F can be used for two basic methods: pure error correction

Size: px
Start display at page:

Download "F can be used for two basic methods: pure error correction"

Transcription

1 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 44, NO. 5, MAY Undetected Error Probabilities of Binary Primitive BCH Codes for Both Error Correction and Detection Min-Goo Kim, Member, IEEE, and Jae Hong Lee, Member, IEEE Abstract- In this paper, we investigate the undetected error probabilities for bounded-distance decoding of binary primitive BCH codes when they are used for both error correction and detection on a binary symmetric channel. We show that the undetected error probability of binary linear codes can be quite simplified and quantified if weight distribution of the code is binomial-like. We obtain bounds on the undetected error probability of binary primitive BCH codes by applying the result to the code and show that bounds are quantified by the deviation factor of true weight distribution from the binomial-like weight distribution. I. INTRODUCTION OR DATA communication systems, linear block codes F can be used for two basic methods: pure error correction and pure error detection [l, Ch. 41. Pure error detection incorporated with automatic-repeat-request (ARQ) has been widely used and hybrid ARQ systems have been developed where linear codes are used for both error correction and detection in order to enhance throughput of ARQ systems and to incorporate advantages of forward error correction (FEC) and ARQ. In these systems, good bounds on the undetected error probability is of theoretical and practical interest [2, Ch. 6, Ch It has been shown that undetected error probability can be computed theoretically from the weight distribution of (n,k) binary code by examining its 2k codewords or 2n-k codewords of its dual code. However, the computation becomes practically impossible as n, k, and n - k become large. Therefore, there have been many efforts to extract properties of undetected error probability using the weight enumerators of a code or its dual code, because it solves whether a code is useful for error detection or both error detection and correction. In [31 and [41, an (n,k;q) linear code in pure error detection was investigated and defined as proper code if undetected error probability of the code is upper bounded by q-(n-k)). In addition, some codes satisfying the bound are classified. In [5], more results on the upper bound were investigated for linear codes. In [6], necessary conditions were given on the weight distributions of an (n,k) binary linear code for undetected error probability to be upper bounded by 2-(n--k). Paper approved by T. Aulin, the Editor for Coding and Communications Theory of the IEEE Communications Society. Manuscript received November 17, 1994; revised June 21, 1995 and October 8, M. G. Kim was with the Department of Electronics Engineering, Seoul National University, Seoul, Korea. He is now with the Samsung Electronics Co., Seoul, Korea ( kimminguc3dosa.snu.ac.h). J. H. Lee is with the Department of Electronics Engineering, Seoul National University, Seoul, , Korea. Publisher Item Identifier S (96) /96$ IEEE In this paper, we consider what happens on the undetected error probability if weight distribution of a binary linear code is binomial-like. The undetected error probability for bounded-distance decoding of binary linear codes is easily derived when they are used for both error detection and correction. Let C be a t- errors correcting (n, k, t) binary linear code with the minimum Hamming distance of dmin where t satisfies 0 5 t 5 L(dmIn - 1)/2J. Suppose that the zero codeword is transmitted over a binary symmetric channel (BSC) with crossover probability E and all error patterns of weight of h are equally probable. The undetected error events then occur when received words lie within Hamming distance t from a nonzero codeword. It has been shown that Pud(E) is where &(h) is the decoder error probability which is defined as the ratio of number of words with weight h that lie within distance t from a codeword to number of words with weight k in the whole vector space [2, Ch. 61, [7, Ch. 11, [51. PE(~) is given by where t is the correcting radius of the decoder and Al is the number of codewords of weight 1 [S, Ch. 141, 191, [lo], [ll]. However, (1) is not manageable and it is difficult to verify the properties of Pud (E). In this paper, we will show that &(E) can be quantified by /? and reduces to a manageable form if Al is binomiallike such that Al = /? (7) although n, k, and n - k become large. With a fact that large subclasses of binary primitive BCH codes have approximate binomial-like weight distribution shown by Sidel'nikov et al., we will also derive bounds on PUd(e) for bounded-distance decoding of the code [12], [13]. In Section 11, we derive P%~(E) of binary linear codes with binomial-like weight distribution using the decoder error probability. In Section 111, we apply the results on P%~(E) to binary primitive BCH codes.

2 516 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 44, NO 5, MAY UNDETECTED ERROR PROBABILITY OF BINARY LINEAR CODES WITH BINOMIAL-LIKE WEIGHT DISTRIBUTION In this section, we derive the undetected error probability of binary linear codes by means of the decoder error probability and show that the undetected error probability is simplified if a code has binomial-like weight distribution. In most binary linear codes, weight distributions are unknown except for a small codelength code. However, if weight distribution of a binary linear code is binomial-like in a range of weight h, then PE(h) in (2) becomes a constant which is dependent on the error correcting capability of the code. The following theorem shows this fact. Theoreml: If Al is P(y),h - s h + s and 0 I s I h I n - s, then the decoder error probability PE (h) is for given dmin, then the decoder error probability is given by (1, n-t<h<n where Plde(h) and Pude(h) are given by Pro08 See Appendix A. From Theorem 1 and (l), we obtain the following result: if Al is binomial-like such that Al =,O (y), then PUd(e) reduces to and 0, elsewhere which is very simple and manageable. Furthermore, any bound that quantifies the deviation of the true weight distribution from the binomial distribution yields the bound on P.d ( E) quantified by P. Assume that the true weight distribution Al satisfies Pmin (7 ) I I Pmax (7) (5) where Pmin and Pmax denote the minimum and the maximum of P, respectively, then the undetected error probability is bounded as \ 0, elsewhere. Pro08 See Appendix B. In (9) and (lo), N(Z, h;s) is (10) Pud(t,Pmm) I Pud(~) I Pud(E,Pmax). (6) Thus, a method to provide more precise P can improve accuracy of bound on the undetected error probability. In binary linear codes, it has been shown that binary primitive BCH codes has binomial-like weight distribution [2, Ch. 61. Sidel'nikov et al. derived /3 of binary primitive BCH codes and Fujiwara et al. improved it [12], [13]. The details are given in the next section. In practical consideration, it is more general to assume that Ais are one for 1 = 0,n and Ais are P (7) for dmin n - d,,, [2, Ch. 61, [14, Ch. 71. We introduce a corollary to be useful in deriving Pud(E). Corollary 1 is derived from Theorem 1 with modified Al. Corollary 1: If Al is (0, elsewhere where s + h - 1 and s - h + 1 are positive integers. &de (h) and Pzlde( h) are erroneous terms for AZ = 0 in 1 5 I 5 dmin - 1 and n - d, n - 1, respectively, since Ais are actually zero in these ranges. Plde (h) is equal to Pude (n- h) due to symmetry of (9) and N(1, h; s) [S, Ch. 141, [ll], [15, Ch. 11. By inserting (8) into (l), we obtain &(E) of the code which is very close to (4) if Plde(h) and Pude(h) are small enough that they can be neglected. III. UNDETECTED ERROR PROBABILITY OF BINARY PRIMITIVE BCH CODES In this section, we apply the results in Section I1 to binary primitive BCH codes. The weight distributions of binary BCH codes are unknown except for some very low-rate binary BCH codes. However, for a large subclasses of binary primitive BCH codes, Sidel'nikov et al. have shown that the weights of the code have approximate binomial distribution [2, Ch. 61, [12], [13]. They showed that an (n, k, t) binary primitive BCH code of length n = 2" - 1 and the designed distance

