F can be used for two basic methods: pure error correction
|
|
- Tracy Wilcox
- 6 years ago
- Views:
Transcription
1 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 44, NO. 5, MAY Undetected Error Probabilities of Binary Primitive BCH Codes for Both Error Correction and Detection Min-Goo Kim, Member, IEEE, and Jae Hong Lee, Member, IEEE Abstract- In this paper, we investigate the undetected error probabilities for bounded-distance decoding of binary primitive BCH codes when they are used for both error correction and detection on a binary symmetric channel. We show that the undetected error probability of binary linear codes can be quite simplified and quantified if weight distribution of the code is binomial-like. We obtain bounds on the undetected error probability of binary primitive BCH codes by applying the result to the code and show that bounds are quantified by the deviation factor of true weight distribution from the binomial-like weight distribution. I. INTRODUCTION OR DATA communication systems, linear block codes F can be used for two basic methods: pure error correction and pure error detection [l, Ch. 41. Pure error detection incorporated with automatic-repeat-request (ARQ) has been widely used and hybrid ARQ systems have been developed where linear codes are used for both error correction and detection in order to enhance throughput of ARQ systems and to incorporate advantages of forward error correction (FEC) and ARQ. In these systems, good bounds on the undetected error probability is of theoretical and practical interest [2, Ch. 6, Ch It has been shown that undetected error probability can be computed theoretically from the weight distribution of (n,k) binary code by examining its 2k codewords or 2n-k codewords of its dual code. However, the computation becomes practically impossible as n, k, and n - k become large. Therefore, there have been many efforts to extract properties of undetected error probability using the weight enumerators of a code or its dual code, because it solves whether a code is useful for error detection or both error detection and correction. In [31 and [41, an (n,k;q) linear code in pure error detection was investigated and defined as proper code if undetected error probability of the code is upper bounded by q-(n-k)). In addition, some codes satisfying the bound are classified. In [5], more results on the upper bound were investigated for linear codes. In [6], necessary conditions were given on the weight distributions of an (n,k) binary linear code for undetected error probability to be upper bounded by 2-(n--k). Paper approved by T. Aulin, the Editor for Coding and Communications Theory of the IEEE Communications Society. Manuscript received November 17, 1994; revised June 21, 1995 and October 8, M. G. Kim was with the Department of Electronics Engineering, Seoul National University, Seoul, Korea. He is now with the Samsung Electronics Co., Seoul, Korea ( kimminguc3dosa.snu.ac.h). J. H. Lee is with the Department of Electronics Engineering, Seoul National University, Seoul, , Korea. Publisher Item Identifier S (96) /96$ IEEE In this paper, we consider what happens on the undetected error probability if weight distribution of a binary linear code is binomial-like. The undetected error probability for bounded-distance decoding of binary linear codes is easily derived when they are used for both error detection and correction. Let C be a t- errors correcting (n, k, t) binary linear code with the minimum Hamming distance of dmin where t satisfies 0 5 t 5 L(dmIn - 1)/2J. Suppose that the zero codeword is transmitted over a binary symmetric channel (BSC) with crossover probability E and all error patterns of weight of h are equally probable. The undetected error events then occur when received words lie within Hamming distance t from a nonzero codeword. It has been shown that Pud(E) is where &(h) is the decoder error probability which is defined as the ratio of number of words with weight h that lie within distance t from a codeword to number of words with weight k in the whole vector space [2, Ch. 61, [7, Ch. 11, [51. PE(~) is given by where t is the correcting radius of the decoder and Al is the number of codewords of weight 1 [S, Ch. 141, 191, [lo], [ll]. However, (1) is not manageable and it is difficult to verify the properties of Pud (E). In this paper, we will show that &(E) can be quantified by /? and reduces to a manageable form if Al is binomiallike such that Al = /? (7) although n, k, and n - k become large. With a fact that large subclasses of binary primitive BCH codes have approximate binomial-like weight distribution shown by Sidel'nikov et al., we will also derive bounds on PUd(e) for bounded-distance decoding of the code [12], [13]. In Section 11, we derive P%~(E) of binary linear codes with binomial-like weight distribution using the decoder error probability. In Section 111, we apply the results on P%~(E) to binary primitive BCH codes.
