POLAR codes have been proven to achieve the symmetric. Reduce the Complexity of List Decoding of Polar Codes by Tree-Pruning

Size: px
Start display at page:

Download "POLAR codes have been proven to achieve the symmetric. Reduce the Complexity of List Decoding of Polar Codes by Tree-Pruning"

Transcription

1 Reduce the Complexity of List Decoding of Polar Cos by Tree-Pruning Kai Chen, Bin Li, Hui Shen, Jie Jin, and David Tse, Fellow, IEEE arxiv:58.228v [cs.it] 9 Aug 25 Abstract Polar cos unr cyclic redundancy chec aid successive cancellation list (CA-SCL coding can outperform the turbo cos and the LDPC cos when co lengths are configured to be several ilobits. In orr to reduce the coding complexity, a novel tree-pruning scheme for the SCL/CA-SCL coding algorithms is proposed in this paper. In each step of the coding procedure, the candidate paths with metrics less than a threshold are dropped directly to avoid the unnecessary computations for the path searching on the scendant branches of them. Given a candidate path, an upper bound of the path metric of its scendants is proposed to termined whether the pruning of this candidate path would affect frame error rate (FER performance. By utilizing this upper bounding technique and introducing a dynamic threshold, the proposed scheme letes the redundant candidate paths as many as possible while eeping the performance terioration in a tolerant region, thus it is much more efficient than the existing pruning scheme. With only a negligible loss of FER performance, the computational complexity of the proposed pruned coding scheme is only about 4% of the standard algorithm in the low signal-to-noise ratio (SR region (where the FER unr CA-SCL coding is about.., and it can be very close to that of the successive cancellation (SC cor in the morate and high SR regions. Inx Terms Polar cos, successive cancellation coding, tree-pruning. I. ITRODUCTIO POLAR cos have been proven to achieve the symmetric capacity on binary-input discrete memoryless channels unr a low-complexity successive cancellation (SC coding algorithm []. Although the polar cos asymptotically achieve the channel capacity, the performance unr SC coding is unsatisfying when the co length is of the orr of ilobits. Several alternative coding schemes have been proposed to improve the finite-length performance of polar cos, such as successive cancellation list (SCL [2], successive cancellation stac (SCS[3] and belief propagation (BP [4] coding algorithms. It is reported that polar cos unr the CRC-aid SCL/SCS (CA-SCL/SCS coding algorithms can achieve a better frame error rate (FER performance than the LDPC and turbo cos when the co lengths are configured to several ilobits [5][6][7]. Therefore, polar coding is believed to be a competitive candidate in future communication systems. Since the CA-SCS coding requires a large stac to store the candidate paths which leads to a high space complexity, CA-SCL coding algorithm is of more interest [8][9][]. This wor was supported by the Science and Technology Proect of Shenzhen (o. JSGG K. Chen, B. Li, J. Jin, and H. Shen are with the Communications Technology Research Lab., Huawei Technologies, Shenzhen, P. R. China ( aichen@ieee.org. D. Tse is with the Dept. of Electrical Engineering, Stanford University, CA , USA ( dntse@stanford.edu. evertheless, to achieve competitive performance against LDPC or turbo cos, a morate-sized list is required in CA- SCL coding. In that case, the computational complexity of the CA-SCL cor is still high. As stated in [], SCL coding can be regard as a path searching procedure on the co tree. In orr to reduce the complexity of SCL coding, tree-pruning technique is exploited by avoiding unnecessary path searching operations [2]. In orr to eep the FER loss in an acceptable region, [2] computes the pruning threshold in a very conservative way. Only the candidate paths with metrics much less than the maximum one are pruned. It wors well when the signalto-noise ratio (SR is high, where the metric of the correct path is usually much larger than the others. However, this existing pruning technique is no longer efficient when woring in the relative low SR region where the FER unr CA-SCL coding is about.., while it is exactly the operating regime for cellular networs. In this paper, we propose to compute the threshold using the sum of the survival path metrics. To evaluate how much a pruned candidate path would affect FER performance, we propose a metric upper bound of its scendants. Utilizing this upper bounding technique, a dynamic threshold is further proposed. The proposed scheme letes the redundant candidate paths as many as possible while eeping the performance terioration in a tolerant region, thus it is much more efficient than the existing pruning scheme. The remainr of the paper is organized as follows. Section II reviews the basics of polar coding. Section III scribes the proposed tree-pruning scheme for SCL coding. A path metric upper bound of the scendants of some given candidate path and a dynamic threshold configuration method are proposed. Section IV provis the performance and complexity analysis based on the simulation results. Finally, Section V conclus the wor. A. otation Convention II. PRELIMIARIES In this paper, we use calligraphic characters, such as X and Y, to note sets, and X to note the number of elements in X. We write the Cartesian product of X and Y as X Y, and write the n-th Cartesian power of X as X n. Further, we write Y\X to note the sset of Y with elements in X exclud. We use notation v to note a -dimension vector (v, v 2,, v and v i to note a svector (v i, v i+,, v, v of v, i,. Particularly when i >, v i is a vector with no elements in it and the empty vector is noted by φ. We write v,o to note the