3 2 ~ KIM AND LEE: UNDETECTED ERROR PROBABILITIES OF BINARY PRIMITIVE BCH CODES 571 dmin = 2t + 1, where 2t - 1 < 2r"I21 + 1, has weight distributions given by 1:: 1= < dmin A' 2-mt(;)(l + E(l)), dmin 5 15 Ln/2] (12) Ad, Ln/2] <1< n. In (12), E(1) is E(1) = { E:1, 1 is odd, and 2t Ln/2] 1 is even, and 2t Ln/2] (13) where El denotes an erroneous term of weight resulted from binomial approximation. Upper bound on I El I (or lezz I) was derived in [12] where a subscript of 2i was used instead of 1 here, and it is given by h(zp +?/L 7r 2i-1p=l - 1)[2(t - 1)]-2t where b(z) and C(u,x) are functions given in [12]. A more precise value of E2% is obtained by the improved linear programming method but it is not expressed by a closed form [13]. Therefore, we will use (14) in deriving the undetected error probability hereafter. From (12), we see that the deviation factor p of binary primitive BCH codes is 2-mt(l + E(1)). Let E,, be the maximum of IE(1)I then it yields Pmax = 2-mt(l + Emax) and Pmin = 2-mt( 1 - Emax). Thus, from (4) and (6), estimate of bounds on the undetected error probability are obtained as TABLE I DECODER ERROR PROBABILITY OFTHE (511, 493, 2) BCH CODE Bounds on Pdh) Weight h Lower UDEr Pe(h) x 10-l x IO-' x x 10-l x IO-' x x lo-' x10-l x W x lo-' x IO-' x x lo-' x lo-' x x x x x10-' x10-' x IO-' x10-l x lo-' x lo-' x in-' x io-' etc. etc. etc. 'The approximate decoder error probablllty = TdgO(r) = Xl0-l and the difference between upper and lower bounds on Pud(t) is also limited to 1% of (17). Equation (17) can be simplified further by bounds of the type considered in [l, pp , [2, Ch. 61. By inequality involving binomial coefficients, it is knownthatifp<x,o<p<l,andq= 1-p, then 2 < - 2-nE(X,p), providedp < X (18) i=xn a where E(X,p) is the relative entropy between the binary probability distribution X and p, i.e., E(X,P) = H(P) + (A - P)H'(P) - H(X) (19) = log,(vp) + (1- log2 ((1-4/(1 - P)) (20) where H(z) is the entropy function and H'(x) is dh(z)/dz [2, Ch. 61. Let An = (t + 1) then (17) reduces to and. h(l - )V (16) For (n,k,t) binary primitive BCH codes, it was shown that IE(1)I decreases to zero exponentially as n increases for fixed t, or as 1 approaches Ln/2] for fixed n and t [12], [13]. Thus, E, becomes zero if n is large. In [13], it was shown that some binary primitive BCH codes with large n have 1E(l)I < lop2 and are tabulated for various n and t. For these BCH codes, bounds on the undetected error probability become Pud( )!? 2-mt 2 (:) + s=o (:)ch(l (17) h=t+l Iv. EXAMPLES AND DISCUSSION The decoder error probabilities and the undetected error probabilities for some binary primitive BCH codes are calculated. Table I shows bounds on PE (h) and Plde( h) of (5 l l, 493, 2) BCH code. In Table I, it is shown that upper and lower bounds on PE(~) converge on x 10-1 (= 2-18 E:=, (':I) as h increases. In fact, for h > 12, upper and lower bounds are close to x 10-l. This indicates that the deviation of decoder error probability from 2Tmt E:=, ( y ) becomes negligible in this range of h. Table I1 shows that E, decreases exponentially as h approaches Ln/2] for (51 1, 493, 2) BCH code. The undetected error probabilities of binary primitive (51 1, 493, 2), (511, 484, 3), (1023, 1003, 2), and (1023, 993, 3) BCH codes are calculated. Assume that binary phase shift keying (BPSK) is used for transmission of coded symbols, and a coherent receiver is used for detection on an additive white

