüdiger Urbanke EPFL CH-1015

More information

Coding Along Hermite Polynomials for Gaussian Noise Channels

Coding Along Hermite Polynomials for Gaussian Noise Channels Coding Along Hermite olynomials for Gaussian Noise Channels Emmanuel A. Abbe IG, EFL Lausanne, 1015 CH Email: emmanuel.abbe@efl.ch Lizhong Zheng LIDS, MIT Cambridge, MA 0139 Email: lizhong@mit.edu Abstract

More information

Practical Polar Code Construction Using Generalised Generator Matrices

Practical Polar Code Construction Using Generalised Generator Matrices Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

Enhancing Binary Images of Non-Binary LDPC Codes

Enhancing Binary Images of Non-Binary LDPC Codes Enhancing Binary Images of Non-Binary LDPC Codes Aman Bhatia, Aravind R Iyengar, and Paul H Siegel University of California, San Diego, La Jolla, CA 92093 0401, USA Email: {a1bhatia, aravind, psiegel}@ucsdedu

More information

Improving on the Cutset Bound via a Geometric Analysis of Typical Sets

Improving on the Cutset Bound via a Geometric Analysis of Typical Sets Imroving on the Cutset Bound via a Geometric Analysis of Tyical Sets Ayfer Özgür Stanford University CUHK, May 28, 2016 Joint work with Xiugang Wu (Stanford). Ayfer Özgür (Stanford) March 16 1 / 33 Gaussian

More information

Slepian-Wolf Code Design via Source-Channel Correspondence

Slepian-Wolf Code Design via Source-Channel Correspondence Slepian-Wolf Code Design via Source-Channel Correspondence Jun Chen University of Illinois at Urbana-Champaign Urbana, IL 61801, USA Email: junchen@ifpuiucedu Dake He IBM T J Watson Research Center Yorktown

More information

LDPC Code Ensembles that Universally Achieve Capacity under BP Decoding: A Simple Derivation

LDPC Code Ensembles that Universally Achieve Capacity under BP Decoding: A Simple Derivation LDPC Code Ensembles that Universally Achieve Capacity under BP Decoding: A Simple Derivation Anatoly Khina EE Systems Dept., TAU Tel Aviv, Israel Email: anatolyk@eng.tau.ac.il Yair Yona Dept. of EE, UCLA

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Time-invariant LDPC convolutional codes

Time-invariant LDPC convolutional codes Time-invariant LDPC convolutional codes Dimitris Achlioptas, Hamed Hassani, Wei Liu, and Rüdiger Urbanke Department of Computer Science, UC Santa Cruz, USA Email: achlioptas@csucscedu Department of Computer

More information

Lecture 4 : Introduction to Low-density Parity-check Codes

Lecture 4 : Introduction to Low-density Parity-check Codes Lecture 4 : Introduction to Low-density Parity-check Codes LDPC codes are a class of linear block codes with implementable decoders, which provide near-capacity performance. History: 1. LDPC codes were

More information

Iterative Encoding of Low-Density Parity-Check Codes

Iterative Encoding of Low-Density Parity-Check Codes Iterative Encoding of Low-Density Parity-Check Codes David Haley, Alex Grant and John Buetefuer Institute for Telecommunications Research University of South Australia Mawson Lakes Blvd Mawson Lakes SA

More information

Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals

Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals Samling and Distortion radeoffs for Bandlimited Periodic Signals Elaheh ohammadi and Farokh arvasti Advanced Communications Research Institute ACRI Deartment of Electrical Engineering Sharif University

More information

An Introduction to Algorithmic Coding Theory

An Introduction to Algorithmic Coding Theory An Introduction to Algorithmic Coding Theory M. Amin Shokrollahi Bell Laboratories Part : Codes - A puzzle What do the following problems have in common? 2 Problem : Information Transmission MESSAGE G

More information

Successive Cancellation Decoding of Single Parity-Check Product Codes

Successive Cancellation Decoding of Single Parity-Check Product Codes Successive Cancellation Decoding of Single Parity-Check Product Codes Mustafa Cemil Coşkun, Gianluigi Liva, Alexandre Graell i Amat and Michael Lentmaier Institute of Communications and Navigation, German

More information

Decoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version

Decoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY 1998 133 Decoding Linear Block Codes Using a Priority-First Search Performance Analysis Subotimal Version Yunghsiang S. Han, Member, IEEE, Carlos

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor

Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor Pravin Salunkhe, Prof D.P Rathod Department of Electrical Engineering, Veermata Jijabai

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Introduction to Low-Density Parity Check Codes. Brian Kurkoski