2 516 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 44, NO 5, MAY UNDETECTED ERROR PROBABILITY OF BINARY LINEAR CODES WITH BINOMIAL-LIKE WEIGHT DISTRIBUTION In this section, we derive the undetected error probability of binary linear codes by means of the decoder error probability and show that the undetected error probability is simplified if a code has binomial-like weight distribution. In most binary linear codes, weight distributions are unknown except for a small codelength code. However, if weight distribution of a binary linear code is binomial-like in a range of weight h, then PE(h) in (2) becomes a constant which is dependent on the error correcting capability of the code. The following theorem shows this fact. Theoreml: If Al is P(y),h - s h + s and 0 I s I h I n - s, then the decoder error probability PE (h) is for given dmin, then the decoder error probability is given by (1, n-t<h<n where Plde(h) and Pude(h) are given by Pro08 See Appendix A. From Theorem 1 and (l), we obtain the following result: if Al is binomial-like such that Al =,O (y), then PUd(e) reduces to and 0, elsewhere which is very simple and manageable. Furthermore, any bound that quantifies the deviation of the true weight distribution from the binomial distribution yields the bound on P.d ( E) quantified by P. Assume that the true weight distribution Al satisfies Pmin (7 ) I I Pmax (7) (5) where Pmin and Pmax denote the minimum and the maximum of P, respectively, then the undetected error probability is bounded as \ 0, elsewhere. Pro08 See Appendix B. In (9) and (lo), N(Z, h;s) is (10) Pud(t,Pmm) I Pud(~) I Pud(E,Pmax). (6) Thus, a method to provide more precise P can improve accuracy of bound on the undetected error probability. In binary linear codes, it has been shown that binary primitive BCH codes has binomial-like weight distribution [2, Ch. 61. Sidel'nikov et al. derived /3 of binary primitive BCH codes and Fujiwara et al. improved it [12], [13]. The details are given in the next section. In practical consideration, it is more general to assume that Ais are one for 1 = 0,n and Ais are P (7) for dmin n - d,,, [2, Ch. 61, [14, Ch. 71. We introduce a corollary to be useful in deriving Pud(E). Corollary 1 is derived from Theorem 1 with modified Al. Corollary 1: If Al is (0, elsewhere where s + h - 1 and s - h + 1 are positive integers. &de (h) and Pzlde( h) are erroneous terms for AZ = 0 in 1 5 I 5 dmin - 1 and n - d, n - 1, respectively, since Ais are actually zero in these ranges. Plde (h) is equal to Pude (n- h) due to symmetry of (9) and N(1, h; s) [S, Ch. 141, [ll], [15, Ch. 11. By inserting (8) into (l), we obtain &(E) of the code which is very close to (4) if Plde(h) and Pude(h) are small enough that they can be neglected. III. UNDETECTED ERROR PROBABILITY OF BINARY PRIMITIVE BCH CODES In this section, we apply the results in Section I1 to binary primitive BCH codes. The weight distributions of binary BCH codes are unknown except for some very low-rate binary BCH codes. However, for a large subclasses of binary primitive BCH codes, Sidel'nikov et al. have shown that the weights of the code have approximate binomial distribution [2, Ch. 61, [12], [13]. They showed that an (n, k, t) binary primitive BCH code of length n = 2" - 1 and the designed distance
3 2 ~ KIM AND LEE: UNDETECTED ERROR PROBABILITIES OF BINARY PRIMITIVE BCH CODES 571 dmin = 2t + 1, where 2t - 1 < 2r"I21 + 1, has weight distributions given by 1:: 1= < dmin A' 2-mt(;)(l + E(l)), dmin 5 15 Ln/2] (12) Ad, Ln/2] <1< n. In (12), E(1) is E(1) = { E:1, 1 is odd, and 2t Ln/2] 1 is even, and 2t Ln/2] (13) where El denotes an erroneous term of weight resulted from binomial approximation. Upper bound on I El I (or lezz I) was derived in [12] where a subscript of 2i was used instead of 1 here, and it is given by h(zp +?/L 7r 2i-1p=l - 1)[2(t - 1)]-2t where b(z) and C(u,x) are functions given in [12]. A more precise value of E2% is obtained by the improved linear programming method but it is not expressed by a closed form [13]. Therefore, we will use (14) in deriving the undetected error probability hereafter. From (12), we see that the deviation factor p of binary primitive BCH codes is 2-mt(l + E(1)). Let E,, be the maximum of IE(1)I then it yields Pmax = 2-mt(l + Emax) and Pmin = 2-mt( 1 - Emax). Thus, from (4) and (6), estimate of bounds on the undetected error probability are obtained as TABLE I DECODER ERROR PROBABILITY OFTHE (511, 493, 2) BCH CODE Bounds on Pdh) Weight h Lower UDEr Pe(h) x 10-l x IO-' x x 10-l x IO-' x x lo-' x10-l x W x lo-' x IO-' x x lo-' x lo-' x x x x x10-' x10-' x IO-' x10-l x lo-' x lo-' x in-' x io-' etc. etc. etc. 'The approximate decoder error probablllty = TdgO(r) = Xl0-l and the difference between upper and lower bounds on Pud(t) is also limited to 1% of (17). Equation (17) can be simplified further by bounds of the type considered in [l, pp , [2, Ch. 61. By inequality involving binomial coefficients, it is knownthatifp<x,o<p<l,andq= 1-p, then 2 < - 2-nE(X,p), providedp < X (18) i=xn a where E(X,p) is the relative entropy between the binary probability distribution X and p, i.e., E(X,P) = H(P) + (A - P)H'(P) - H(X) (19) = log,(vp) + (1- log2 ((1-4/(1 - P)) (20) where H(z) is the entropy function and H'(x) is dh(z)/dz [2, Ch. 61. Let An = (t + 1) then (17) reduces to and. h(l - )V (16) For (n,k,t) binary primitive BCH codes, it was shown that IE(1)I decreases to zero exponentially as n increases for fixed t, or as 1 approaches Ln/2] for fixed n and t [12], [13]. Thus, E, becomes zero if n is large. In [13], it was shown that some binary primitive BCH codes with large n have 1E(l)I < lop2 and are tabulated for various n and t. For these BCH codes, bounds on the undetected error probability become Pud( )!? 