4 578 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 44, NO. 5, MAY 1996 TABLE I1 MAXIMUM RELATIVERROR OF THE DECODER ERROR PROBABILITY OF (511, 493, 2) BCH CODE ~~ h 7.8 9,lO ~ E, x10-l xlo-' xlo-' h 13,14 15,16 17,18... E, x ~ O - ~ x ~ O - ~ x1w8.. le-lo 1 E-1 1 Lower bound I 5 1E-06 ' 1E-07 U 1E E E-10 1 E-l 1 1E-12 - Upper bound Lower bound I 1E-13 ' i " ' Fig. 2. Undetected error probabilities of (1023, 1003, 2) BCH code and (1023, 993, 3) BCH code on AWGN channel. Fig. 1. Undetected error probabilities of (511, 493, 2) BCH code and (511, 484, 3) BCH code on AWGN channel. Gaussian noise (AWGN) channel. Fig. 1. shows the undetected error probabilities of (511, 493, 2) BCH code and (511, 484, 3) BCH code. It is shown that the undetected error probability of (511, 493, 2) BCH code is a constant which is close to x 10-1 (= 2-18 E:=, ("I)) for Eb/N, less than 3 db and decreases rapidly as $&/No increases. For a (511, 484, 3) BCH code, the constant is close to x lo-'. It is shown that the undetected error probability of (511, 484, 3) BCH code is less than that of (511, 493, 2) BCH code. Fig. 2 shows the undetected error probabilities of (1023, 1003, 2) and (1023, 993, 3) BCH code where constants are noted as x 10-1 and x 10-1 for (1023,1003,2) BCH code and (1023, 993, 3) BCH code, respectively. Bounds on the undetected error probability of (1023, 1003, 2) BCN code are much tighter than bounds of (511, 493, 2) BCH code since E, decreases as n increases. The undetected error probabilities of (511, 494, 2) BCH code and (1023, 1003, 2) BCH code are calculated when these codes are used for both error detection and correction with various correcting radius r, where 0 5 r, 5 t. Fig. 3 shows that the undetected error probability of (511, 493, 2) BCH code is a constant for Eb/N, less than 3 db whose value are close to x 10-1 (= 2-18 E:=, ('i')), x lop3 (= 2-18 E:=, ('il)), and x lop6 (= 2-18 E!=, (':')) for r, = 2,rc = l,rc = 0, respectively. The constant values decrease as much as r, is reduced since the unde- Fig. 3. Undetected error probabilities of (511, 493, 2) BCH code with correcting-radius bc = 0, T, = 1, T, = 2, on AWGN channel. tectable words decrease in proportional to r,. Fig. 4 shows the undetected error probability of (1023, 1003, 2) BCH code where constant values are close to x 10-1 (= 2-" E:=, ( x (= 2-" Et=, ( 'Osz3), and x (= 2rZ0 co s=o ( ) j for T, = 2, T, = 1, T, = 0, respectively. Difference between upper bound and low bound of (1023, 1003, 2) BCH code is smaller than that of (511, 493, 2) BCH code. Both Figs. 4 and 5 imply that it is effective to use a bounded-distance decoder with smallcorrecting radius for both error correction and detection when a channel is very noisy. v. SUMMARY AND CONCLUSIONS In this paper, we derived the undetected error probability Pud( t) for bounded-distance decoding of binary primitive BCH codes when they are used for both error correction and detection on a binary symmetric channel with crossover

5 KIM AND LEE: UNDETECTED ERROR PROBABILITIES OF BINARY PRIMITIVE BCH CODES E01 rc=2 1 E M rc= 1 M Upper bound Lower bound ( I I I I I I I I I I I I I I I I I 8 Fig. 4. Undetected error probabilities of (1023, 1003, 2) BCH code with correcting-radius T, = 0, rc = 1, r, = 2, on AWGN channel. probability E. We showed that the undetected error probability of binary linear code can be simplified and quantified by the deviation factor p of the true weight distribution from the binomial distribution if weight distribution of the code is binomial-like. We also showed that the undetected error probability is bounded by p as Pud(c,Pmin) 5 Pud(c) 5 PUd(, a,) and a method to provide more precise,8 would improve accuracy of Pud( 6 ). From the results, we showed that, for fixed t and with n = 2-1 and 2t - 1 < 2rm/ 1 + 1, the undetected error probability of (n, k, t) binary primitive BCH codes is close to 2Tmt E:=, (t) 2-nE(X+) when codelength is large. The undetected error probabilities were calculated for some binary primitive BCH codes. APPENDIX A PROOF OF THEOREM 1 Let Nh(s) be the inner most summation in (2) with Al = p ( ). Then, from the substitution of a = (s + h - 1)/2, we have h + ~ - 2 a.( s-a ) S a=o =a(;) a=o =a(;) (:) n! (A.3) a!(n - h - s + Q)!(s - a)!(h - a)! h!(n - h)! 2 a!(h - Q )!(S- a)!(n - h - s + a)! 04.4) where the last step is a general binomial identity. Inserting (A.6) into (2) then yields (3). APPENDIX B PROOF OF CCOROLLARY 1 i) d+t 5 h 5 n-d-t Al since I must be in d 5 I 5 n - d if d+ t 5 h 5 n - d - t. Thus, Theorem 1 yields PE(~) = E:=, (:). ii) t + 15 h 5 d + t + 1, n - d - t h 5 n - t - 1. With an assumption of Al = p (7) for n - 1, Theorem 1 yields PE(~) =,8 E:=, (:). However, Ais are actually zero in h - s 5 I 5 min(h + s,d - 1) and max(h - s,n - d + 1) h + s. Thus, enoneous terms for Al = 0 in these ranges should be corrected. The erroneous terms of decoder error probability for Al = 0 yields Plde(h) and Pude(h), respectively, and they are subtracted from p E:=, (t). iii) n - t 5 h 5 n. PE(h) is one since all-ones codeword covers all error pattems of weight h 2 n - t. ACKNOWLEDGMENT The authors would like to thank Dr. T. Aulin and the anonymous reviewers for their useful suggestions for improving the presentation of the material in this paper. REFERENCES [ 11 W. W. Peterson and E. J. Weldon Jr., Error-Correcting Codes, 2nd ed. Cambridge, MA: MIT Press, [2] S. Lin and D. J. Costello, Jr., Error Control Coding: Fundamentals and Applications. Englewood Cliffs, NJ: Prentice-Hall, [3] S. K. Leung-Yan-Cheong and M. E. Hellman, Concerning a bound on undetected error probability, IEEE Trans. Inform. Theory, vol. IT-22, pp , MA r41 _. S. K. Leung-Yan-Cheong, E. R. Barnes, and D. U. Friedman, On some properties Gf the undetected emor probability of linear codes, IEEE Trans. Inform. Theory, vol. IT-25, pp , Jan [SI J. K. Wolf, A. M. Michelson, and A. H. Levesque, On the probability of undetected error for linear block codes, IEEE Trans. Commun., vol. COM-30, no. 2, pp , Feb [6] P. Perry, Necessary conditions for good error detection, IEEE Trans. Inform. Theory, vol. IT-37, pp , Mar [7] F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes. Amsterdam, The Netherlands: North-Holland, [8] R. E. Blahut, Theory and Practice of Error Control Codes. Reading, MA: Addison-Wesley, [9] R. J. Mceliece and L. Swanson, On the decoder error probability for Reed-Solomon codes, IEEE Trans. Inform. Theory, vol. IT-32, no. 5, pp , Sept [lo] K. M. Cheung, More on the decoder error probability for Reed- Solomon codes, IEEE Trans. Inform. Theory, vol. 35, no. 4, _ pp. _ , July M. Huntoon and A. M. Michelson, On the computation of the probability of post-decoding error events for block codes, IEEE Trans. Inform. Theory, vol. IT-23, pp , May [12] T. Kasami, T. Fujiwara, and S. Lin, Approximation of the weight distribution of binary linear codes, IEEE Trans. Inform. Theory, vol. IT-31, no. 6, pp , Nov [I31 T. Fujiwara, T. Takata, T. Kasami, and S. Lin, An approximation to the weight distribution of binary BCH codes with designed distance 9 and 11, IEEE Trans. Inform. Theory. vol. IT-32, no. 5, pp , Sept [I41 A. M. Michelson and A. H. Levesque, Error-Control Techniques for Digital Communication. New York Wiley, [15] C. L. Liu, Introduction to Combinatorial Mathematics. New York McGraw-Hill, 1968.