2 2 svector of v with odd indices (a : ; is odd. Similarly, we write v,e to note the svector of v with even indices (a : ; is even. For example, for v 4, v 3 2 = (v 2, v 3, v 4,o = (v, v 3 and v 4,e = (v 2, v 4. Further, given a inx set A, v A note the svector of v which consists of v i s with i A. B. Polar Coding and SC Decoding We are given a binary-input memoryless channel W : X Y with input alphabet X = {, } and output alphabet Y, the channel transition probabilities are W (y x, x X, y Y. For co length = 2 n, n =, 2,, and information length K, i.e. co rate R = K/, polar coding over W proposed by Arıan can be scribed as follows: After channel combining and splitting operations on inpennt uses of W, we get successive uses of synthesized binary input channels W (i, i =, 2,,, with transition probabilities where W (i (y, u i u i = W (y u = 2 W (y u ( u i+ X i W (y i x i (2 and the source bloc u are supposed to be uniformly distributed in {, }. { } The reliabilities of the polarized channels W (i can be evaluated by using nsity evolution [3], and is usually more evaluated efficiently by calculating Bhattacharyya parameters [] for binary erasure channels (BECs or by using Gaussian approximation [4] for binary-input AWG (BIAWG channels. To transmit a message { bloc } of K bits, the K most reliable polarized channels with indices i A are piced out for carrying these information bits; a fixed bit sequence called frozen bits are transmitted over the others. The inx set A {, 2,, } is called the information set and A = K, and its complement set which is noted by A c is called the frozen set. As mentioned in [], polar cos can be cod using successive cancellation (SC coding algorithm. In [], it is further scribed as a path searching procedure on a coding tree. The metric of a coding path u i can be measured using a posteriori probability P (i (ûi y W (i i= = if i A c and û i u i W (i (y,ui u i 2P(y otherwise (3 When û i is not a wrong frozen bit, the above path metric can be recursively computed as P (2i 2 = û 2i {,} P (i 2,o û 2i,e (i P,e 2 (4 + P (2i 2 = P (i 2,o û 2i,e (i P,e (5 2 + where n, = 2 n, i. Thus, SC coding can be scribed as a greedy search algorithm on the co tree. In each level, only the one of two scendants with larger path metric is selected for further expansion. { ( h i y û i =, û i i A u i i A c (6 where h i ( y, û i { if P (i (ûi = y otherwise C. Improved SC Decoding Algorithms (i (ûi P y The performance of SC is limited by the bit-by-bit coding strategy. Whenever a bit is wrongly termined, there is no chance to correct it in the rest of the coding procedure. Theoretically, the performance of the maximum a posteriori probability (MAP coding (or equivalently ML coding, since the inputs are assumed to be uniformly distributed can be achieved by traversing all the -length coding paths in the co tree. But this brute-force search taes exponential complexity and is impossible to be implemented for practical co lengths. Two improved coding algorithms, SCL coding and SCS coding, are proposed in [2] and [3]. Both of these two algorithms allow more than one edge to be explored in each level of the co tree. During the SCL(SCS coding, a set of candidate paths are obtained and stored in a list(stac. Combining the ias of SCL and SCS, a coding algorithm named successive cancellation hybrid (SCH is proposed in [], which can achieve a better tra-off between computational complexity and space complexity. Moreover, with the help of CRC cos, polar cos cod by these improved SC coding algorithms are found to be capable of achieving the same or even better performance than turbo cos or LDPC cos [5] [7] [6]. Among these existing improved SC coding algorithms, benefitting from the limited requirement for the memory, (CA-SCL coding is the most interesting for hardware implementation [8] [9] [5] [6]. As shown in Fig., the processing loop of the standard SCL/CA-SCL coding is as follows: S For each candidate path, calculate the path metrics of its scendant paths; S2 Sort the metrics, and reserve at most L paths with the larger metrics and lete the others; S3 If any two of the survival paths share the same parent no, then a copy operation is performed to create separate woring spaces for these two paths; S4 For each survival path, update the partial-sum recursively; S5 The above loop is processed until the length of candidate paths reach. The candidate path with the largest (7

3 3 Initialize the list with a null path, and set i = p Fig.. i = i + yes no Calculate metrics of scendant paths Is frozen? no Sort the metrics, reserve the at most L largest path and lete the other Perform path copy operation if required Update the partial-sums of the survival paths i =? yes Select the path with largest path metric (which can pass CRC chec Pruning Delete the paths with metrics less than a threshold The flow chart of the pruned SCL/CA-SCL coding. path metric (when CRC embedd, the candidates which cannot pass CRC are dropped directly is piced out for the final cision. III. TREE-PRUIG SCHEME FOR SCL/CA-SCL DECODIG ALGORITHM A. The Proposed Pruning Scheme In orr to reduce the computational complexity of SCL coding, a pruning operation is add after the sorting operation (as shown in Fig.. If the metric of some candidate path is less than a threshold, it will be directly leted to avoid redundant path expansions and copy operations. In this paper, we propose to use the path metric sum of the (maximum L survival candidate paths after sorting: while coding { } the i-th bit, the metrics of the survival paths is P (i, where L i is inx set of the survival paths in the list after sorting operation, L i L; If the following inequality holds for some L i, the corresponding path is then leted, P (i L i < α i P (i (8 = where α i <. Particularly, if α i =, then no pruning is performed when coding this i-th bit. In the following part of this section, we ll discuss how to choose the value of {α i }. Performance Deterioration: Suppose that the correct path is still in the list after the sorting operation during coding the i-th bit. The probability of that the -th candidate is the correct path (i.e., the performance loss of leting this path is computed as Pr {-th path is the correct one} = P (i Li = P (i (9 Fig. 2. -vi The probability nsity function of LLR. +vi Pr ui log Pr ui 2 Statistical Threshold Configuration: Given a specific polar co, the channel property, and a tolerant FER performance loss P tol, the most direct way to configure α i is through Mote Carlo simulation. Initially, set α i = and simulate using standard (CA-SCL coding. During coding the i-th bit in each frame, the ratio of the metric of the correct path (until the i-th bit P c (i and the sum metric of the survival paths in the list is record; If the final coding result is correct and the ratio is less than α i, then update α i with this ratio, i.e., ( P c (i α i = min α i, L = P ( (i When the amount of simulated frame is large enough, the pruning operation based on (8, the FER performance loss can be very small. B. Dynamic Threshold Configuration The Monte Carlo configuration is pendant on the specific SR, co length, and co rate. Thus, it s quite difficult to use for practical application. For polar cos, the reliability of the polarized channels can be evaluated using Gaussian approximation [4] or some other techniques; in other words, the probability nsity functions (PDFs of the LLRs which corresponding to the receiving bits (conditioned on that the previous bits are correctly cod can be a priori information to the cor. In this ssection, we present a method to estimate the performance loss brought by pruning using these LLR distributions; and then, a dynamic threshold configuration method is proposed. Using the proposed thresholding method, the pruned (CA-SCL coding can fully utilize the tolerant performance terioration and thus lower the computational complexity. Path Metric Upper Bounds: The LLR PDFs can be obtained by using nsity evolution or Gaussian approximation [4]. Based on the PDF corresponding to a bit u i, we can fine a LLR region, such that the probability of the corresponding LLR taes values in [ l i, l i ] is larger than a pre-fined small probability P llr, { Pr l i log Pr{u } i = } Pr{u i = } l i P llr ( Therefore, when coding the i-th bit, if one candidate path has metric P (i, the metric of any its scendant path P ( at the -th level has an upper bound, P ( = P (i =i+ e li ( + e P ( (2 li