2-mt 2 (:) + s=o (:)ch(l (17) h=t+l Iv. EXAMPLES AND DISCUSSION The decoder error probabilities and the undetected error probabilities for some binary primitive BCH codes are calculated. Table I shows bounds on PE (h) and Plde( h) of (5 l l, 493, 2) BCH code. In Table I, it is shown that upper and lower bounds on PE(~) converge on x 10-1 (= 2-18 E:=, (':I) as h increases. In fact, for h > 12, upper and lower bounds are close to x 10-l. This indicates that the deviation of decoder error probability from 2Tmt E:=, ( y ) becomes negligible in this range of h. Table I1 shows that E, decreases exponentially as h approaches Ln/2] for (51 1, 493, 2) BCH code. The undetected error probabilities of binary primitive (51 1, 493, 2), (511, 484, 3), (1023, 1003, 2), and (1023, 993, 3) BCH codes are calculated. Assume that binary phase shift keying (BPSK) is used for transmission of coded symbols, and a coherent receiver is used for detection on an additive white
4 578 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 44, NO. 5, MAY 1996 TABLE I1 MAXIMUM RELATIVERROR OF THE DECODER ERROR PROBABILITY OF (511, 493, 2) BCH CODE ~~ h 7.8 9,lO ~ E, x10-l xlo-' xlo-' h 13,14 15,16 17,18... E, x ~ O - ~ x ~ O - ~ x1w8.. le-lo 1 E-1 1 Lower bound I 5 1E-06 ' 1E-07 U 1E E E-10 1 E-l 1 1E-12 - Upper bound Lower bound I 1E-13 ' i " ' Fig. 2. Undetected error probabilities of (1023, 1003, 2) BCH code and (1023, 993, 3) BCH code on AWGN channel. Fig. 1. Undetected error probabilities of (511, 493, 2) BCH code and (511, 484, 3) BCH code on AWGN channel. Gaussian noise (AWGN) channel. Fig. 1. shows the undetected error probabilities of (511, 493, 2) BCH code and (511, 484, 3) BCH code. It is shown that the undetected error probability of (511, 493, 2) BCH code is a constant which is close to x 10-1 (= 2-18 E:=, ("I)) for Eb/N, less than 3 db and decreases rapidly as $&/No increases. For a (511, 484, 3) BCH code, the constant is close to x lo-'. It is shown that the undetected error probability of (511, 484, 3) BCH code is less than that of (511, 493, 2) BCH code. Fig. 2 shows the undetected error probabilities of (1023, 1003, 2) and (1023, 993, 3) BCH code where constants are noted as x 10-1 and x 10-1 for (1023,1003,2) BCH code and (1023, 993, 3) BCH code, respectively. Bounds on the undetected error probability of (1023, 1003, 2) BCN code are much tighter than bounds of (511, 493, 2) BCH code since E, decreases as n increases. The undetected error probabilities of (511, 494, 2) BCH code and (1023, 1003, 2) BCH code are calculated when these codes are used for both error detection and correction with various correcting radius r, where 0 5 r, 5 t. Fig. 3 shows that the undetected error probability of (511, 493, 2) BCH code is a constant for Eb/N, less than 3 db whose value are close to x 10-1 (= 2-18 E:=, ('i')), x lop3 (= 2-18 E:=, ('il)), and x lop6 (= 2-18 E!=, (':')) for r, = 2,rc = l,rc = 0, respectively. The constant values decrease as much as r, is reduced since the unde- Fig. 3. Undetected error probabilities of (511, 493, 2) BCH code with correcting-radius bc = 0, T, = 1, T, = 2, on AWGN channel. tectable words decrease in proportional to r,. Fig. 4 shows the undetected error probability of (1023, 1003, 2) BCH code where constant values are close to x 10-1 (= 2-" E:=, ( x (= 2-" Et=, ( 'Osz3), and x (= 2rZ0 co s=o ( ) j for T, = 2, T, = 1, T, = 0, respectively. Difference between upper bound and low bound of (1023, 1003, 2) BCH code is smaller than that of (511, 493, 2) BCH code. Both Figs. 4 and 5 imply that it is effective to use a bounded-distance decoder with smallcorrecting radius for both error correction and detection when a channel is very noisy. v. SUMMARY AND CONCLUSIONS In this paper, we derived the undetected error probability Pud( t) for bounded-distance decoding of binary primitive BCH codes when they are used for both error correction and detection on a binary symmetric channel with crossover
5 KIM AND LEE: UNDETECTED ERROR PROBABILITIES OF BINARY PRIMITIVE BCH CODES E01 rc=2 1 E M rc= 1 M Upper bound Lower bound ( I I I I I I I I I I I I I I I I I 8 Fig. 4. Undetected error probabilities of (1023, 1003, 2) BCH code with correcting-radius T, = 0, rc = 1, r, = 2, on AWGN channel. probability E. We showed that the undetected error probability of binary linear code can be simplified and quantified by the deviation factor p of the true weight distribution from the binomial distribution if weight distribution of the code is binomial-like. We also showed that the undetected error probability is bounded by p as Pud(c,Pmin) 5 Pud(c) 5 PUd(, a,) and a method to provide more precise,8 would improve accuracy of Pud( 6 ). From the results, we showed that, for fixed t and with n = 2-1 and 2t - 1 < 2rm/ 1 + 1, the undetected error probability of (n, k, t) binary primitive BCH codes is close to 2Tmt E:=, (t) 2-nE(X+) when codelength is large. The undetected error probabilities were calculated for some binary primitive BCH codes. APPENDIX A PROOF OF THEOREM 1 Let Nh(s) be the inner most summation in (2) with Al = p ( ). Then, from the substitution of a = (s + h - 1)/2, we have h + ~ - 2 a.