6 580 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 44, NO. 5, MAY 1996 Min-Goo Kim (M 95) was born in Baekryung island, Korea, on August 20, He received the B.S. degree in electronics engineering from the Younsei University, Seoul, Korea in 1988, and the M.E. and Ph.D. degrees in electronics engineering from the Seoul National University, Seoul, Korea in 1990 and 1996, respectively. He has served as an Assistant Manager of the ASIC Center at the Corporate Technical Operations of the Samsung Electronics Co. Ltd., Suwon, Korea, since His primary research interest is the coding theory, especially the performances analysis of linear codes. His research interests also include digital communication and coding for storage systems. Dr. Kim is currently a member of the KITE. Jae Hong Lee (M 86) received the B.S. and M.S. degrees in electronics engineering from Seoul National University, Seoul, Korea, in 1976 and 1978, respectively. He received the Ph.D. degree in electrical engineering from the University of Michigan, Ann Arbor, MI, in From 1978 to 1981, he was with the Republic of Korea Naval Academy, Jinhae, Korea, as an Instructor and Lieutenant. In 1987, he joined the Department of Electronics Engineering at Seoul National University (SNU), Seoul, Korea where he is currently an Professor. He was a Member of Technical Staff at the AT&T Bell Laboratories, Whipany, NJ, during a sabbatical year of From 1992 to 1994, he served as the Chairman of the Department of Electronics Engineering at SNU. From 1992 to 1994, he served as the Head of Operation and Planning Division of the Institute of New Media and Communications at SNU for which he has also served as the Head of Wireless and Satellite Communications Research Division since His current research interests include communication and coding theory, spread spectrum system, and their applications to wireless communications, intelligent transportation systems, and information storage systems. Dr. Lee is a member of the KITE, KICS, and Tau Beta Pi.

PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes

PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes 359 PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes Ching-Lung CHR a),szu-linsu, Members, and Shao-Wei WU, Nonmember SUMMARY A low-complexity step-by-step decoding algorithm

More information

On the properness of some optimal binary linear codes and their dual codes

On the properness of some optimal binary linear codes and their dual codes Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 76-81 On the properness of some optimal binary linear codes and their dual codes Rossitza

More information

Chapter 3 Linear Block Codes

Chapter 3 Linear Block Codes Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and

More information

RON M. ROTH * GADIEL SEROUSSI **

RON M. ROTH * GADIEL SEROUSSI ** ENCODING AND DECODING OF BCH CODES USING LIGHT AND SHORT CODEWORDS RON M. ROTH * AND GADIEL SEROUSSI ** ABSTRACT It is shown that every q-ary primitive BCH code of designed distance δ and sufficiently

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

A Combinatorial Bound on the List Size

A Combinatorial Bound on the List Size 1 A Combinatorial Bound on the List Size Yuval Cassuto and Jehoshua Bruck California Institute of Technology Electrical Engineering Department MC 136-93 Pasadena, CA 9115, U.S.A. E-mail: {ycassuto,bruck}@paradise.caltech.edu

More information

An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission

An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission P.Mozhiarasi, C.Gayathri, V.Deepan Master of Engineering, VLSI design, Sri Eshwar College of Engineering, Coimbatore- 641 202,

More information

Existence of Cyclic Hadamard Difference Sets and its Relation to Binary Sequences with Ideal Autocorrelation

Existence of Cyclic Hadamard Difference Sets and its Relation to Binary Sequences with Ideal Autocorrelation 14 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL.1, NO.1, MARCH 1999 Existence of Cyclic Hadamard Difference Sets and its Relation to Binary Sequences with Ideal Autocorrelation Jeong-Heon Kim and Hong-Yeop

More information

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,

More information

A Generalized Reverse Jacket Transform

A Generalized Reverse Jacket Transform 684 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2001 A Generalized Reverse Jacket Transform Moon Ho Lee, Senior Member, IEEE, B. Sundar Rajan,

More information

Average Coset Weight Distributions of Gallager s LDPC Code Ensemble

Average Coset Weight Distributions of Gallager s LDPC Code Ensemble 1 Average Coset Weight Distributions of Gallager s LDPC Code Ensemble Tadashi Wadayama Abstract In this correspondence, the average coset eight distributions of Gallager s LDPC code ensemble are investigated.