4 4 Fig. 3. Path Metric Level-i Fig (24,52 Eb/ =.5dB Upperbound of Path Metrics Max Metrics by Simulation Avg Metrics by Simulation Bit Inx Level-( i+ Level-( i+2 The upper bound of path metric. Survival Paths Pruned Paths Descendants of Pruned Paths which would survive Descendants of Pruned Paths which wouldn't survive A graphic monstration of the pruned paths which would survive. where i <. ote that for bit inx [i, ], every bit effects the value of P ( to some extent, no matter it s an information bit or a frozen bit. Specifically, for an information bit with relatively high reliability, i.e., with a large l i, its impact on P ( is consired negligible; for a frozen bit, since the value of l i is relatively smaller, its impact on P ( is more significant. Fig. 3 gives the simulation result of a (24, 52 polar co unr BIAWGC with SR.5dB. The coding algorithm is CA-SCL with L = 32. The maximum and average values of the path metric during coding each bit are recod. To guarantee the inequality (2 holds with probability larger than 9, we set P llr = 9. As shown in the figure, the simulation data is well bound by (2. 2 Threshold Computation: In this ssection, we propose a new threshold computation method which can fully utilize the pre-fined tolerant FER performance loss P tol. As previously stated, pruning operation during coding u i will cause some FER performance loss; When expansion at level-(i + on the co tree, the loss brought by the pruned path at level-i is accumulated, i.e., the paths which cause performance loss during coding u i+ inclu not only the newly pruned paths but also the scendants of the pruned paths at level-i. Thus, when coding at level-i on the co tree, the FER performance loss is computed based on both the newly pruned paths at level-i and the scendants of all the previously pruned paths which would be in the list. A graphic illustration is given in Fig. 4. To estimate the FER loss brought by the pruning operations, the pruned path should be record. Let S i be the active pruned path during coding the first i bits, i.e., u i. For each pruned path S i, the level inx t when it is pruned, along with the corresponding path metric p and the estimated performance loss q which is computed using (9, is record. Obviously, t i. Based on (t, p, q, the maximum metric value at the i-th level of the scendants of the pruned path can be computed using P (i in (2, Z (i = p P (t + P (i (3 The performance loss P (i which is brought by the pruning operations during coding the first i bits is evaluated as follows: S Find the survival paths in the list L i which are with metrics larger than the maximum Z (i {, } L i = L i, P (i max Z (i L i (4 S i the number of these found paths is L i ; S2 Find (L L i pruned records with indices S i S i which has the larger estimated performance losses, i.e., for any S i and S i \S i, we have q q, where S i = L L i. S3 The performance loss P (i is upper bound by P (i S i q (5 The threshold α i is termined by the tolerant performance loss P tol and the loss introduced in the previous coding process P (i, L α i = i\r i P (i (6 L i P (i where inx set R i indicates the candidates to be pruned and is the largest sset of L i which satisfies ( P tol P (i (7 P (i R i L i P (i After the pruning, the set of pruned records S i is updated as follows: S Combing S i and the newly pruned paths which are induced by R i, the obtained temporary inx set is noted by T i ; S2 Find the L pruned records with largest losses in T i, the result indices form the set T i, i.e., T i T i, for any T i and T i \T i, we have q q. S3 The minimum value of the metric upper bounds of the pruned records in T i is Z min = min T i Z (i (8 S4 S i is obtained by inactivating all the records in T i with estimated metric less than Z min { } S i = T i, Z (i Z min (9 ote that, initially, S =.

5 5 x FER Overlapped: L32, L32 Ptol=e-5 Existing, L32 Ptol=.*FER Existing, L32 Ptol=e-5 Proposed, L32 Ptol=.*FER Proposed, L8 wo pruning L6 wo pruning L32 wo pruning L32 Ptol=e-5 Existing L32 Ptol=.*FER Existing L32 Ptol=e-5 Proposed L32 Ptol=FER Proposed L32 Ptol=.*FER Proposed Average Complexity L32 Ptol=e-5 Existing L32 Ptol=.*FER Existing L32 Ptol=e-5 Proposed L32 Ptol=FER Proposed L32 Ptol=.*FER Proposed Eb/(dB Eb/(dB Fig. 5. FER performances unr different coding schemes. Fig. 6. Average computational complexity. C. Complexity The complexity of (CA-SCL coding consists of three parts: the path extension (inclus the updating of path metrics (4 (5 and the partial-sums, path metric sorting, path copy, and partial-sum updating. Applying pruning, many redundant path extensions along with path copies are avoid. Since the computational complexity to obtain a length- path is O( log [], and in the best case only one path is preserved in the list, thus the computational complexity is reduced by O(L log. However, calculating the threshold itself introduces additional compactions. For each information bit, the metrics of the survival paths and the pruned paths are add up to compute the threshold, thus the complexity increases with O(L. Thus, the computational complexity can be reduced by orr of O(L log if the P tol is set to a proper value. Moreover, when one of the two scendants of a single parent path is pruned, there is no longer need for the path copy operation. In fact, it is the usual case especially when the corresponding polarized channel is with high reliability. Therefore, the number of required path copies is also reduced. As to the path metric sorting, the least reliable paths are required to be piced out when computing the threshold, so the pruning does not reduce the sorting complexity. IV. SIMULATIO RESULTS In this section, we analyze the performance of the proposed pruned (CA-SCL coding algorithm via simulation. The simulated polar co has co length = 24 and the co rate R = /2, which is constructed unr E b / =.5dB using Gaussian Approximation [4]. The information bloc is assumed to have 6 embedd CRC bits, and CA-SCL coding is applied. Fig. 5 shows the FER performances unr different L values and pruning techniques. Fig. 6 and Fig. 7 show the corresponding average computational complexity and average number of path copies, respectively. The average computational complexity is evaluated in terms of the number of metric recursive operations, which are fined in (4 and (5. Here, Fig. 7. Average Times of Path Copies L32 Ptol=e-5 Existing L32 Ptol=.*FER Existing L32 Ptol=e-5 Proposed L32 Ptol=FER Proposed L32 Ptol=.*FER Proposed Eb/(dB umber of path copy operations. we pay more attention to the SR region where the FER is around.., which is the interesting Particularly, the thresholds of sum statistical is obtained by Monte Carlo simulation. As shown in the figures, when P tol taes a relative conservative value (compared with the FER, that is 5, all the pruning technique do not introduce noticeable loss in FER; while the proposed scheme has much lower complexity than the existing scheme in [2]. When coding with CA-SCL with L = 32 and P tol = FER, the performance is teriorated and very close to standard CA-SCL with L = 6, while the average complexity is even lower than the standard one with L = 8. Further, when P tol =. FER, the FER performance loss is less than.db, but the complexity is reduced by 5% 75%. Fig. 8 compares the FER and FER loss of the proposed pruning scheme and [2] unr different target losses P tol. The E b / is fixed to.5db. As shown in the figure, when P tol FER, the actual FER loss is very close to the target P tol ; while the actual loss of [2] is far less than the target. That means, compared with [2], the proposed pruning scheme utilizes the tolerant FER loss much more efficiently, thus it is