Introduction to Low-Density Parity Check Codes. Brian Kurkoski Introduction to Low-Density Parity Check Codes Brian Kurkoski kurkoski@ice.uec.ac.jp Outline: Low Density Parity Check Codes Review block codes History Low Density Parity Check Codes Gallager s LDPC code

More information

The decision-feedback equalizer optimization for Gaussian noise

The decision-feedback equalizer optimization for Gaussian noise Journal of Theoretical and Alied Comuter Science Vol. 8 No. 4 4. 5- ISSN 99-634 (rinted 3-5653 (online htt://www.jtacs.org The decision-feedback eualizer otimization for Gaussian noise Arkadiusz Grzbowski

More information

Aalborg Universitet. Bounds on information combining for parity-check equations Land, Ingmar Rüdiger; Hoeher, A.; Huber, Johannes

Aalborg Universitet. Bounds on information combining for parity-check equations Land, Ingmar Rüdiger; Hoeher, A.; Huber, Johannes Aalborg Universitet Bounds on information combining for parity-check equations Land, Ingmar Rüdiger; Hoeher, A.; Huber, Johannes Published in: 2004 International Seminar on Communications DOI link to publication

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Belief-Propagation Decoding of LDPC Codes

Belief-Propagation Decoding of LDPC Codes LDPC Codes: Motivation Belief-Propagation Decoding of LDPC Codes Amir Bennatan, Princeton University Revolution in coding theory Reliable transmission, rates approaching capacity. BIAWGN, Rate =.5, Threshold.45

More information

Bounds on the Performance of Belief Propagation Decoding

Bounds on the Performance of Belief Propagation Decoding Bounds on the Performance of Belief Propagation Decoding David Burshtein and Gadi Miller Dept. of Electrical Engineering Systems Tel-Aviv University Tel-Aviv 69978, Israel Email: burstyn@eng.tau.ac.il,

More information

On the Block Error Probability of LP Decoding of LDPC Codes

On the Block Error Probability of LP Decoding of LDPC Codes On the Block Error Probability of LP Decoding of LDPC Codes Ralf Koetter CSL and Dept. of ECE University of Illinois at Urbana-Champaign Urbana, IL 680, USA koetter@uiuc.edu Pascal O. Vontobel Dept. of

More information

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Brian M. Kurkoski, Paul H. Siegel, and Jack K. Wolf Department of Electrical and Computer Engineering

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

Capacity-Achieving Ensembles for the Binary Erasure Channel With Bounded Complexity

Capacity-Achieving Ensembles for the Binary Erasure Channel With Bounded Complexity Capacity-Achieving Ensembles for the Binary Erasure Channel With Bounded Complexity Henry D. Pfister, Member, Igal Sason, Member, and Rüdiger Urbanke Abstract We present two sequences of ensembles of non-systematic

More information

LIMITATIONS OF RECEPTRON. XOR Problem The failure of the perceptron to successfully simple problem such as XOR (Minsky and Papert).

LIMITATIONS OF RECEPTRON. XOR Problem The failure of the perceptron to successfully simple problem such as XOR (Minsky and Papert). LIMITATIONS OF RECEPTRON XOR Problem The failure of the ercetron to successfully simle roblem such as XOR (Minsky and Paert). x y z x y z 0 0 0 0 0 0 Fig. 4. The exclusive-or logic symbol and function

More information

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Shu Lin, Shumei Song, Lan Lan, Lingqi Zeng and Ying Y Tai Department of Electrical & Computer Engineering University of California,

More information

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen

More information

An Efficient Maximum Likelihood Decoding of LDPC Codes Over the Binary Erasure Channel

An Efficient Maximum Likelihood Decoding of LDPC Codes Over the Binary Erasure Channel IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO. 11, NOVEMBER 24 1 An Efficient Maximum Likelihood Decoding of LDPC Codes Over the Binary Erasure Channel David Burshtein and Gadi Miller School of Electrical

More information

Distributed K-means over Compressed Binary Data

Distributed K-means over Compressed Binary Data 1 Distributed K-means over Comressed Binary Data Elsa DUPRAZ Telecom Bretagne; UMR CNRS 6285 Lab-STICC, Brest, France arxiv:1701.03403v1 [cs.it] 12 Jan 2017 Abstract We consider a networ of binary-valued

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

Inequalities for the L 1 Deviation of the Empirical Distribution

Inequalities for the L 1 Deviation of the Empirical Distribution Inequalities for the L 1 Deviation of the Emirical Distribution Tsachy Weissman, Erik Ordentlich, Gadiel Seroussi, Sergio Verdu, Marcelo J. Weinberger June 13, 2003 Abstract We derive bounds on the robability