More information

EE 229B ERROR CONTROL CODING Spring 2005

EE 229B ERROR CONTROL CODING Spring 2005 EE 229B ERROR CONTROL CODING Spring 2005 Solutions for Homework 1 1. Is there room? Prove or disprove : There is a (12,7) binary linear code with d min = 5. If there were a (12,7) binary linear code with

More information

THIS paper is aimed at designing efficient decoding algorithms

THIS paper is aimed at designing efficient decoding algorithms IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBER 1999 2333 Sort-and-Match Algorithm for Soft-Decision Decoding Ilya Dumer, Member, IEEE Abstract Let a q-ary linear (n; k)-code C be used

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

VHDL Implementation of Reed Solomon Improved Encoding Algorithm

VHDL Implementation of Reed Solomon Improved Encoding Algorithm VHDL Implementation of Reed Solomon Improved Encoding Algorithm P.Ravi Tej 1, Smt.K.Jhansi Rani 2 1 Project Associate, Department of ECE, UCEK, JNTUK, Kakinada A.P. 2 Assistant Professor, Department of

More information

An Application of Coding Theory into Experimental Design Construction Methods for Unequal Orthogonal Arrays

An Application of Coding Theory into Experimental Design Construction Methods for Unequal Orthogonal Arrays The 2006 International Seminar of E-commerce Academic and Application Research Tainan, Taiwan, R.O.C, March 1-2, 2006 An Application of Coding Theory into Experimental Design Construction Methods for Unequal

More information

Chapter 7 Reed Solomon Codes and Binary Transmission

Chapter 7 Reed Solomon Codes and Binary Transmission Chapter 7 Reed Solomon Codes and Binary Transmission 7.1 Introduction Reed Solomon codes named after Reed and Solomon [9] following their publication in 1960 have been used together with hard decision

More information

SPHERE PACKINGS CONSTRUCTED FROM BCH AND JUSTESEN CODES

SPHERE PACKINGS CONSTRUCTED FROM BCH AND JUSTESEN CODES SPHERE PACKINGS CONSTRUCTED FROM BCH AND JUSTESEN CODES N. J. A. SLOANE Abstract. Bose-Chaudhuri-Hocquenghem and Justesen codes are used to pack equa spheres in M-dimensional Euclidean space with density

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

Error Correction Methods

Error Correction Methods Technologies and Services on igital Broadcasting (7) Error Correction Methods "Technologies and Services of igital Broadcasting" (in Japanese, ISBN4-339-06-) is published by CORONA publishing co., Ltd.

More information

Error control of line codes generated by finite Coxeter groups

Error control of line codes generated by finite Coxeter groups Error control of line codes generated by finite Coxeter groups Ezio Biglieri Universitat Pompeu Fabra, Barcelona, Spain Email: e.biglieri@ieee.org Emanuele Viterbo Monash University, Melbourne, Australia

More information

Practical Polar Code Construction Using Generalised Generator Matrices

Practical Polar Code Construction Using Generalised Generator Matrices Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:

More information

SOFT DECISION FANO DECODING OF BLOCK CODES OVER DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM

SOFT DECISION FANO DECODING OF BLOCK CODES OVER DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM Journal of ELECTRICAL ENGINEERING, VOL. 63, NO. 1, 2012, 59 64 SOFT DECISION FANO DECODING OF BLOCK CODES OVER DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM H. Prashantha Kumar Udupi Sripati K. Rajesh

More information

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land Ingmar Land, SIPCom8-1: Information Theory and Coding (2005 Spring) p.1 Overview Basic Concepts of Channel Coding Block Codes I:

More information

Höst, Stefan; Johannesson, Rolf; Zigangirov, Kamil; Zyablov, Viktor V.

Höst, Stefan; Johannesson, Rolf; Zigangirov, Kamil; Zyablov, Viktor V. Active distances for convolutional codes Höst, Stefan; Johannesson, Rolf; Zigangirov, Kamil; Zyablov, Viktor V Published in: IEEE Transactions on Information Theory DOI: 101109/18749009 Published: 1999-01-01

More information

CSCI 2570 Introduction to Nanocomputing

CSCI 2570 Introduction to Nanocomputing CSCI 2570 Introduction to Nanocomputing Information Theory John E Savage What is Information Theory Introduced by Claude Shannon. See Wikipedia Two foci: a) data compression and b) reliable communication

More information

Making Error Correcting Codes Work for Flash Memory

Making Error Correcting Codes Work for Flash Memory Making Error Correcting Codes Work for Flash Memory Part I: Primer on ECC, basics of BCH and LDPC codes Lara Dolecek Laboratory for Robust Information Systems (LORIS) Center on Development of Emerging

More information

16.36 Communication Systems Engineering

16.36 Communication Systems Engineering MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

More information

T linear programming to be applied successfully to error-correcting

T linear programming to be applied successfully to error-correcting 1276 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 34, NO. 5, SEPTEMBER 1988 Inequalities for Covering Codes Abstract-Any code C with covering radius R must satisfy a set of linear inequalities that involve

More information

ERROR CORRECTION BEYOND THE CONVENTIONAL ERROR BOUND FOR REED SOLOMON CODES

ERROR CORRECTION BEYOND THE CONVENTIONAL ERROR BOUND FOR REED SOLOMON CODES Journal of ELECTRICAL ENGINEERING, VOL. 54, NO. -2, 2003, 305 30 ERROR CORRECTION BEYOND THE CONVENTIONAL ERROR BOUND FOR REED SOLOMON CODES Sergey Egorov Garik Markarian A modification of Blahut procedure

More information

Which Codes Have 4-Cycle-Free Tanner Graphs?

Which Codes Have 4-Cycle-Free Tanner Graphs? Which Codes Have 4-Cycle-Free Tanner Graphs? Thomas R. Halford Communication Sciences Institute University of Southern California Los Angeles, CA 90089-565 USA Alex J. Grant Institute for Telecommunications

More information

Improved Upper Bounds on Sizes of Codes

Improved Upper Bounds on Sizes of Codes 880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 4, APRIL 2002 Improved Upper Bounds on Sizes of Codes Beniamin Mounits, Tuvi Etzion, Senior Member, IEEE, and Simon Litsyn, Senior Member, IEEE

More information

Which Codes Have 4-Cycle-Free Tanner Graphs?