6 6 FER / FER Deterioration FER Target FER Target FER wo pruning FER Existing FER Existing FER Proposed FER Proposed Ptol Fig. 8. FER performance terioration comparison of the pruned coding scheme. with lower complexity. V. COCLUSIO In this paper, a tree-pruning technique to reduce the complexity of (CA-SCL is proposed. During the coding process, the candidate paths with metric less than a threshold are directly leted to avoid redundant path extensions. Based on the reliabilities of the information/frozen bits, an upper bound of the path metric is rived to estimate the terioration brought by the pruning operation. Utilizing this bound, a dynamic thresholding technique is presented. Compared with a similar existing scheme [2], the new proposed scheme can mae full use of the given tolerant performance terioration, and is much more efficient. [9] A. Balatsouas-Stimming, M. Bastani Parizi, A. Burg, LLR-based successive cencellation list coding of polar cos, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP, Florence, Italy, May 24. [] M. Monlli, S. H. Hassani, R. Urbane, Scaling Exponent of List Decors with Applications to Polar Cos, IEEE Information Theory Worshop (ITW, Sevilla, Spain, Sept. 23. [] K. Chen, K. iu, J. Lin, Improved successive cancellation coding of polar cos, IEEE Trans. on Commun., vol. 6, no. 8, pp. 3-37, 23. [2] K. Chen, K. iu, and J. Lin, A reduce-complexity successive cancellation list coding of polar cos, in IEEE 77th Vehicular Technology Conference (VTC Spring, Dresn, Germany, June 23. [3] R. Mori and T. Tanaa, Performance of polar cos with the construction using nsity evolution, IEEE Commun. Lett., vol. 3, no. 7, pp , Jul. 29 [4] P. Trifonov, Efficient sign and coding of polar cos, IEEE Trans. Commun., vol. 6, no., pp , ov. 22. [5] B. Yuan, K. K. Parhi, Successive Cancellation List Polar Decor using Log-Lielihood Ratios, 24 48th Asilomar Conference on Signals, Systems and Computers (ACSSC, pp , ov. 24. [6] G. Saris, P. Giard, A. Vardy, C. Thibeault, and W. J. Gross, Unrolled Polar Decors, Part II: Fast List Decors, arxiv:55.466v, May 25. REFERECES [] E. Arıan, Channel polarization: A method for constructing capacity achieving cos for symmetric binary-input memoryless channels, IEEE Trans. Inf. Theory, vol. 55, no. 7, pp , 29. [2] I. Tal and A. Vardy, List coding of polar cos, IEEE Int. Symp. Inform. Theory (ISIT, pp. -5, 2. [3] K. iu and K. Chen, Stac coding of polar cos, Electronics Letters, vol. 48, no. 2, pp , 22. [4]. Hussami, S. B. Korada, and R. Urbane, Performance of polar cos for channel and source coding, in IEEE Int. Symp. Inform. Theory, pp , 29. [5] I. Tal and A. Vardy, List coding of polar cos, arxiv:26.5v, May 22. [6] B. Li, H. Shen, and D. Tse, An adaptive successive cancellation list cor for polar cos with cyclic redundancy chec, IEEE Commun. Lett., vol. 6, no. 2, pp , 22. [7] K. iu and K. Chen, CRC-aid coding of polar cos, IEEE Commun. Lett., vol. 6, no., pp , Oct. 22. [8] G. Saris, P. Giard, A. Vardy, C. Thibeault, W. J. Gross, Increasing the Speed of Polar List Decors, arxiv:47.292, July 24.

SC-Fano Decoding of Polar Codes

SC-Fano Decoding of Polar Codes SC-Fano Decoding of Polar Codes Min-Oh Jeong and Song-Nam Hong Ajou University, Suwon, Korea, email: {jmo0802, snhong}@ajou.ac.kr arxiv:1901.06791v1 [eess.sp] 21 Jan 2019 Abstract In this paper, we present

More information

Polar Code Construction for List Decoding

Polar Code Construction for List Decoding 1 Polar Code Construction for List Decoding Peihong Yuan, Tobias Prinz, Georg Böcherer arxiv:1707.09753v1 [cs.it] 31 Jul 2017 Abstract A heuristic construction of polar codes for successive cancellation

More information

Efficient Bit-Channel Reliability Computation for Multi-Mode Polar Code Encoders and Decoders

Efficient Bit-Channel Reliability Computation for Multi-Mode Polar Code Encoders and Decoders Efficient Bit-Channel Reliability Computation for Multi-Mode Polar Code Encoders and Decoders Carlo Condo, Seyyed Ali Hashemi, Warren J. Gross arxiv:1705.05674v1 [cs.it] 16 May 2017 Abstract Polar codes

More information

Cluster Pairwise Error Probability and Construction of Parity-Check-Concatenated Polar Codes

Cluster Pairwise Error Probability and Construction of Parity-Check-Concatenated Polar Codes Cluster Pairwise Error Probability and Construction of Parity-Check-Concatenated Polar Codes Tao Wang, Daiming Qu and Tao Jiang, Senior Member, IEEE arxiv:80.04458v [cs.it] Oct 08 Abstract A successive

More information

Practical Polar Code Construction Using Generalised Generator Matrices

Practical Polar Code Construction Using Generalised Generator Matrices Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:

More information

Improved Successive Cancellation Flip Decoding of Polar Codes Based on Error Distribution

Improved Successive Cancellation Flip Decoding of Polar Codes Based on Error Distribution Improved Successive Cancellation Flip Decoding of Polar Codes Based on Error Distribution Carlo Condo, Furkan Ercan, Warren J. Gross Department of Electrical and Computer Engineering, McGill University,

More information

On Fast Channel Polarization of Double-layer Binary Discrete Memoryless Channels

On Fast Channel Polarization of Double-layer Binary Discrete Memoryless Channels Appl. Math. Inf. Sci. 9, o., 037-06 (05) 037 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/0.785/amis/0903 On Fast Channel Polarization of Double-layer Binary Discrete

More information

Compound Polar Codes

Compound Polar Codes Compound Polar Codes Hessam Mahdavifar, Mostafa El-Khamy, Jungwon Lee, Inyup Kang Mobile Solutions Lab, Samsung Information Systems America 4921 Directors Place, San Diego, CA 92121 {h.mahdavifar, mostafa.e,

More information

Low-Complexity Puncturing and Shortening of Polar Codes

Low-Complexity Puncturing and Shortening of Polar Codes Low-Complexity Puncturing and Shortening of Polar Codes Valerio Bioglio, Frédéric Gabry, Ingmar Land Mathematical and Algorithmic Sciences Lab France Research Center, Huawei Technologies Co. Ltd. Email:

More information

Construction of Polar Codes with Sublinear Complexity

Construction of Polar Codes with Sublinear Complexity 1 Construction of Polar Codes with Sublinear Complexity Marco Mondelli, S. Hamed Hassani, and Rüdiger Urbanke arxiv:1612.05295v4 [cs.it] 13 Jul 2017 Abstract Consider the problem of constructing a polar

More information

Short Polar Codes. Peihong Yuan. Chair for Communications Engineering. Technische Universität München

Short Polar Codes. Peihong Yuan. Chair for Communications Engineering. Technische Universität München Short Polar Codes Peihong Yuan Chair for Communications Engineering July 26, 2016 LNT & DLR Summer Workshop on Coding 1 / 23 Outline 1 Motivation 2 Improve the Distance Property 3 Simulation Results 4

More information

Minimum-Distance Based Construction of Multi-Kernel Polar Codes

Minimum-Distance Based Construction of Multi-Kernel Polar Codes Minimum-Distance Based Construction of Multi-Kernel Polar Codes Valerio Bioglio, Frédéric Gabry, Ingmar Land, Jean-Claude Belfiore Mathematical and Algorithmic Sciences Lab France Research Center, Huawei