More information

The Compound Capacity of Polar Codes

The Compound Capacity of Polar Codes The Compound Capacity of Polar Codes S. Hamed Hassani, Satish Babu Korada and Rüdiger Urbanke arxiv:97.329v [cs.it] 9 Jul 29 Abstract We consider the compound capacity of polar codes under successive cancellation

More information

An algorithm to improve the error rate performance of Accumulate-Repeat-Accumulate codes Tae-Ui Kim

An algorithm to improve the error rate performance of Accumulate-Repeat-Accumulate codes Tae-Ui Kim An algorithm to improve the error rate performance of Accumulate-Repeat-Accumulate codes Tae-Ui Kim The Graduate School Yonsei University Department of Electrical and Electronic Engineering An algorithm

More information

Some Results on the Generalized Gaussian Distribution

Some Results on the Generalized Gaussian Distribution Some Results on the Generalized Gaussian Distribution Alex Dytso, Ronit Bustin, H. Vincent Poor, Daniela Tuninetti 3, Natasha Devroye 3, and Shlomo Shamai (Shitz) Abstract The aer considers information-theoretic

More information

HetNets: what tools for analysis?

HetNets: what tools for analysis? HetNets: what tools for analysis? Daniela Tuninetti (Ph.D.) Email: danielat@uic.edu Motivation Seven Ways that HetNets are a Cellular Paradigm Shift, by J. Andrews, IEEE Communications Magazine, March

More information

Error Exponent Region for Gaussian Broadcast Channels

Error Exponent Region for Gaussian Broadcast Channels Error Exponent Region for Gaussian Broadcast Channels Lihua Weng, S. Sandeep Pradhan, and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths Kasra Vakilinia, Dariush Divsalar*, and Richard D. Wesel Department of Electrical Engineering, University

More information

Spatially Coupled LDPC Codes

Spatially Coupled LDPC Codes Spatially Coupled LDPC Codes Kenta Kasai Tokyo Institute of Technology 30 Aug, 2013 We already have very good codes. Efficiently-decodable asymptotically capacity-approaching codes Irregular LDPC Codes

More information

ON THE MINIMUM DISTANCE OF NON-BINARY LDPC CODES. Advisor: Iryna Andriyanova Professor: R.. udiger Urbanke

ON THE MINIMUM DISTANCE OF NON-BINARY LDPC CODES. Advisor: Iryna Andriyanova Professor: R.. udiger Urbanke ON THE MINIMUM DISTANCE OF NON-BINARY LDPC CODES RETHNAKARAN PULIKKOONATTU ABSTRACT. Minimum distance is an important parameter of a linear error correcting code. For improved performance of binary Low

More information

Codes on graphs and iterative decoding

Codes on graphs and iterative decoding Codes on graphs and iterative decoding Bane Vasić Error Correction Coding Laboratory University of Arizona Prelude Information transmission 0 0 0 0 0 0 Channel Information transmission signal 0 0 threshold

More information

2012 IEEE International Symposium on Information Theory Proceedings

2012 IEEE International Symposium on Information Theory Proceedings Decoding of Cyclic Codes over Symbol-Pair Read Channels Eitan Yaakobi, Jehoshua Bruck, and Paul H Siegel Electrical Engineering Department, California Institute of Technology, Pasadena, CA 9115, USA Electrical

More information

Belief Propagation, Information Projections, and Dykstra s Algorithm

Belief Propagation, Information Projections, and Dykstra s Algorithm Belief Propagation, Information Projections, and Dykstra s Algorithm John MacLaren Walsh, PhD Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu

More information

The inverse Goldbach problem

The inverse Goldbach problem 1 The inverse Goldbach roblem by Christian Elsholtz Submission Setember 7, 2000 (this version includes galley corrections). Aeared in Mathematika 2001. Abstract We imrove the uer and lower bounds of the

More information

A Note on Guaranteed Sparse Recovery via l 1 -Minimization

A Note on Guaranteed Sparse Recovery via l 1 -Minimization A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector

More information

Distance Properties of Short LDPC Codes and Their Impact on the BP, ML and Near-ML Decoding Performance

Distance Properties of Short LDPC Codes and Their Impact on the BP, ML and Near-ML Decoding Performance Distance Properties of Short LDPC Codes and Their Impact on the BP, ML and Near-ML Decoding Performance Irina E. Bocharova 1,2, Boris D. Kudryashov 1, Vitaly Skachek 2, Yauhen Yakimenka 2 1 St. Petersburg

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

Bounds on Mutual Information for Simple Codes Using Information Combining

Bounds on Mutual Information for Simple Codes Using Information Combining ACCEPTED FOR PUBLICATION IN ANNALS OF TELECOMM., SPECIAL ISSUE 3RD INT. SYMP. TURBO CODES, 003. FINAL VERSION, AUGUST 004. Bounds on Mutual Information for Simple Codes Using Information Combining Ingmar