Which Codes Have 4-Cycle-Free Tanner Graphs? Which Codes Have 4-Cycle-Free Tanner Graphs? Thomas R. Halford and Keith M. Chugg Communication Sciences Institute University of Southern California Los Angeles, CA 90089-565, USA Email: {halford, chugg}@usc.edu

More information

Design and Stability Analysis of Single-Input Fuzzy Logic Controller

Design and Stability Analysis of Single-Input Fuzzy Logic Controller IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART B: CYBERNETICS, VOL. 30, NO. 2, APRIL 2000 303 Design and Stability Analysis of Single-Input Fuzzy Logic Controller Byung-Jae Choi, Seong-Woo Kwak,

More information

Article (peer-reviewed)

Article (peer-reviewed) Title Author(s) Influence of noise intensity on the spectrum of an oscillator Swain, Rabi Sankar; Gleeson, James P.; Kennedy, Michael Peter Publication date 2005-11 Original citation Type of publication

More information

Code design: Computer search

Code design: Computer search Code design: Computer search Low rate codes Represent the code by its generator matrix Find one representative for each equivalence class of codes Permutation equivalences? Do NOT try several generator

More information

A Systematic Description of Source Significance Information

A Systematic Description of Source Significance Information A Systematic Description of Source Significance Information Norbert Goertz Institute for Digital Communications School of Engineering and Electronics The University of Edinburgh Mayfield Rd., Edinburgh

More information

New Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting

New Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting New Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting Hideki Yagi 1, Toshiyasu Matsushima 2, and Shigeichi Hirasawa 2 1 Media Network Center, Waseda University 1-6-1,

More information

UC Riverside UC Riverside Previously Published Works

UC Riverside UC Riverside Previously Published Works UC Riverside UC Riverside Previously Published Works Title Soft-decision decoding of Reed-Muller codes: A simplied algorithm Permalink https://escholarship.org/uc/item/5v71z6zr Journal IEEE Transactions

More information

Sensitivity Analysis of Coupled Resonator Filters

Sensitivity Analysis of Coupled Resonator Filters IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 47, NO. 10, OCTOBER 2000 1017 Sensitivity Analysis of Coupled Resonator Filters Smain Amari, Member, IEEE Abstract

More information

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Shu Lin, Shumei Song, Lan Lan, Lingqi Zeng and Ying Y Tai Department of Electrical & Computer Engineering University of California,

More information

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1 Fifteenth International Workshop on Algebraic and Combinatorial Coding Theory June 18-24, 216, Albena, Bulgaria pp. 168 173 On the minimum distance of LDPC codes based on repetition codes and permutation

More information

New algebraic decoding method for the (41, 21,9) quadratic residue code

New algebraic decoding method for the (41, 21,9) quadratic residue code New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,

More information

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n Binary Codes for synchronous DS-CDMA Stefan Bruck, Ulrich Sorger Institute for Network- and Signal Theory Darmstadt University of Technology Merckstr. 25, 6428 Darmstadt, Germany Tel.: 49 65 629, Fax:

More information

A Plane Wave Expansion of Spherical Wave Functions for Modal Analysis of Guided Wave Structures and Scatterers

A Plane Wave Expansion of Spherical Wave Functions for Modal Analysis of Guided Wave Structures and Scatterers IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 51, NO. 10, OCTOBER 2003 2801 A Plane Wave Expansion of Spherical Wave Functions for Modal Analysis of Guided Wave Structures and Scatterers Robert H.

More information

Optimum Soft Decision Decoding of Linear Block Codes

Optimum Soft Decision Decoding of Linear Block Codes Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is

More information

Lecture 8: Shannon s Noise Models

Lecture 8: Shannon s Noise Models Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecture 8: Shannon s Noise Models September 14, 2007 Lecturer: Atri Rudra Scribe: Sandipan Kundu& Atri Rudra Till now we have

More information

On Two Probabilistic Decoding Algorithms for Binary Linear Codes

On Two Probabilistic Decoding Algorithms for Binary Linear Codes On Two Probabilistic Decoding Algorithms for Binary Linear Codes Miodrag Živković Abstract A generalization of Sullivan inequality on the ratio of the probability of a linear code to that of any of its

More information

On the Relation between Outage Probability and Effective Frequency Diversity Order

On the Relation between Outage Probability and Effective Frequency Diversity Order Appl. Math. Inf. Sci. 8, No. 6, 2667-267 (204) 2667 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/0.2785/amis/080602 On the Relation between and Yongjune Kim, Minjoong

More information

IN this paper, we exploit the information given by the generalized

IN this paper, we exploit the information given by the generalized 4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 10, OCTOBER 2006 A New Upper Bound on the Block Error Probability After Decoding Over the Erasure Channel Frédéric Didier Abstract Motivated by

More information

Permutation decoding for the binary codes from triangular graphs

Permutation decoding for the binary codes from triangular graphs Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for

More information

Dispersion of the Gilbert-Elliott Channel

Dispersion of the Gilbert-Elliott Channel Dispersion of the Gilbert-Elliott Channel Yury Polyanskiy Email: ypolyans@princeton.edu H. Vincent Poor Email: poor@princeton.edu Sergio Verdú Email: verdu@princeton.edu Abstract Channel dispersion plays

More information

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM)

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM) International Journal of Computational Intelligence Research (IJCIR). ISSN: 097-87 Volume, Number 8 (207), pp. 205 2027 Research India Publications http://www.ripublication.com/ijcir.htm New Algebraic

More information

The Effect of Memory Order on the Capacity of Finite-State Markov and Flat-Fading Channels

The Effect of Memory Order on the Capacity of Finite-State Markov and Flat-Fading Channels The Effect of Memory Order on the Capacity of Finite-State Markov and Flat-Fading Channels Parastoo Sadeghi National ICT Australia (NICTA) Sydney NSW 252 Australia Email: parastoo@student.unsw.edu.au Predrag

More information

Structured Low-Density Parity-Check Codes: Algebraic Constructions

Structured Low-Density Parity-Check Codes: Algebraic Constructions Structured Low-Density Parity-Check Codes: Algebraic Constructions Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, California 95616 Email:shulin@ece.ucdavis.edu

More information

Type I Codes over GF(4)

Type I Codes over GF(4) Type I Codes over GF(4) Hyun Kwang Kim San 31, Hyoja Dong Department of Mathematics Pohang University of Science and Technology Pohang, 790-784, Korea e-mail: hkkim@postech.ac.kr Dae Kyu Kim School of

More information

Some Extended Results on the Search for Good Convolutional Codes

Some Extended Results on the Search for Good Convolutional Codes 1682 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 43, NO 5, SEPTEMBER 1997 Some Extended Results on the Search for Good Convolutional Codes Jinn-Ja Chang, Member, IEEE, Der-June Hwang, and Mao-Chao Lin,