More information

Polar Coding for the Large Hadron Collider: Challenges in Code Concatenation

Polar Coding for the Large Hadron Collider: Challenges in Code Concatenation Polar Coding for the Large Hadron Collider: Challenges in Code Concatenation Alexios Balatsoukas-Stimming, Tomasz Podzorny, Jan Uythoven {alexios.balatsoukas, tomasz.podzorny, jan.uythoven}@cern.ch European

More information

Construction and Decoding of Product Codes with Non-Systematic Polar Codes

Construction and Decoding of Product Codes with Non-Systematic Polar Codes Construction and Decoding of Product Codes with on-systematic Polar Codes Valerio Bioglio, Carlo Condo, Ingmar Land Mathematical and Algorithmic Sciences Lab Huawei Technologies France SASU Email: {valerio.bioglio,carlo.condo,ingmar.land}@huawei.com

More information

THE polar code of [1] achieves capacity of the symmetric

THE polar code of [1] achieves capacity of the symmetric Low-Complexity Concatenated Polar Codes with Excellent Scaling Behavior Sung Whan Yoon, Student Member, IEEE and Jaekyun Moon, Fellow, IEEE School of Electrical Engineering Korea Advanced Institute of

More information

5. Density evolution. Density evolution 5-1

5. Density evolution. Density evolution 5-1 5. Density evolution Density evolution 5-1 Probabilistic analysis of message passing algorithms variable nodes factor nodes x1 a x i x2 a(x i ; x j ; x k ) x3 b x4 consider factor graph model G = (V ;

More information

Enhanced belief propagation decoding of polar codes by adapting the parity-check matrix

Enhanced belief propagation decoding of polar codes by adapting the parity-check matrix Li et al. EURASIP Journal on Wireless Communications and etworking 2017) 2017:40 DOI 10.1186/s13638-017-0825-3 RESEARCH Enhanced belief propagation decoding of polar codes by adapting the parity-check

More information

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths Kasra Vakilinia, Dariush Divsalar*, and Richard D. Wesel Department of Electrical Engineering, University

More information

On Bit Error Rate Performance of Polar Codes in Finite Regime

On Bit Error Rate Performance of Polar Codes in Finite Regime On Bit Error Rate Performance of Polar Codes in Finite Regime A. Eslami and H. Pishro-Nik Abstract Polar codes have been recently proposed as the first low complexity class of codes that can provably achieve

More information

An Efficient Algorithm for Finding Dominant Trapping Sets of LDPC Codes

An Efficient Algorithm for Finding Dominant Trapping Sets of LDPC Codes An Efficient Algorithm for Finding Dominant Trapping Sets of LDPC Codes Mehdi Karimi, Student Member, IEEE and Amir H. Banihashemi, Senior Member, IEEE Abstract arxiv:1108.4478v2 [cs.it] 13 Apr 2012 This

More information

Generalized Partial Orders for Polar Code Bit-Channels

Generalized Partial Orders for Polar Code Bit-Channels Fifty-Fifth Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 3-6, 017 Generalized Partial Orders for Polar Code Bit-Channels Wei Wu, Bing Fan, and Paul H. Siegel Electrical and Computer

More information

Successive Cancellation Decoding of Single Parity-Check Product Codes

Successive Cancellation Decoding of Single Parity-Check Product Codes Successive Cancellation Decoding of Single Parity-Check Product Codes Mustafa Cemil Coşkun, Gianluigi Liva, Alexandre Graell i Amat and Michael Lentmaier Institute of Communications and Navigation, German

More information

Polar Codes: Graph Representation and Duality

Polar Codes: Graph Representation and Duality Polar Codes: Graph Representation and Duality arxiv:1312.0372v1 [cs.it] 2 Dec 2013 M. Fossorier ETIS ENSEA/UCP/CNRS UMR-8051 6, avenue du Ponceau, 95014, Cergy Pontoise, France Email: mfossorier@ieee.org

More information

Serially Concatenated Polar Codes

Serially Concatenated Polar Codes Received September 11, 2018, accepted October 13, 2018. Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000. Digital Object Identifier 10.1109/ACCESS.2018.2877720 Serially Concatenated

More information

Permuted Successive Cancellation Decoder for Polar Codes

Permuted Successive Cancellation Decoder for Polar Codes Permuted Successive Cancellation Decoder for Polar Codes Harish Vangala, Emanuele Viterbo, and Yi Hong, Dept. of ECSE, Monash University, Melbourne, VIC 3800, Australia. Email: {harish.vangala, emanuele.viterbo,

More information

Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes

Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes Xiaojie Zhang and Paul H. Siegel University of California, San Diego, La Jolla, CA 9093, U Email:{ericzhang, psiegel}@ucsd.edu

More information

FEEDBACK does not increase the capacity of a discrete

FEEDBACK does not increase the capacity of a discrete 1 Sequential Differential Optimization of Incremental Redundancy Transmission Lengths: An Example with Tail-Biting Convolutional Codes Nathan Wong, Kasra Vailinia, Haobo Wang, Sudarsan V. S. Ranganathan,

More information

β-expansion: A Theoretical Framework for Fast and Recursive Construction of Polar Codes

β-expansion: A Theoretical Framework for Fast and Recursive Construction of Polar Codes β-expansion: A Theoretical Framework for Fast and Recursive Construction of Polar Codes Gaoning He, Jean-Claude Belfiore, Ingmar Land, Ganghua Yang Paris Research Center, Huawei Technologies 0 quai du

More information

POLAR CODES FOR ERROR CORRECTION: ANALYSIS AND DECODING ALGORITHMS

POLAR CODES FOR ERROR CORRECTION: ANALYSIS AND DECODING ALGORITHMS ALMA MATER STUDIORUM UNIVERSITÀ DI BOLOGNA CAMPUS DI CESENA SCUOLA DI INGEGNERIA E ARCHITETTURA CORSO DI LAUREA MAGISTRALE IN INGEGNERIA ELETTRONICA E TELECOMUNICAZIONI PER L ENERGIA POLAR CODES FOR ERROR

More information

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International

More information

Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes

Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes Brian M. Kurkoski, Kazuhiko Yamaguchi and Kingo Kobayashi kurkoski@ice.uec.ac.jp Dept. of Information and Communications Engineering

More information

Turbo Compression. Andrej Rikovsky, Advisor: Pavol Hanus

Turbo Compression. Andrej Rikovsky, Advisor: Pavol Hanus Turbo Compression Andrej Rikovsky, Advisor: Pavol Hanus Abstract Turbo codes which performs very close to channel capacity in channel coding can be also used to obtain very efficient source coding schemes.

