Upper Bounding the Performance of Arbitrary Finite LDPC Codes on Binary Erasure Channels
|
|
- Linda Davis
- 5 years ago
- Views:
Transcription
1 Upper Bounding the Performance of Arbitrary Finite LDPC Codes on Binary Erasure Channels An efficient exhaustion algorithm for error-prone patterns C.-C. Wang, S.R. Kulkarni, and H.V. Poor School of Electrical & Computer Engineering, Purdue Unversity Department of Electrical Engineering, Princeton University Wang, Kulkarni, & Poor p. 1/24
2 Content Brief introduction Stopping sets in erasure channels. Hardness & Applications. Existing approaches for upper / lower bounding the fixed code performance: A tree-based upper bound for bit error rates. Frame error rates and trapping sets. Wang, Kulkarni, & Poor p. 2/24
3 Stopping Sets (SSs) Definition: a set of variable nodes such that the induced graph contains no check node of degree 1. Example: The binary (7,4) Hamming Code i = 1 j = (2, 5, 7) a valid codeword vs. (4, 6, 7) a pure stopping set. Hamming distance vs. Stopping distance Wang, Kulkarni, & Poor p. 3/24
4 Stopping Sets (SSs) Definition: a set of variable nodes such that the induced graph contains no check node of degree 1. Example: The binary (7,4) Hamming Code i = 1 j = (2, 5, 7) a valid codeword vs. (4, 6, 7) a pure stopping set. Hamming distance vs. Stopping distance Wang, Kulkarni, & Poor p. 3/24
5 Stopping Sets (SSs) Definition: a set of variable nodes such that the induced graph contains no check node of degree 1. Example: The binary (7,4) Hamming Code i = 1 j = (2, 5, 7) a valid codeword vs. (4, 6, 7) a pure stopping set. Hamming distance vs. Stopping distance Wang, Kulkarni, & Poor p. 3/24
6 Upper Bounds vs. Exhausting Minimum Stopping Sets An n = 72 regular (3,6) LDPC code ber erasure prob ε V60: Monte Carlo V60: UB Wang, Kulkarni, & Poor p. 4/24
7 Upper Bounds vs. Exhausting Minimum Stopping Sets An n = 72 regular (3,6) LDPC code An NP-Complete Problem!! ber by Krishnan et al erasure prob ε V60: Monte Carlo V60: UB Wang, Kulkarni, & Poor p. 4/24
8 A Hard but Useful Problem As an upper bound: Guaranteed worst performance for extremely low ber regimes. As an SS exhaustion algorithm: Code annealing [Wang 06] Error Probability Typical CL CL+d2opt 10 5 CL+CA (DA+CA)+CL+CA 10 6 (DA+CA)+CL+CA, asym. Random Constr. Direct CA Erasure Probability ε Wang, Kulkarni, & Poor p. 5/24
9 Existing Approaches Ensemble analysis: [Di et al. 02] avg. ber and FER curves, [Amraoui et al. 04] the scaling law for water fall regions. Fixed Code analysis: [Holzlöhner et al. 05] dual adaptive importance sampling, [Stepanov et al. 06] instanton method Enumerating bad patterns: [Richardson 03] error floors of LDPC codes, [Yedidia et al. 01] projection algebra, [Hu et al. 04] the minimum distance of LDPC codes. They are all inexhaustive enumeration. Wang, Kulkarni, & Poor p. 6/24
10 The Bit-Oriented Detection i = 1 j = Using 1: for erasure 0: for non-erasure Wang, Kulkarni, & Poor p. 7/24
11 The Bit-Oriented Detection i = 1 j = Using 1: for erasure 0: for non-erasure f 2,0 = x 2 Wang, Kulkarni, & Poor p. 7/24
12 The Bit-Oriented Detection i = 1 j = Using 1: for erasure 0: for non-erasure f 2,0 = x 2 f 2,1 = x 2 (x 1 + x 3 )(x 4 + x 6 ) Wang, Kulkarni, & Poor p. 7/24
13 The Bit-Oriented Detection i = 1 j = Using 1: for erasure 0: for non-erasure f 2,0 = x 2 f 2,1 = x 2 (x 1 + x 3 )(x 4 + x 6 ) f 2,2 = x 2 (x 1 ( f 5 4,1 + f 6 4,1 ) + x 3 ( f 4 3,1 + f 5 3,1 )) (x 4 ( f 3 3,1 + f 5 3,1 ) + x 6 ( f 1 4,1 + f 5 4,1 )) = x 2 (x 1 (x 5 + x 6 ) + x 3 (x 4 + x 5 )) (x 4 (x 3 + x 5 ) + x 6 (x 1 + x 5 )) Wang, Kulkarni, & Poor p. 7/24