More information

Binomial coefficient codes over W2)

Binomial coefficient codes over W2) Discrete Mathematics 106/107 (1992) 181-188 North-Holland 181 Binomial coefficient codes over W2) Persi Diaconis Harvard University, Cambridge, MA 02138, USA Ron Graham AT & T Bell Laboratories, Murray

More information

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths Kasra Vakilinia, Dariush Divsalar*, and Richard D. Wesel Department of Electrical Engineering, University

More information

Lecture 4: Proof of Shannon s theorem and an explicit code

Lecture 4: Proof of Shannon s theorem and an explicit code CSE 533: Error-Correcting Codes (Autumn 006 Lecture 4: Proof of Shannon s theorem and an explicit code October 11, 006 Lecturer: Venkatesan Guruswami Scribe: Atri Rudra 1 Overview Last lecture we stated

More information

Optimal matching in wireless sensor networks

Optimal matching in wireless sensor networks Optimal matching in wireless sensor networks A. Roumy, D. Gesbert INRIA-IRISA, Rennes, France. Institute Eurecom, Sophia Antipolis, France. Abstract We investigate the design of a wireless sensor network

More information

arxiv: v1 [cs.it] 27 May 2017

arxiv: v1 [cs.it] 27 May 2017 Volume xx No 0x 20xx xxx-xxx doi:xxx ON SHORTENED AND PUNCTURED CYCLIC CODES arxiv:170509859v1 csit 27 May 2017 Arti Yardi IRIT/INP-ENSEEIHT University of Toulouse Toulouse France Ruud Pellikaan Department

More information

ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes

ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes Kevin Buckley - 2010 109 ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes m GF(2 ) adder m GF(2 ) multiplier

More information

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Antonio Aparecido de Andrade Department of Mathematics, IBILCE, UNESP, 15054-000, São José do Rio Preto, SP, Brazil E-mail:

More information

(each row defines a probability distribution). Given n-strings x X n, y Y n we can use the absence of memory in the channel to compute

(each row defines a probability distribution). Given n-strings x X n, y Y n we can use the absence of memory in the channel to compute ENEE 739C: Advanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 6 (draft; 9/6/03. Error exponents for Discrete Memoryless Channels http://www.enee.umd.edu/ abarg/enee739c/course.html

More information

Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm

Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm MARC A. ARMAND WEE SIEW YEN Department of Electrical & Computer Engineering National University

More information

Vector spaces. EE 387, Notes 8, Handout #12

Vector spaces. EE 387, Notes 8, Handout #12 Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is

More information

Determination of the Local Weight Distribution of Binary Linear Block Codes

Determination of the Local Weight Distribution of Binary Linear Block Codes Determination of the Local Weight Distribution of Binary Linear Block Codes Kenji Yasunaga and Toru Fujiwara, Member, IEEE Abstract Some methods to determine the local weight distribution of binary linear

More information

4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE

4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE 4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER 2008 List Decoding of Biorthogonal Codes the Hadamard Transform With Linear Complexity Ilya Dumer, Fellow, IEEE, Grigory Kabatiansky,

More information

Dr. Cathy Liu Dr. Michael Steinberger. A Brief Tour of FEC for Serial Link Systems

Dr. Cathy Liu Dr. Michael Steinberger. A Brief Tour of FEC for Serial Link Systems Prof. Shu Lin Dr. Cathy Liu Dr. Michael Steinberger U.C.Davis Avago SiSoft A Brief Tour of FEC for Serial Link Systems Outline Introduction Finite Fields and Vector Spaces Linear Block Codes Cyclic Codes

More information

Approaching Blokh-Zyablov Error Exponent with Linear-Time Encodable/Decodable Codes

Approaching Blokh-Zyablov Error Exponent with Linear-Time Encodable/Decodable Codes Approaching Blokh-Zyablov Error Exponent with Linear-Time Encodable/Decodable Codes 1 Zheng Wang, Student Member, IEEE, Jie Luo, Member, IEEE arxiv:0808.3756v1 [cs.it] 27 Aug 2008 Abstract We show that

More information

Simplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey

Simplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey 2014 IJEDR Volume 2, Issue 1 ISSN: 2321-9939 Simplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey 1 Vivek Tilavat, 2 Dr.Yagnesh Shukla 1 PG Student,

More information

Performance Analysis of Spread Spectrum CDMA systems

Performance Analysis of Spread Spectrum CDMA systems 1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department

More information

MOMENT functions are used in several computer vision

MOMENT functions are used in several computer vision IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 8, AUGUST 2004 1055 Some Computational Aspects of Discrete Orthonormal Moments R. Mukundan, Senior Member, IEEE Abstract Discrete orthogonal moments

More information

Binary construction of quantum codes of minimum distances five and six

Binary construction of quantum codes of minimum distances five and six Discrete Mathematics 308 2008) 1603 1611 www.elsevier.com/locate/disc Binary construction of quantum codes of minimum distances five and six Ruihu Li a, ueliang Li b a Department of Applied Mathematics

More information

REED-SOLOMON CODE SYMBOL AVOIDANCE

REED-SOLOMON CODE SYMBOL AVOIDANCE Vol105(1) March 2014 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 13 REED-SOLOMON CODE SYMBOL AVOIDANCE T Shongwe and A J Han Vinck Department of Electrical and Electronic Engineering Science, University

More information

Constructions of MDS-Convolutional Codes

Constructions of MDS-Convolutional Codes IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 5, JULY 2001 2045 Constructions of MDS-Convolutional Codes Roxana Smarandache, Student Member, IEEE, Heide Gluesing-Luerssen, and Joachim Rosenthal,

More information

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International

More information

A NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1

A NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1 BULLETIN (New Series) OF THE AMERICAN MATHEMATICAL SOCIETY Volume 23, Number 2, October 1990 A NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1 J. H. CONWAY AND N. J. A. SLOANE ABSTRACT.