More information

Dynamic-SCFlip Decoding of Polar Codes

Dynamic-SCFlip Decoding of Polar Codes Dynamic-SCFlip Decoding of Polar Codes L. Chandesris, V. Savin, D. Declercq ludovic.chandesris@cea.fr, valentin.savin@cea.fr, declercq@ensea.fr CEA-LETI / Minatec, Grenoble, France arxiv:703.0444v [cs.it]

More information

Performance of Polar Codes for Channel and Source Coding

Performance of Polar Codes for Channel and Source Coding Performance of Polar Codes for Channel and Source Coding Nadine Hussami AUB, Lebanon, Email: njh03@aub.edu.lb Satish Babu Korada and üdiger Urbanke EPFL, Switzerland, Email: {satish.korada,ruediger.urbanke}@epfl.ch

More information

International Zurich Seminar on Communications (IZS), March 2 4, 2016

International Zurich Seminar on Communications (IZS), March 2 4, 2016 Resource-Aware Incremental Redundancy in Feedbac and Broadcast Richard D. Wesel, Kasra Vailinia, Sudarsan V. S. Ranganathan, Tong Mu University of California, Los Angeles, CA 90095 Email: {wesel,vailinia,

More information

On the Typicality of the Linear Code Among the LDPC Coset Code Ensemble

On the Typicality of the Linear Code Among the LDPC Coset Code Ensemble 5 Conference on Information Sciences and Systems The Johns Hopkins University March 16 18 5 On the Typicality of the Linear Code Among the LDPC Coset Code Ensemble C.-C. Wang S.R. Kulkarni and H.V. Poor

More information

Interleaved Concatenations of Polar Codes with BCH and Convolutional Codes

Interleaved Concatenations of Polar Codes with BCH and Convolutional Codes 1 Interleaved Concatenations of Polar Codes with BCH and Convolutional Codes Ying Wang, Krishna R. arayanan and Yu-Chih Huang Department of Electrical and Computer Engineering, Texas A&M University Department

More information

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes EE229B - Final Project Capacity-Approaching Low-Density Parity-Check Codes Pierre Garrigues EECS department, UC Berkeley garrigue@eecs.berkeley.edu May 13, 2005 Abstract The class of low-density parity-check

More information

THIS paper is aimed at designing efficient decoding algorithms

THIS paper is aimed at designing efficient decoding algorithms IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBER 1999 2333 Sort-and-Match Algorithm for Soft-Decision Decoding Ilya Dumer, Member, IEEE Abstract Let a q-ary linear (n; k)-code C be used

More information

Soft-Input Soft-Output Sphere Decoding

Soft-Input Soft-Output Sphere Decoding Soft-Input Soft-Output Sphere Decoding Christoph Studer Integrated Systems Laboratory ETH Zurich, 809 Zurich, Switzerland Email: studer@iiseeethzch Helmut Bölcskei Communication Technology Laboratory ETH

More information

Polar Codes: Construction and Performance Analysis

Polar Codes: Construction and Performance Analysis Master Project Polar Codes: Construction and Performance Analysis Ramtin Pedarsani ramtin.pedarsani@epfl.ch Supervisor: Prof. Emre Telatar Assistant: Hamed Hassani Information Theory Laboratory (LTHI)

More information

An Alternative Proof of Channel Polarization for Channels with Arbitrary Input Alphabets

An Alternative Proof of Channel Polarization for Channels with Arbitrary Input Alphabets An Alternative Proof of Channel Polarization for Channels with Arbitrary Input Alphabets Jing Guo University of Cambridge jg582@cam.ac.uk Jossy Sayir University of Cambridge j.sayir@ieee.org Minghai Qin

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

POLAR codes, which are proposed in [1], provably achieve

POLAR codes, which are proposed in [1], provably achieve IEEE TRANSACTIONS ON COMMUNICATIONS 1 A Correlation-Breaking Interleaving of Polar Codes Ya Meng, Student Member, IEEE, Liping Li, Member, IEEE, Chuan Zhang, Member, IEEE arxiv:1702.05202v1 [cs.it] 17

More information

Recent Results on Capacity-Achieving Codes for the Erasure Channel with Bounded Complexity

Recent Results on Capacity-Achieving Codes for the Erasure Channel with Bounded Complexity 26 IEEE 24th Convention of Electrical and Electronics Engineers in Israel Recent Results on Capacity-Achieving Codes for the Erasure Channel with Bounded Complexity Igal Sason Technion Israel Institute

More information

Fountain Uncorrectable Sets and Finite-Length Analysis

Fountain Uncorrectable Sets and Finite-Length Analysis Fountain Uncorrectable Sets and Finite-Length Analysis Wen Ji 1, Bo-Wei Chen 2, and Yiqiang Chen 1 1 Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology, Chinese

More information

Introduction to Low-Density Parity Check Codes. Brian Kurkoski

Introduction to Low-Density Parity Check Codes. Brian Kurkoski Introduction to Low-Density Parity Check Codes Brian Kurkoski kurkoski@ice.uec.ac.jp Outline: Low Density Parity Check Codes Review block codes History Low Density Parity Check Codes Gallager s LDPC code

More information

Bounds on Mutual Information for Simple Codes Using Information Combining

Bounds on Mutual Information for Simple Codes Using Information Combining ACCEPTED FOR PUBLICATION IN ANNALS OF TELECOMM., SPECIAL ISSUE 3RD INT. SYMP. TURBO CODES, 003. FINAL VERSION, AUGUST 004. Bounds on Mutual Information for Simple Codes Using Information Combining Ingmar

More information

Distributed Arithmetic Coding

Distributed Arithmetic Coding Distributed Arithmetic Coding Marco Grangetto, Member, IEEE, Enrico Magli, Member, IEEE, Gabriella Olmo, Senior Member, IEEE Abstract We propose a distributed binary arithmetic coder for Slepian-Wolf coding

More information

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land Ingmar Land, SIPCom8-1: Information Theory and Coding (2005 Spring) p.1 Overview Basic Concepts of Channel Coding Block Codes I:

More information

Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel

Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel Pål Ellingsen paale@ii.uib.no Susanna Spinsante s.spinsante@univpm.it Angela Barbero angbar@wmatem.eis.uva.es May 31, 2005 Øyvind Ytrehus

More information

Multi-Kernel Polar Codes: Proof of Polarization and Error Exponents

Multi-Kernel Polar Codes: Proof of Polarization and Error Exponents Multi-Kernel Polar Codes: Proof of Polarization and Error Exponents Meryem Benammar, Valerio Bioglio, Frédéric Gabry, Ingmar Land Mathematical and Algorithmic Sciences Lab Paris Research Center, Huawei

More information

Lecture 11: Polar codes construction

Lecture 11: Polar codes construction 15-859: Information Theory and Applications in TCS CMU: Spring 2013 Lecturer: Venkatesan Guruswami Lecture 11: Polar codes construction February 26, 2013 Scribe: Dan Stahlke 1 Polar codes: recap of last

More information

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department

More information

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Behzad Amiri Electrical Eng. Department University of California, Los Angeles Los Angeles, USA Email: amiri@ucla.edu Jorge Arturo Flores

More information

CONSIDER the following generic model:

CONSIDER the following generic model: 1104 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 53, NO. 7, JULY 2005 Sphere Decoding Algorithms With Improved Radius Search Wanlun Zhao Georgios B. Giannakis, Fellow, IEEE Abstract We start by identifying