( s-a ) S a=o =a(;) a=o =a(;) (:) n! (A.3) a!(n - h - s + Q)!(s - a)!(h - a)! h!(n - h)! 2 a!(h - Q )!(S- a)!(n - h - s + a)! 04.4) where the last step is a general binomial identity. Inserting (A.6) into (2) then yields (3). APPENDIX B PROOF OF CCOROLLARY 1 i) d+t 5 h 5 n-d-t Al since I must be in d 5 I 5 n - d if d+ t 5 h 5 n - d - t. Thus, Theorem 1 yields PE(~) = E:=, (:). ii) t + 15 h 5 d + t + 1, n - d - t h 5 n - t - 1. With an assumption of Al = p (7) for n - 1, Theorem 1 yields PE(~) =,8 E:=, (:). However, Ais are actually zero in h - s 5 I 5 min(h + s,d - 1) and max(h - s,n - d + 1) h + s. Thus, enoneous terms for Al = 0 in these ranges should be corrected. The erroneous terms of decoder error probability for Al = 0 yields Plde(h) and Pude(h), respectively, and they are subtracted from p E:=, (t). iii) n - t 5 h 5 n. PE(h) is one since all-ones codeword covers all error pattems of weight h 2 n - t. ACKNOWLEDGMENT The authors would like to thank Dr. T. Aulin and the anonymous reviewers for their useful suggestions for improving the presentation of the material in this paper. REFERENCES [ 11 W. W. Peterson and E. J. Weldon Jr., Error-Correcting Codes, 2nd ed. Cambridge, MA: MIT Press, [2] S. Lin and D. J. Costello, Jr., Error Control Coding: Fundamentals and Applications. Englewood Cliffs, NJ: Prentice-Hall, [3] S. K. Leung-Yan-Cheong and M. E. Hellman, Concerning a bound on undetected error probability, IEEE Trans. Inform. Theory, vol. IT-22, pp , MA r41 _. S. K. Leung-Yan-Cheong, E. R. Barnes, and D. U. Friedman, On some properties Gf the undetected emor probability of linear codes, IEEE Trans. Inform. Theory, vol. IT-25, pp , Jan [SI J. K. Wolf, A. M. Michelson, and A. H. Levesque, On the probability of undetected error for linear block codes, IEEE Trans. Commun., vol. COM-30, no. 2, pp , Feb [6] P. Perry, Necessary conditions for good error detection, IEEE Trans. Inform. Theory, vol. IT-37, pp , Mar [7] F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes. Amsterdam, The Netherlands: North-Holland, [8] R. E. Blahut, Theory and Practice of Error Control Codes. Reading, MA: Addison-Wesley, [9] R. J. Mceliece and L. Swanson, On the decoder error probability for Reed-Solomon codes, IEEE Trans. Inform. Theory, vol. IT-32, no. 5, pp , Sept [lo] K. M. Cheung, More on the decoder error probability for Reed- Solomon codes, IEEE Trans. Inform. Theory, vol. 35, no. 4, _ pp. _ , July M. Huntoon and A. M. Michelson, On the computation of the probability of post-decoding error events for block codes, IEEE Trans. Inform. Theory, vol. IT-23, pp , May [12] T. Kasami, T. Fujiwara, and S. Lin, Approximation of the weight distribution of binary linear codes, IEEE Trans. Inform. Theory, vol. IT-31, no. 6, pp , Nov [I31 T. Fujiwara, T. Takata, T. Kasami, and S. Lin, An approximation to the weight distribution of binary BCH codes with designed distance 9 and 11, IEEE Trans. Inform. Theory. vol. IT-32, no. 5, pp , Sept [I41 A. M. Michelson and A. H. Levesque, Error-Control Techniques for Digital Communication. New York Wiley, [15] C. L. Liu, Introduction to Combinatorial Mathematics. New York McGraw-Hill, 1968.
6 580 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 44, NO. 5, MAY 1996 Min-Goo Kim (M 95) was born in Baekryung island, Korea, on August 20, He received the B.S. degree in electronics engineering from the Younsei University, Seoul, Korea in 1988, and the M.E. and Ph.D. degrees in electronics engineering from the Seoul National University, Seoul, Korea in 1990 and 1996, respectively. He has served as an Assistant Manager of the ASIC Center at the Corporate Technical Operations of the Samsung Electronics Co. Ltd., Suwon, Korea, since His primary research interest is the coding theory, especially the performances analysis of linear codes. His research interests also include digital communication and coding for storage systems. Dr. Kim is currently a member of the KITE. Jae Hong Lee (M 86) received the B.S. and M.S. degrees in electronics engineering from Seoul National University, Seoul, Korea, in 1976 and 1978, respectively. He received the Ph.D. degree in electrical engineering from the University of Michigan, Ann Arbor, MI, in From 1978 to 1981, he was with the Republic of Korea Naval Academy, Jinhae, Korea, as an Instructor and Lieutenant. In 1987, he joined the Department of Electronics Engineering at Seoul National University (SNU), Seoul, Korea where he is currently an Professor. He was a Member of Technical Staff at the AT&T Bell Laboratories, Whipany, NJ, during a sabbatical year of From 1992 to 1994, he served as the Chairman of the Department of Electronics Engineering at SNU. From 1992 to 1994, he served as the Head of Operation and Planning Division of the Institute of New Media and Communications at SNU for which he has also served as the Head of Wireless and Satellite Communications Research Division since His current research interests include communication and coding theory, spread spectrum system, and their applications to wireless communications, intelligent transportation systems, and information storage systems. Dr. Lee is a member of the KITE, KICS, and Tau Beta Pi.
PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes
359 PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes Ching-Lung CHR a),szu-linsu, Members, and Shao-Wei WU, Nonmember SUMMARY A low-complexity step-by-step decoding algorithm
More informationOn the properness of some optimal binary linear codes and their dual codes
Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 76-81 On the properness of some optimal binary linear codes and their dual codes Rossitza
More informationChapter 3 Linear Block Codes
Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and
More informationRON M. ROTH * GADIEL SEROUSSI **
ENCODING AND DECODING OF BCH CODES USING LIGHT AND SHORT CODEWORDS RON M. ROTH * AND GADIEL SEROUSSI ** ABSTRACT It is shown that every q-ary primitive BCH code of designed distance δ and sufficiently
More informationLecture 12. Block Diagram
Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data
More informationA Combinatorial Bound on the List Size
1 A Combinatorial Bound on the List Size Yuval Cassuto and Jehoshua Bruck California Institute of Technology Electrical Engineering Department MC 136-93 Pasadena, CA 9115, U.S.A. E-mail: {ycassuto,bruck}@paradise.caltech.edu
More informationAn Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission
An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission P.Mozhiarasi, C.Gayathri, V.Deepan Master of Engineering, VLSI design, Sri Eshwar College of Engineering, Coimbatore- 641 202,
More informationExistence of Cyclic Hadamard Difference Sets and its Relation to Binary Sequences with Ideal Autocorrelation
14 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL.1, NO.1, MARCH 1999 Existence of Cyclic Hadamard Difference Sets and its Relation to Binary Sequences with Ideal Autocorrelation Jeong-Heon Kim and Hong-Yeop
More informationOn the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,
More informationA Generalized Reverse Jacket Transform
684 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2001 A Generalized Reverse Jacket Transform Moon Ho Lee, Senior Member, IEEE, B. Sundar Rajan,
More informationAverage Coset Weight Distributions of Gallager s LDPC Code Ensemble
1 Average Coset Weight Distributions of Gallager s LDPC Code Ensemble Tadashi Wadayama Abstract In this correspondence, the average coset eight distributions of Gallager s LDPC code ensemble are investigated.
More informationEE 229B ERROR CONTROL CODING Spring 2005
EE 229B ERROR CONTROL CODING Spring 2005 Solutions for Homework 1 1. Is there room? Prove or disprove : There is a (12,7) binary linear code with d min = 5. If there were a (12,7) binary linear code with
More informationTHIS paper is aimed at designing efficient decoding algorithms
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBER 1999 2333 Sort-and-Match Algorithm for Soft-Decision Decoding Ilya Dumer, Member, IEEE Abstract Let a q-ary linear (n; k)-code C be used
More informationSolutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16
Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the
More informationVHDL Implementation of Reed Solomon Improved Encoding Algorithm
VHDL Implementation of Reed Solomon Improved Encoding Algorithm P.Ravi Tej 1, Smt.K.Jhansi Rani 2 1 Project Associate, Department of ECE, UCEK, JNTUK, Kakinada A.P. 2 Assistant Professor, Department of
More informationAn Application of Coding Theory into Experimental Design Construction Methods for Unequal Orthogonal Arrays
The 2006 International Seminar of E-commerce Academic and Application Research Tainan, Taiwan, R.O.C, March 1-2, 2006 An Application of Coding Theory into Experimental Design Construction Methods for Unequal
More informationChapter 7 Reed Solomon Codes and Binary Transmission
Chapter 7 Reed Solomon Codes and Binary Transmission 7.1 Introduction Reed Solomon codes named after Reed and Solomon [9] following their publication in 1960 have been used together with hard decision
More informationSPHERE PACKINGS CONSTRUCTED FROM BCH AND JUSTESEN CODES
SPHERE PACKINGS CONSTRUCTED FROM BCH AND JUSTESEN CODES N. J. A. SLOANE Abstract. Bose-Chaudhuri-Hocquenghem and Justesen codes are used to pack equa spheres in M-dimensional Euclidean space with density
More informationUpper Bounds on the Capacity of Binary Intermittent Communication
Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,
More informationError Correction Methods
Technologies and Services on igital Broadcasting (7) Error Correction Methods "Technologies and Services of igital Broadcasting" (in Japanese, ISBN4-339-06-) is published by CORONA publishing co., Ltd.
More informationError control of line codes generated by finite Coxeter groups
Error control of line codes generated by finite Coxeter groups Ezio Biglieri Universitat Pompeu Fabra, Barcelona, Spain Email: e.biglieri@ieee.org Emanuele Viterbo Monash University, Melbourne, Australia
More informationPractical Polar Code Construction Using Generalised Generator Matrices
Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:
More informationSOFT DECISION FANO DECODING OF BLOCK CODES OVER DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM
Journal of ELECTRICAL ENGINEERING, VOL. 63, NO. 1, 2012, 59 64 SOFT DECISION FANO DECODING OF BLOCK CODES OVER DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM H. Prashantha Kumar Udupi Sripati K. Rajesh
More informationSIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land
SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land Ingmar Land, SIPCom8-1: Information Theory and Coding (2005 Spring) p.1 Overview Basic Concepts of Channel Coding Block Codes I:
More informationHöst, Stefan; Johannesson, Rolf; Zigangirov, Kamil; Zyablov, Viktor V.
Active distances for convolutional codes Höst, Stefan; Johannesson, Rolf; Zigangirov, Kamil; Zyablov, Viktor V Published in: IEEE Transactions on Information Theory DOI: 101109/18749009 Published: 1999-01-01
More informationCSCI 2570 Introduction to Nanocomputing
CSCI 2570 Introduction to Nanocomputing Information Theory John E Savage What is Information Theory Introduced by Claude Shannon. See Wikipedia Two foci: a) data compression and b) reliable communication
More informationMaking Error Correcting Codes Work for Flash Memory
Making Error Correcting Codes Work for Flash Memory Part I: Primer on ECC, basics of BCH and LDPC codes Lara Dolecek Laboratory for Robust Information Systems (LORIS) Center on Development of Emerging
More information16.36 Communication Systems Engineering
MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication
More informationT linear programming to be applied successfully to error-correcting
1276 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 34, NO. 5, SEPTEMBER 1988 Inequalities for Covering Codes Abstract-Any code C with covering radius R must satisfy a set of linear inequalities that involve
More informationERROR CORRECTION BEYOND THE CONVENTIONAL ERROR BOUND FOR REED SOLOMON CODES
Journal of ELECTRICAL ENGINEERING, VOL. 54, NO. -2, 2003, 305 30 ERROR CORRECTION BEYOND THE CONVENTIONAL ERROR BOUND FOR REED SOLOMON CODES Sergey Egorov Garik Markarian A modification of Blahut procedure
More informationWhich Codes Have 4-Cycle-Free Tanner Graphs?