14 The Bit-Oriented Detection i = 1 j = Using 1: for erasure 0: for non-erasure f 2,0 = x 2 f 2,1 = x 2 (x 1 + x 3 )(x 4 + x 6 ) f 2,2 = x 2 (x 1 ( f 5 4,1 + f 6 4,1 ) + x 3 ( f 4 3,1 + f 5 3,1 )) (x 4 ( f 3 3,1 + f 5 3,1 ) + x 6 ( f 1 4,1 + f 5 4,1 )) = x 2 (x 1 (x 5 + x 6 ) + x 3 (x 4 + x 5 )) (x 4 (x 3 + x 5 ) + x 6 (x 1 + x 5 )) f 2 := lim l f 2,l = f 2,2 Wang, Kulkarni, & Poor p. 7/24
15 The Bit-Oriented Detection i = 1 j = Using 1: for erasure 0: for non-erasure f 2,0 = x 2 f 2,1 = x 2 (x 1 + x 3 )(x 4 + x 6 ) f 2,2 = x 2 (x 1 ( f 5 4,1 + f 6 4,1 ) + x 3 ( f 4 3,1 + f 5 3,1 )) (x 4 ( f 3 3,1 + f 5 3,1 ) + x 6 ( f 1 4,1 + f 5 4,1 )) = x 2 (x 1 (x 5 + x 6 ) + x 3 (x 4 + x 5 )) (x 4 (x 3 + x 5 ) + x 6 (x 1 + x 5 )) f 2 := lim f 2,l = f 2,2 l p 2 = E{ f 2 } Wang, Kulkarni, & Poor p. 7/24
16 The Bit-Oriented Detection i = 1 j = Using 1: for erasure 0: for non-erasure f 2,0 = x 2 f 2,1 = x 2 (x 1 + x 3 )(x 4 + x 6 ) f 2,2 = x 2 (x 1 ( f 5 4,1 + f 6 4,1 ) + x 3 ( f 4 3,1 + f 5 3,1 )) (x 4 ( f 3 3,1 + f 5 3,1 ) + x 6 ( f 1 4,1 + f 5 4,1 )) = x 2 (x 1 (x 5 + x 6 ) + x 3 (x 4 + x 5 )) (x 4 (x 3 + x 5 ) + x 6 (x 1 + x 5 )) f 2 := lim f 2,l = f 2,2 l Asymptotically, no repeated variables p 2 = E{ f 2 } Wang, Kulkarni, & Poor p. 7/24
17 Enumeration-Based LB & UB f 2 = x 2 (x 1 (x 5 + x 6 ) + x 3 (x 4 + x 5 )) (x 4 (x 3 + x 5 ) + x 6 (x 1 + x 5 )) = x 1 x 2 x 6 + x 2 x 3 x 4 + x 1 x 2 x 4 x 5 + x 2 x 3 x 5 x 6 Each product term corresponds to an irreducible stopping set. Wang, Kulkarni, & Poor p. 8/24
18 Enumeration-Based LB & UB f 2 = x 2 (x 1 (x 5 + x 6 ) + x 3 (x 4 + x 5 )) (x 4 (x 3 + x 5 ) + x 6 (x 1 + x 5 )) = x 1 x 2 x 6 + x 2 x 3 x 4 + x 1 x 2 x 4 x 5 + x 2 x 3 x 5 x 6 Each product term corresponds to an irreducible stopping set. LB: Graph-based search [Richardson 03], iteration-based relaxation [Yedidia et al. 01] f 2,LBa = x 2 x 3 x 4 f 2,LBb = x 1 x 2 x 4 x 5 LB a = E{ f 2,LB } = ǫ 3 LB b = E{ f 2,LBb } = ǫ 4 Wang, Kulkarni, & Poor p. 8/24
19 Enumeration-Based LB & UB f 2 = x 2 (x 1 (x 5 + x 6 ) + x 3 (x 4 + x 5 )) (x 4 (x 3 + x 5 ) + x 6 (x 1 + x 5 )) = x 1 x 2 x 6 + x 2 x 3 x 4 + x 1 x 2 x 4 x 5 + x 2 x 3 x 5 x 6 Each product term corresponds to an irreducible stopping set. LB: Graph-based search [Richardson 03], iteration-based relaxation [Yedidia et al. 01] f 2,LBa = x 2 x 3 x 4 f 2,LBb = x 1 x 2 x 4 x 5 LB a = E{ f 2,LB } = ǫ 3 LB b = E{ f 2,LBb } = ǫ 4 UB: Iteration-based relaxation [Yedidia et al. 01] f 2,2 = x 2 x 3 x 4 + x 1 x 2 x 4 x 5 + x 1 x 2 x 6 + x 2 x 3 x 5 x 6 x 2 1x 4 + 1x 2 x x 2 x 6 + x 2 1 1x 6 = x 2 x 4 + x 2 x 6 UB = 2ǫ 2 ǫ 3 Wang, Kulkarni, & Poor p. 8/24
20 An Upper Bound f a f b Wang, Kulkarni, & Poor p. 9/24
21 An Upper Bound f a f b f a = f b 3 4 E DE { f a } < p e = E{ f a } = E{ f b } E DE { f b } Wang, Kulkarni, & Poor p. 9/24
22 An Upper Bound f a f b f a = f b 3 4 E DE { f a } < p e = E{ f a } = E{ f b } E DE { f b } Wang, Kulkarni, & Poor p. 9/24
23 An Upper Bound f a f b f a = f b E DE { f a } < p e = E{ f a } = E{ f b } E DE { f b } Wang, Kulkarni, & Poor p. 9/24
24 An Upper Bound (Cont d) Theorem 1 Suppose all messages entering any variable node are independent, or equivalently, the youngest common ancestors of all pairs of repeated bits are check nodes. E DE { f } E{ f } Theorem 2 This upper bound is tight in order. E DE { f }(ǫ) = O(E{ f }(ǫ)), ǫ Wang, Kulkarni, & Poor p. 10/24