More information

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel /33 Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel Presented by Paul de Kerret Joint work with Antonio Bazco, Nicolas Gresset, and David Gesbert ESIT 2017 in Madrid,

More information

Extended MinSum Algorithm for Decoding LDPC Codes over GF (q)

Extended MinSum Algorithm for Decoding LDPC Codes over GF (q) Extended MinSum Algorithm for Decoding LDPC Codes over GF (q) David Declercq ETIS ENSEA/UCP/CNRS UMR-8051, 95014 Cergy-Pontoise, (France), declercq@ensea.fr Marc Fossorier Dept. Electrical Engineering,

More information

Codes on graphs and iterative decoding

Codes on graphs and iterative decoding Codes on graphs and iterative decoding Bane Vasić Error Correction Coding Laboratory University of Arizona Funded by: National Science Foundation (NSF) Seagate Technology Defense Advanced Research Projects

More information

On Performance of Sphere Decoding and Markov Chain Monte Carlo Detection Methods

On Performance of Sphere Decoding and Markov Chain Monte Carlo Detection Methods 1 On Performance of Sphere Decoding and Markov Chain Monte Carlo Detection Methods Haidong (David) Zhu, Behrouz Farhang-Boroujeny, and Rong-Rong Chen ECE Department, Unversity of Utah, USA emails: haidongz@eng.utah.edu,

More information

One Lesson of Information Theory

One Lesson of Information Theory Institut für One Lesson of Information Theory Prof. Dr.-Ing. Volker Kühn Institute of Communications Engineering University of Rostock, Germany Email: volker.kuehn@uni-rostock.de http://www.int.uni-rostock.de/

More information

Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor

Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor Pravin Salunkhe, Prof D.P Rathod Department of Electrical Engineering, Veermata Jijabai

More information

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks Communications and Networ, 2010, 2, 87-92 doi:10.4236/cn.2010.22014 Published Online May 2010 (http://www.scirp.org/journal/cn Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless

More information

LDPC Decoder LLR Stopping Criterion

LDPC Decoder LLR Stopping Criterion International Conference on Innovative Trends in Electronics Communication and Applications 1 International Conference on Innovative Trends in Electronics Communication and Applications 2015 [ICIECA 2015]

More information

Codes on graphs and iterative decoding

Codes on graphs and iterative decoding Codes on graphs and iterative decoding Bane Vasić Error Correction Coding Laboratory University of Arizona Prelude Information transmission 0 0 0 0 0 0 Channel Information transmission signal 0 0 threshold

More information

LOW-density parity-check (LDPC) codes were invented

LOW-density parity-check (LDPC) codes were invented IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 1, JANUARY 2008 51 Extremal Problems of Information Combining Yibo Jiang, Alexei Ashikhmin, Member, IEEE, Ralf Koetter, Senior Member, IEEE, and Andrew

More information

A Rate-Distortion Exponent Approach to Multiple Decoding Attempts for Reed-Solomon Codes

A Rate-Distortion Exponent Approach to Multiple Decoding Attempts for Reed-Solomon Codes A Rate-Distortion Exponent Approach to Multiple Decoding Attempts for Reed-Solomon Codes Phong S guyen, Henry D Pfister, and Krishna R arayanan Department of Electrical and Computer Engineering, Texas

More information

Guess & Check Codes for Deletions, Insertions, and Synchronization

Guess & Check Codes for Deletions, Insertions, and Synchronization Guess & Chec Codes for Deletions, Insertions, and Synchronization Serge Kas Hanna, Salim El Rouayheb ECE Department, IIT, Chicago sashann@hawiitedu, salim@iitedu Abstract We consider the problem of constructing

More information

LDPC Codes. Intracom Telecom, Peania

LDPC Codes. Intracom Telecom, Peania LDPC Codes Alexios Balatsoukas-Stimming and Athanasios P. Liavas Technical University of Crete Dept. of Electronic and Computer Engineering Telecommunications Laboratory December 16, 2011 Intracom Telecom,

More information

Efficient LLR Calculation for Non-Binary Modulations over Fading Channels

Efficient LLR Calculation for Non-Binary Modulations over Fading Channels Efficient LLR Calculation for Non-Binary Modulations over Fading Channels Raman Yazdani, Student Member, IEEE, and arxiv:12.2164v1 [cs.it] 1 Feb 21 Masoud Ardaani, Senior Member, IEEE Department of Electrical

More information

One-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information

One-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information One-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information ZOU Sheng and Brian M. Kurkoski kurkoski@ice.uec.ac.jp University of Electro-Communications Tokyo, Japan University of

More information

Belief-Propagation Decoding of LDPC Codes

Belief-Propagation Decoding of LDPC Codes LDPC Codes: Motivation Belief-Propagation Decoding of LDPC Codes Amir Bennatan, Princeton University Revolution in coding theory Reliable transmission, rates approaching capacity. BIAWGN, Rate =.5, Threshold.45

More information

Advances in Error Control Strategies for 5G

Advances in Error Control Strategies for 5G Advances in Error Control Strategies for 5G Jörg Kliewer The Elisha Yegal Bar-Ness Center For Wireless Communications And Signal Processing Research 5G Requirements [Nokia Networks: Looking ahead to 5G.

More information

Belief propagation decoding of quantum channels by passing quantum messages

Belief propagation decoding of quantum channels by passing quantum messages Belief propagation decoding of quantum channels by passing quantum messages arxiv:67.4833 QIP 27 Joseph M. Renes lempelziv@flickr To do research in quantum information theory, pick a favorite text on classical

More information

An Improved Sphere-Packing Bound for Finite-Length Codes over Symmetric Memoryless Channels

An Improved Sphere-Packing Bound for Finite-Length Codes over Symmetric Memoryless Channels An Improved Sphere-Packing Bound for Finite-Length Codes over Symmetric Memoryless Channels Gil Wiechman Igal Sason Department of Electrical Engineering Technion, Haifa 3000, Israel {igillw@tx,sason@ee}.technion.ac.il

More information

Correcting Bursty and Localized Deletions Using Guess & Check Codes

Correcting Bursty and Localized Deletions Using Guess & Check Codes Correcting Bursty and Localized Deletions Using Guess & Chec Codes Serge Kas Hanna, Salim El Rouayheb ECE Department, Rutgers University serge..hanna@rutgers.edu, salim.elrouayheb@rutgers.edu Abstract

More information

Information Theoretic Imaging

Information Theoretic Imaging Information Theoretic Imaging WU Faculty: J. A. O Sullivan WU Doctoral Student: Naveen Singla Boeing Engineer: James Meany First Year Focus: Imaging for Data Storage Image Reconstruction Data Retrieval

More information

Advanced Hardware Architecture for Soft Decoding Reed-Solomon Codes

Advanced Hardware Architecture for Soft Decoding Reed-Solomon Codes Advanced Hardware Architecture for Soft Decoding Reed-Solomon Codes Stefan Scholl, Norbert Wehn Microelectronic Systems Design Research Group TU Kaiserslautern, Germany Overview Soft decoding decoding