Which Codes Have 4-Cycle-Free Tanner Graphs? Thomas R. Halford Communication Sciences Institute University of Southern California Los Angeles, CA 90089-565 USA Alex J. Grant Institute for Telecommunications
More informationImproved Upper Bounds on Sizes of Codes
880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 4, APRIL 2002 Improved Upper Bounds on Sizes of Codes Beniamin Mounits, Tuvi Etzion, Senior Member, IEEE, and Simon Litsyn, Senior Member, IEEE
More informationWhich Codes Have 4-Cycle-Free Tanner Graphs?
Which Codes Have 4-Cycle-Free Tanner Graphs? Thomas R. Halford and Keith M. Chugg Communication Sciences Institute University of Southern California Los Angeles, CA 90089-565, USA Email: {halford, chugg}@usc.edu
More informationDesign and Stability Analysis of Single-Input Fuzzy Logic Controller
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART B: CYBERNETICS, VOL. 30, NO. 2, APRIL 2000 303 Design and Stability Analysis of Single-Input Fuzzy Logic Controller Byung-Jae Choi, Seong-Woo Kwak,
More informationArticle (peer-reviewed)
Title Author(s) Influence of noise intensity on the spectrum of an oscillator Swain, Rabi Sankar; Gleeson, James P.; Kennedy, Michael Peter Publication date 2005-11 Original citation Type of publication
More informationCode design: Computer search
Code design: Computer search Low rate codes Represent the code by its generator matrix Find one representative for each equivalence class of codes Permutation equivalences? Do NOT try several generator
More informationA Systematic Description of Source Significance Information
A Systematic Description of Source Significance Information Norbert Goertz Institute for Digital Communications School of Engineering and Electronics The University of Edinburgh Mayfield Rd., Edinburgh
More informationNew Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting
New Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting Hideki Yagi 1, Toshiyasu Matsushima 2, and Shigeichi Hirasawa 2 1 Media Network Center, Waseda University 1-6-1,
More informationUC Riverside UC Riverside Previously Published Works
UC Riverside UC Riverside Previously Published Works Title Soft-decision decoding of Reed-Muller codes: A simplied algorithm Permalink https://escholarship.org/uc/item/5v71z6zr Journal IEEE Transactions
More informationSensitivity Analysis of Coupled Resonator Filters
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 47, NO. 10, OCTOBER 2000 1017 Sensitivity Analysis of Coupled Resonator Filters Smain Amari, Member, IEEE Abstract
More informationConstructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach
Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Shu Lin, Shumei Song, Lan Lan, Lingqi Zeng and Ying Y Tai Department of Electrical & Computer Engineering University of California,
More informationOn the minimum distance of LDPC codes based on repetition codes and permutation matrices 1
Fifteenth International Workshop on Algebraic and Combinatorial Coding Theory June 18-24, 216, Albena, Bulgaria pp. 168 173 On the minimum distance of LDPC codes based on repetition codes and permutation
More informationNew algebraic decoding method for the (41, 21,9) quadratic residue code
New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,
More informationThese outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n
Binary Codes for synchronous DS-CDMA Stefan Bruck, Ulrich Sorger Institute for Network- and Signal Theory Darmstadt University of Technology Merckstr. 25, 6428 Darmstadt, Germany Tel.: 49 65 629, Fax:
More informationA Plane Wave Expansion of Spherical Wave Functions for Modal Analysis of Guided Wave Structures and Scatterers
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 51, NO. 10, OCTOBER 2003 2801 A Plane Wave Expansion of Spherical Wave Functions for Modal Analysis of Guided Wave Structures and Scatterers Robert H.
More informationOptimum Soft Decision Decoding of Linear Block Codes
Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is
More informationLecture 8: Shannon s Noise Models
Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecture 8: Shannon s Noise Models September 14, 2007 Lecturer: Atri Rudra Scribe: Sandipan Kundu& Atri Rudra Till now we have
More informationOn Two Probabilistic Decoding Algorithms for Binary Linear Codes
On Two Probabilistic Decoding Algorithms for Binary Linear Codes Miodrag Živković Abstract A generalization of Sullivan inequality on the ratio of the probability of a linear code to that of any of its
More informationOn the Relation between Outage Probability and Effective Frequency Diversity Order
Appl. Math. Inf. Sci. 8, No. 6, 2667-267 (204) 2667 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/0.2785/amis/080602 On the Relation between and Yongjune Kim, Minjoong
More informationIN this paper, we exploit the information given by the generalized
4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 10, OCTOBER 2006 A New Upper Bound on the Block Error Probability After Decoding Over the Erasure Channel Frédéric Didier Abstract Motivated by
More informationPermutation decoding for the binary codes from triangular graphs
Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for
More informationDispersion of the Gilbert-Elliott Channel
Dispersion of the Gilbert-Elliott Channel Yury Polyanskiy Email: ypolyans@princeton.edu H. Vincent Poor Email: poor@princeton.edu Sergio Verdú Email: verdu@princeton.edu Abstract Channel dispersion plays
More informationNew Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM)
International Journal of Computational Intelligence Research (IJCIR). ISSN: 097-87 Volume, Number 8 (207), pp. 205 2027 Research India Publications http://www.ripublication.com/ijcir.htm New Algebraic
More informationThe Effect of Memory Order on the Capacity of Finite-State Markov and Flat-Fading Channels
The Effect of Memory Order on the Capacity of Finite-State Markov and Flat-Fading Channels Parastoo Sadeghi National ICT Australia (NICTA) Sydney NSW 252 Australia Email: parastoo@student.unsw.edu.au Predrag
More informationStructured Low-Density Parity-Check Codes: Algebraic Constructions