More information

General error locator polynomials for binary cyclic codes with t 2 and n < 63

General error locator polynomials for binary cyclic codes with t 2 and n < 63 General error locator polynomials for binary cyclic codes with t 2 and n < 63 April 22, 2005 Teo Mora (theomora@disi.unige.it) Department of Mathematics, University of Genoa, Italy. Emmanuela Orsini (orsini@posso.dm.unipi.it)

More information

Coding theory: Applications

Coding theory: Applications INF 244 a) Textbook: Lin and Costello b) Lectures (Tu+Th 12.15-14) covering roughly Chapters 1,9-12, and 14-18 c) Weekly exercises: For your convenience d) Mandatory problem: Programming project (counts

More information

Explicit Ramsey graphs and orthonormal labelings

Explicit Ramsey graphs and orthonormal labelings Explicit Ramsey graphs and orthonormal labelings Noga Alon Submitted: August 22, 1994; Accepted October 29, 1994 Abstract We describe an explicit construction of triangle-free graphs with no independent

More information

Lecture 18: Gaussian Channel

Lecture 18: Gaussian Channel Lecture 18: Gaussian Channel Gaussian channel Gaussian channel capacity Dr. Yao Xie, ECE587, Information Theory, Duke University Mona Lisa in AWGN Mona Lisa Noisy Mona Lisa 100 100 200 200 300 300 400

More information

Cyclic Codes. Saravanan Vijayakumaran August 26, Department of Electrical Engineering Indian Institute of Technology Bombay

Cyclic Codes. Saravanan Vijayakumaran August 26, Department of Electrical Engineering Indian Institute of Technology Bombay 1 / 25 Cyclic Codes Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay August 26, 2014 2 / 25 Cyclic Codes Definition A cyclic shift

More information

An Extremal Doubly Even Self-Dual Code of Length 112

An Extremal Doubly Even Self-Dual Code of Length 112 An Extremal Doubly Even Self-Dual Code of Length 112 Masaaki Harada Department of Mathematical Sciences Yamagata University Yamagata 990 8560, Japan mharada@sci.kj.yamagata-u.ac.jp Submitted: Dec 29, 2007;

More information

Enumeration of Generalized Necklaces over F q

Enumeration of Generalized Necklaces over F q Enumeration of Generalized Necklaces over F q by Jumah Ali Algallaf B.Sc., King Fahd University of Petroleum and Minerals, Saudi Arabia, 2006 A Project Report Submitted in Partial Fulfillment of the Requirements

More information

ELEC-E7240 Coding Methods L (5 cr)

ELEC-E7240 Coding Methods L (5 cr) Introduction ELEC-E7240 Coding Methods L (5 cr) Patric Östergård Department of Communications and Networking Aalto University School of Electrical Engineering Spring 2017 Patric Östergård (Aalto) ELEC-E7240

More information

Third-order nonlinearities of some biquadratic monomial Boolean functions

Third-order nonlinearities of some biquadratic monomial Boolean functions Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this

More information

Optimum Sampling Vectors for Wiener Filter Noise Reduction

Optimum Sampling Vectors for Wiener Filter Noise Reduction 58 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 50, NO. 1, JANUARY 2002 Optimum Sampling Vectors for Wiener Filter Noise Reduction Yukihiko Yamashita, Member, IEEE Absact Sampling is a very important and

More information

An introduction to basic information theory. Hampus Wessman

An introduction to basic information theory. Hampus Wessman An introduction to basic information theory Hampus Wessman Abstract We give a short and simple introduction to basic information theory, by stripping away all the non-essentials. Theoretical bounds on

More information

Estimates of the Distance Distribution of Codes and Designs

Estimates of the Distance Distribution of Codes and Designs 1050 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Estimates of the Distance Distribution of Codes Designs Alexei Ashikhmin, Member, IEEE, Alexer Barg, Senior Member, IEEE, Simon

More information

A Modified Baum Welch Algorithm for Hidden Markov Models with Multiple Observation Spaces

A Modified Baum Welch Algorithm for Hidden Markov Models with Multiple Observation Spaces IEEE TRANSACTIONS ON SPEECH AND AUDIO PROCESSING, VOL. 9, NO. 4, MAY 2001 411 A Modified Baum Welch Algorithm for Hidden Markov Models with Multiple Observation Spaces Paul M. Baggenstoss, Member, IEEE

More information

Error Exponent Region for Gaussian Broadcast Channels

Error Exponent Region for Gaussian Broadcast Channels Error Exponent Region for Gaussian Broadcast Channels Lihua Weng, S. Sandeep Pradhan, and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

Low-complexity error correction in LDPC codes with constituent RS codes 1

Low-complexity error correction in LDPC codes with constituent RS codes 1 Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 348-353 Low-complexity error correction in LDPC codes with constituent RS codes 1

More information

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC August 2011 Ravi Motwani, Zion Kwok, Scott Nelson Agenda NAND ECC History Soft Information What is soft information How do we obtain

More information

An Introduction to Low Density Parity Check (LDPC) Codes

An Introduction to Low Density Parity Check (LDPC) Codes An Introduction to Low Density Parity Check (LDPC) Codes Jian Sun jian@csee.wvu.edu Wireless Communication Research Laboratory Lane Dept. of Comp. Sci. and Elec. Engr. West Virginia University June 3,

More information

EVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS

EVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS EVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS Ramin Khalili, Kavé Salamatian LIP6-CNRS, Université Pierre et Marie Curie. Paris, France. Ramin.khalili, kave.salamatian@lip6.fr Abstract Bit Error

More information

798 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 44, NO. 10, OCTOBER 1997

798 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 44, NO. 10, OCTOBER 1997 798 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL 44, NO 10, OCTOBER 1997 Stochastic Analysis of the Modulator Differential Pulse Code Modulator Rajesh Sharma,

More information

THE SOMMERFELD problem of radiation of a short

THE SOMMERFELD problem of radiation of a short 296 IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 52, NO. 1, JANUARY 2004 Fast Multipole Representation of Green s Function for an Impedance Half-Space Kamal Sarabi, Fellow, IEEE, Il-Suek Koh Abstract

More information

Channel Coding I. Exercises SS 2017

Channel Coding I. Exercises SS 2017 Channel Coding I Exercises SS 2017 Lecturer: Dirk Wübben Tutor: Shayan Hassanpour NW1, Room N 2420, Tel.: 0421/218-62387 E-mail: {wuebben, hassanpour}@ant.uni-bremen.de Universität Bremen, FB1 Institut

More information