More information

LDPC Codes. Slides originally from I. Land p.1

LDPC Codes. Slides originally from I. Land p.1 Slides originally from I. Land p.1 LDPC Codes Definition of LDPC Codes Factor Graphs to use in decoding Decoding for binary erasure channels EXIT charts Soft-Output Decoding Turbo principle applied to

More information

Graph-based codes for flash memory

Graph-based codes for flash memory 1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background

More information

LDPC Codes. Intracom Telecom, Peania

LDPC Codes. Intracom Telecom, Peania LDPC Codes Alexios Balatsoukas-Stimming and Athanasios P. Liavas Technical University of Crete Dept. of Electronic and Computer Engineering Telecommunications Laboratory December 16, 2011 Intracom Telecom,

More information

The Least Degraded and the Least Upgraded Channel with respect to a Channel Family

The Least Degraded and the Least Upgraded Channel with respect to a Channel Family The Least Degraded and the Least Upgraded Channel with respect to a Channel Family Wei Liu, S. Hamed Hassani, and Rüdiger Urbanke School of Computer and Communication Sciences EPFL, Switzerland Email:

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

A t super-channel. trellis code and the channel. inner X t. Y t. S t-1. S t. S t+1. stages into. group two. one stage P 12 / 0,-2 P 21 / 0,2

A t super-channel. trellis code and the channel. inner X t. Y t. S t-1. S t. S t+1. stages into. group two. one stage P 12 / 0,-2 P 21 / 0,2 Capacity Approaching Signal Constellations for Channels with Memory Λ Aleksandar Kav»cić, Xiao Ma, Michael Mitzenmacher, and Nedeljko Varnica Division of Engineering and Applied Sciences Harvard University

More information

/12/$ IEEE 486

/12/$ IEEE 486 International Conference on Computing, Networking and Communications, Data Storage Technology and Applications Symposium Characterization and Error-Correcting Codes for TLC Flash Memories Eitan Yaakobi,

More information

Asynchronous Decoding of LDPC Codes over BEC

Asynchronous Decoding of LDPC Codes over BEC Decoding of LDPC Codes over BEC Saeid Haghighatshoar, Amin Karbasi, Amir Hesam Salavati Department of Telecommunication Systems, Technische Universität Berlin, Germany, School of Engineering and Applied

More information

Outline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding

Outline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding Outline EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Error detection using arity Hamming code for error detection/correction Linear Feedback Shift

More information

MAGNETIC recording channels are typically modeled

MAGNETIC recording channels are typically modeled Write Channel Model for Bit-Patterned Media Recording Aravind R. Iyengar, Paul H. Siegel, Fellow, IEEE and Jack K. Wolf, Life Fellow, IEEE arxiv:63v [cs.it] Oct Abstract We propose a new write channel

More information

THE ANALYTICAL DESCRIPTION OF REGULAR LDPC CODES CORRECTING ABILITY

THE ANALYTICAL DESCRIPTION OF REGULAR LDPC CODES CORRECTING ABILITY Transport and Telecommunication Vol. 5, no. 3, 04 Transport and Telecommunication, 04, volume 5, no. 3, 77 84 Transport and Telecommunication Institute, Lomonosova, Riga, LV-09, Latvia DOI 0.478/ttj-04-005

More information

Codes on graphs and iterative decoding

Codes on graphs and iterative decoding Codes on graphs and iterative decoding Bane Vasić Error Correction Coding Laboratory University of Arizona Funded by: National Science Foundation (NSF) Seagate Technology Defense Advanced Research Projects

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict

More information

THE development of efficient and simplified bounding

THE development of efficient and simplified bounding IEEE TRASACTIOS O IFORMATIO THEORY, VO. XX, O. XX, XXXX 4 ist ermutation invariant linear codes: Theory and Alications Kostis Xenoulis Abstract The class of q-ary list ermutation invariant linear codes

More information

56 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 1, JANUARY 2007

56 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 1, JANUARY 2007 56 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 1, JANUARY 2007 Finite-Dimensional Bounds on m Binary LDPC Codes With Belief Propagation Decoders Chih-Chun Wang, Member, IEEE, Sanjeev R. Kulkarni,

More information

Coding Techniques for Data Storage Systems

Coding Techniques for Data Storage Systems Coding Techniques for Data Storage Systems Thomas Mittelholzer IBM Zurich Research Laboratory /8 Göttingen Agenda. Channel Coding and Practical Coding Constraints. Linear Codes 3. Weight Enumerators and

More information

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST

More information

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Behzad Amiri Electrical Eng. Department University of California, Los Angeles Los Angeles, USA Email: amiri@ucla.edu Jorge Arturo Flores

More information