Structured Low-Density Parity-Check Codes: Algebraic Constructions Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, California 95616 Email:shulin@ece.ucdavis.edu
More informationType I Codes over GF(4)
Type I Codes over GF(4) Hyun Kwang Kim San 31, Hyoja Dong Department of Mathematics Pohang University of Science and Technology Pohang, 790-784, Korea e-mail: hkkim@postech.ac.kr Dae Kyu Kim School of
More informationSome Extended Results on the Search for Good Convolutional Codes
1682 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 43, NO 5, SEPTEMBER 1997 Some Extended Results on the Search for Good Convolutional Codes Jinn-Ja Chang, Member, IEEE, Der-June Hwang, and Mao-Chao Lin,
More informationBinomial coefficient codes over W2)
Discrete Mathematics 106/107 (1992) 181-188 North-Holland 181 Binomial coefficient codes over W2) Persi Diaconis Harvard University, Cambridge, MA 02138, USA Ron Graham AT & T Bell Laboratories, Murray
More informationRCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths
RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths Kasra Vakilinia, Dariush Divsalar*, and Richard D. Wesel Department of Electrical Engineering, University
More informationLecture 4: Proof of Shannon s theorem and an explicit code
CSE 533: Error-Correcting Codes (Autumn 006 Lecture 4: Proof of Shannon s theorem and an explicit code October 11, 006 Lecturer: Venkatesan Guruswami Scribe: Atri Rudra 1 Overview Last lecture we stated
More informationOptimal matching in wireless sensor networks
Optimal matching in wireless sensor networks A. Roumy, D. Gesbert INRIA-IRISA, Rennes, France. Institute Eurecom, Sophia Antipolis, France. Abstract We investigate the design of a wireless sensor network
More informationarxiv: v1 [cs.it] 27 May 2017
Volume xx No 0x 20xx xxx-xxx doi:xxx ON SHORTENED AND PUNCTURED CYCLIC CODES arxiv:170509859v1 csit 27 May 2017 Arti Yardi IRIT/INP-ENSEEIHT University of Toulouse Toulouse France Ruud Pellikaan Department
More informationECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes
Kevin Buckley - 2010 109 ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes m GF(2 ) adder m GF(2 ) multiplier
More informationDecoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring
Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Antonio Aparecido de Andrade Department of Mathematics, IBILCE, UNESP, 15054-000, São José do Rio Preto, SP, Brazil E-mail:
More information(each row defines a probability distribution). Given n-strings x X n, y Y n we can use the absence of memory in the channel to compute
ENEE 739C: Advanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 6 (draft; 9/6/03. Error exponents for Discrete Memoryless Channels http://www.enee.umd.edu/ abarg/enee739c/course.html
More informationFast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm
Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm MARC A. ARMAND WEE SIEW YEN Department of Electrical & Computer Engineering National University
More informationVector spaces. EE 387, Notes 8, Handout #12
Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is
More informationDetermination of the Local Weight Distribution of Binary Linear Block Codes
Determination of the Local Weight Distribution of Binary Linear Block Codes Kenji Yasunaga and Toru Fujiwara, Member, IEEE Abstract Some methods to determine the local weight distribution of binary linear
More information4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE
4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER 2008 List Decoding of Biorthogonal Codes the Hadamard Transform With Linear Complexity Ilya Dumer, Fellow, IEEE, Grigory Kabatiansky,
More informationDr. Cathy Liu Dr. Michael Steinberger. A Brief Tour of FEC for Serial Link Systems
Prof. Shu Lin Dr. Cathy Liu Dr. Michael Steinberger U.C.Davis Avago SiSoft A Brief Tour of FEC for Serial Link Systems Outline Introduction Finite Fields and Vector Spaces Linear Block Codes Cyclic Codes
More informationApproaching Blokh-Zyablov Error Exponent with Linear-Time Encodable/Decodable Codes
Approaching Blokh-Zyablov Error Exponent with Linear-Time Encodable/Decodable Codes 1 Zheng Wang, Student Member, IEEE, Jie Luo, Member, IEEE arxiv:0808.3756v1 [cs.it] 27 Aug 2008 Abstract We show that
More informationSimplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey
2014 IJEDR Volume 2, Issue 1 ISSN: 2321-9939 Simplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey 1 Vivek Tilavat, 2 Dr.Yagnesh Shukla 1 PG Student,
More informationPerformance Analysis of Spread Spectrum CDMA systems
1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department
More informationMOMENT functions are used in several computer vision
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 8, AUGUST 2004 1055 Some Computational Aspects of Discrete Orthonormal Moments R. Mukundan, Senior Member, IEEE Abstract Discrete orthogonal moments
More informationBinary construction of quantum codes of minimum distances five and six
Discrete Mathematics 308 2008) 1603 1611 www.elsevier.com/locate/disc Binary construction of quantum codes of minimum distances five and six Ruihu Li a, ueliang Li b a Department of Applied Mathematics
More informationREED-SOLOMON CODE SYMBOL AVOIDANCE
Vol105(1) March 2014 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 13 REED-SOLOMON CODE SYMBOL AVOIDANCE T Shongwe and A J Han Vinck Department of Electrical and Electronic Engineering Science, University
More informationConstructions of MDS-Convolutional Codes
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 5, JULY 2001 2045 Constructions of MDS-Convolutional Codes Roxana Smarandache, Student Member, IEEE, Heide Gluesing-Luerssen, and Joachim Rosenthal,
More informationLower Bounds on the Graphical Complexity of Finite-Length LDPC Codes
Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International
More informationA NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1
BULLETIN (New Series) OF THE AMERICAN MATHEMATICAL SOCIETY Volume 23, Number 2, October 1990 A NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1 J. H. CONWAY AND N. J. A. SLOANE ABSTRACT.