More information

Aalborg Universitet. Bounds on information combining for parity-check equations Land, Ingmar Rüdiger; Hoeher, A.; Huber, Johannes

Aalborg Universitet. Bounds on information combining for parity-check equations Land, Ingmar Rüdiger; Hoeher, A.; Huber, Johannes Aalborg Universitet Bounds on information combining for parity-check equations Land, Ingmar Rüdiger; Hoeher, A.; Huber, Johannes Published in: 2004 International Seminar on Communications DOI link to publication

More information

Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 1

Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 1 Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 1 Sunghwan Kim, Jong-Seon No School of Electrical Eng. & Com. Sci. Seoul National University, Seoul, Korea Email: {nodoubt, jsno}@snu.ac.kr

More information

An Introduction to Low-Density Parity-Check Codes

An Introduction to Low-Density Parity-Check Codes An Introduction to Low-Density Parity-Check Codes Paul H. Siegel Electrical and Computer Engineering University of California, San Diego 5/ 3/ 7 Copyright 27 by Paul H. Siegel Outline Shannon s Channel

More information

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Stefano Rini, Ernest Kurniawan and Andrea Goldsmith Technische Universität München, Munich, Germany, Stanford University,

More information

Coding for Memory with Stuck-at Defects

Coding for Memory with Stuck-at Defects Coding for Memory with Stuck-at Defects Yongjune Kim B. V. K. Vijaya Kumar Electrical Computer Engineering, Data Storage Systems Center (DSSC) Carnegie Mellon University Pittsburgh, USA yongjunekim@cmu.edu,

More information

arxiv: v1 [cs.it] 4 Jun 2018

arxiv: v1 [cs.it] 4 Jun 2018 State-Dependent Interference Channel with Correlated States 1 Yunhao Sun, 2 Ruchen Duan, 3 Yingbin Liang, 4 Shlomo Shamai (Shitz) 5 Abstract arxiv:180600937v1 [csit] 4 Jun 2018 This paper investigates

More information

Quasi-cyclic Low Density Parity Check codes with high girth

Quasi-cyclic Low Density Parity Check codes with high girth Quasi-cyclic Low Density Parity Check codes with high girth, a work with Marta Rossi, Richard Bresnan, Massimilliano Sala Summer Doctoral School 2009 Groebner bases, Geometric codes and Order Domains Dept

More information

Time-invariant LDPC convolutional codes

Time-invariant LDPC convolutional codes Time-invariant LDPC convolutional codes Dimitris Achlioptas, Hamed Hassani, Wei Liu, and Rüdiger Urbanke Department of Computer Science, UC Santa Cruz, USA Email: achlioptas@csucscedu Department of Computer

More information

Statistical mechanics and capacity-approaching error-correctingcodes

Statistical mechanics and capacity-approaching error-correctingcodes Physica A 302 (2001) 14 21 www.elsevier.com/locate/physa Statistical mechanics and capacity-approaching error-correctingcodes Nicolas Sourlas Laboratoire de Physique Theorique de l, UMR 8549, Unite Mixte

More information

An Outer Bound for the Gaussian. Interference channel with a relay.

An Outer Bound for the Gaussian. Interference channel with a relay. An Outer Bound for the Gaussian Interference Channel with a Relay Ivana Marić Stanford University Stanford, CA ivanam@wsl.stanford.edu Ron Dabora Ben-Gurion University Be er-sheva, Israel ron@ee.bgu.ac.il

More information

Polar Codes are Optimal for Lossy Source Coding

Polar Codes are Optimal for Lossy Source Coding Polar Codes are Optimal for Lossy Source Coding Satish Babu Korada and Rüdiger Urbanke EPFL, Switzerland, Email: satish.korada,ruediger.urbanke}@epfl.ch Abstract We consider lossy source compression of

More information

APPLICATIONS. Quantum Communications

APPLICATIONS. Quantum Communications SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction

More information

Reduced Complexity Sphere Decoding for Square QAM via a New Lattice Representation

Reduced Complexity Sphere Decoding for Square QAM via a New Lattice Representation Reduced Complexity Sphere Decoding for Square QAM via a New Lattice Representation Luay Azzam and Ender Ayanoglu Department of Electrical Engineering and Computer Science University of California, Irvine

More information

UNIT I INFORMATION THEORY. I k log 2

UNIT I INFORMATION THEORY. I k log 2 UNIT I INFORMATION THEORY Claude Shannon 1916-2001 Creator of Information Theory, lays the foundation for implementing logic in digital circuits as part of his Masters Thesis! (1939) and published a paper

More information

Graph-based Codes for Quantize-Map-and-Forward Relaying

Graph-based Codes for Quantize-Map-and-Forward Relaying 20 IEEE Information Theory Workshop Graph-based Codes for Quantize-Map-and-Forward Relaying Ayan Sengupta, Siddhartha Brahma, Ayfer Özgür, Christina Fragouli and Suhas Diggavi EPFL, Switzerland, UCLA,

More information

Turbo Codes for Deep-Space Communications

Turbo Codes for Deep-Space Communications TDA Progress Report 42-120 February 15, 1995 Turbo Codes for Deep-Space Communications D. Divsalar and F. Pollara Communications Systems Research Section Turbo codes were recently proposed by Berrou, Glavieux,

More information

Achieving Flexibility in LDPC Code Design by Absorbing Set Elimination

Achieving Flexibility in LDPC Code Design by Absorbing Set Elimination Achieving Flexibility in LDPC Code Design by Absorbing Set Elimination Jiajun Zhang, Jiadong Wang, Shayan Garani Srinivasa, Lara Dolecek Department of Electrical Engineering, University of California,

More information

Noisy channel communication

Noisy channel communication Information Theory http://www.inf.ed.ac.uk/teaching/courses/it/ Week 6 Communication channels and Information Some notes on the noisy channel setup: Iain Murray, 2012 School of Informatics, University

More information

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels Anindya Sarkar and B. S. Manjunath Department of Electrical and Computer Engineering, University

More information

NAME... Soc. Sec. #... Remote Location... (if on campus write campus) FINAL EXAM EE568 KUMAR. Sp ' 00

NAME... Soc. Sec. #... Remote Location... (if on campus write campus) FINAL EXAM EE568 KUMAR. Sp ' 00 NAME... Soc. Sec. #... Remote Location... (if on campus write campus) FINAL EXAM EE568 KUMAR Sp ' 00 May 3 OPEN BOOK exam (students are permitted to bring in textbooks, handwritten notes, lecture notes

More information

Introduction to Convolutional Codes, Part 1

Introduction to Convolutional Codes, Part 1 Introduction to Convolutional Codes, Part 1 Frans M.J. Willems, Eindhoven University of Technology September 29, 2009 Elias, Father of Coding Theory Textbook Encoder Encoder Properties Systematic Codes

More information

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage 1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,

More information