More informationGeneral error locator polynomials for binary cyclic codes with t 2 and n < 63
General error locator polynomials for binary cyclic codes with t 2 and n < 63 April 22, 2005 Teo Mora (theomora@disi.unige.it) Department of Mathematics, University of Genoa, Italy. Emmanuela Orsini (orsini@posso.dm.unipi.it)
More informationCoding theory: Applications
INF 244 a) Textbook: Lin and Costello b) Lectures (Tu+Th 12.15-14) covering roughly Chapters 1,9-12, and 14-18 c) Weekly exercises: For your convenience d) Mandatory problem: Programming project (counts
More informationExplicit Ramsey graphs and orthonormal labelings
Explicit Ramsey graphs and orthonormal labelings Noga Alon Submitted: August 22, 1994; Accepted October 29, 1994 Abstract We describe an explicit construction of triangle-free graphs with no independent
More informationLecture 18: Gaussian Channel
Lecture 18: Gaussian Channel Gaussian channel Gaussian channel capacity Dr. Yao Xie, ECE587, Information Theory, Duke University Mona Lisa in AWGN Mona Lisa Noisy Mona Lisa 100 100 200 200 300 300 400
More informationCyclic Codes. Saravanan Vijayakumaran August 26, Department of Electrical Engineering Indian Institute of Technology Bombay
1 / 25 Cyclic Codes Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay August 26, 2014 2 / 25 Cyclic Codes Definition A cyclic shift
More informationAn Extremal Doubly Even Self-Dual Code of Length 112
An Extremal Doubly Even Self-Dual Code of Length 112 Masaaki Harada Department of Mathematical Sciences Yamagata University Yamagata 990 8560, Japan mharada@sci.kj.yamagata-u.ac.jp Submitted: Dec 29, 2007;
More informationEnumeration of Generalized Necklaces over F q
Enumeration of Generalized Necklaces over F q by Jumah Ali Algallaf B.Sc., King Fahd University of Petroleum and Minerals, Saudi Arabia, 2006 A Project Report Submitted in Partial Fulfillment of the Requirements
More informationELEC-E7240 Coding Methods L (5 cr)
Introduction ELEC-E7240 Coding Methods L (5 cr) Patric Östergård Department of Communications and Networking Aalto University School of Electrical Engineering Spring 2017 Patric Östergård (Aalto) ELEC-E7240
More informationThird-order nonlinearities of some biquadratic monomial Boolean functions
Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this
More informationOptimum Sampling Vectors for Wiener Filter Noise Reduction
58 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 50, NO. 1, JANUARY 2002 Optimum Sampling Vectors for Wiener Filter Noise Reduction Yukihiko Yamashita, Member, IEEE Absact Sampling is a very important and
More informationAn introduction to basic information theory. Hampus Wessman
An introduction to basic information theory Hampus Wessman Abstract We give a short and simple introduction to basic information theory, by stripping away all the non-essentials. Theoretical bounds on
More informationEstimates of the Distance Distribution of Codes and Designs
1050 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Estimates of the Distance Distribution of Codes Designs Alexei Ashikhmin, Member, IEEE, Alexer Barg, Senior Member, IEEE, Simon
More informationA Modified Baum Welch Algorithm for Hidden Markov Models with Multiple Observation Spaces
IEEE TRANSACTIONS ON SPEECH AND AUDIO PROCESSING, VOL. 9, NO. 4, MAY 2001 411 A Modified Baum Welch Algorithm for Hidden Markov Models with Multiple Observation Spaces Paul M. Baggenstoss, Member, IEEE
More informationError Exponent Region for Gaussian Broadcast Channels
Error Exponent Region for Gaussian Broadcast Channels Lihua Weng, S. Sandeep Pradhan, and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor, MI
More informationLow-complexity error correction in LDPC codes with constituent RS codes 1
Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 348-353 Low-complexity error correction in LDPC codes with constituent RS codes 1
More informationLow Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson
Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC August 2011 Ravi Motwani, Zion Kwok, Scott Nelson Agenda NAND ECC History Soft Information What is soft information How do we obtain
More informationAn Introduction to Low Density Parity Check (LDPC) Codes
An Introduction to Low Density Parity Check (LDPC) Codes Jian Sun jian@csee.wvu.edu Wireless Communication Research Laboratory Lane Dept. of Comp. Sci. and Elec. Engr. West Virginia University June 3,
More informationEVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS
EVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS Ramin Khalili, Kavé Salamatian LIP6-CNRS, Université Pierre et Marie Curie. Paris, France. Ramin.khalili, kave.salamatian@lip6.fr Abstract Bit Error
More information798 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 44, NO. 10, OCTOBER 1997
798 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL 44, NO 10, OCTOBER 1997 Stochastic Analysis of the Modulator Differential Pulse Code Modulator Rajesh Sharma,
More informationTHE SOMMERFELD problem of radiation of a short
296 IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 52, NO. 1, JANUARY 2004 Fast Multipole Representation of Green s Function for an Impedance Half-Space Kamal Sarabi, Fellow, IEEE, Il-Suek Koh Abstract
More informationChannel Coding I. Exercises SS 2017
Channel Coding I Exercises SS 2017 Lecturer: Dirk Wübben Tutor: Shayan Hassanpour NW1, Room N 2420, Tel.: 0421/218-62387 E-mail: {wuebben, hassanpour}@ant.uni-bremen.de Universität Bremen, FB1 Institut
More information