25 A Pivoting Rule f = x 0 f x0 =1 + f x0 =0 Wang, Kulkarni, & Poor p. 11/24
26 A Pivoting Rule f = x 0 f x0 =1 + f x0 =0 f x 0 (a) Original x 0 f x0 =1 1 0 (b) Decoupled f f x0 =0 Wang, Kulkarni, & Poor p. 11/24
27 The Two-Stage Algorithm f Wang, Kulkarni, & Poor p. 12/24
28 The Two-Stage Algorithm f Wang, Kulkarni, & Poor p. 12/24
29 The Two-Stage Algorithm f f FINITE Wang, Kulkarni, & Poor p. 12/24
30 The Two-Stage Algorithm f f FINITE Wang, Kulkarni, & Poor p. 12/24
31 The Two-Stage Algorithm f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24
32 The Two-Stage Algorithm w. the same order p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24
33 The Two-Stage Algorithm w. the same order p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24
34 The Two-Stage Algorithm w. the same order p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24
35 The Two-Stage Algorithm w. the same order p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24
36 The Two-Stage Algorithm w. the same order p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24
37 The Two-Stage Algorithm w. the same order p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24
38 The Two-Stage Algorithm w. the same order p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24
39 The Two-Stage Algorithm w. the same order p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24
40 A Narrowing Search Theorem 3 (Asymptotically Tight) With an optimal" growing module, we have UB(ǫ) = O(p e (ǫ)). Wang, Kulkarni, & Poor p. 13/24
41 A Narrowing Search Theorem 3 (Asymptotically Tight) With an optimal" growing module, we have UB(ǫ) = O(p e (ǫ)). Theorem 4 (Exhaustive Enumeration) d := min{size(x) x such that f FINITE (x) = 1}. Then the stopping distance d. If there exists such a minimum x being a SS, then ALL minimum SSs are in the set of all minimum x. The exhaustive list of minimum SSs leads to a lower bound tight in both order and multiplicity. Wang, Kulkarni, & Poor p. 13/24
42 The Two-Stage Algorithm p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 14/24
43 Numerical Experiments The (7,4,3) Hamming code: H = Wang, Kulkarni, & Poor p. 15/24
44 Numerical Experiments The (7,4,3) Hamming code: H = i [1, 7], ǫ (0, 1], UB i (ǫ) p i (ǫ) 1.3. Wang, Kulkarni, & Poor p. 15/24
45 Numerical Experiments The (7,4,3) Hamming code: The (23,12,7) Golay code: H = [H I] in which H = H = i [1, 7], ǫ (0, 1], UB i (ǫ) p i (ǫ) Wang, Kulkarni, & Poor p. 15/24
46 Numerical Experiments (cont d) The (23,12,7) Golay code: bit 0, (4*,75*) ber erasure prob ε V0: MC S V0: UB V0: C UB V0: LB Wang, Kulkarni, & Poor p. 16/24
47 Numerical Experiments (cont d) A fixed, finite LDPC code with var deg. 3, chk deg. 6, n = 50: bit 0, (4*,1*) ber V0: MC S V0: UB V0: C UB V0: LB erasure prob ε Wang, Kulkarni, & Poor p. 17/24
48 Numerical Experiments (cont d) A fixed, finite LDPC code with var deg. 3, chk deg. 6, n = 50: bit 26, (6*,2*) ber V26: MC S V26: UB V26: C UB V26: LB erasure prob ε Wang, Kulkarni, & Poor p. 17/24
49 Numerical Experiments (cont d) A fixed, finite LDPC code with var deg. 3, chk deg. 6, n = 50: bit 19, (7*,10 5*) ber V19: MC S V19: UB V19: C UB V19: LB erasure prob ε Wang, Kulkarni, & Poor p. 17/24
50 Frame Error Rates and Irregular Codes Frame error rate (FER): f FER = n i=1 f i. Wang, Kulkarni, & Poor p. 18/24
51 Frame Error Rates and Irregular Codes Frame error rate (FER): f FER = n i=1 f i. Efficiency: More cycles = less efficiency. (The Golay code is the worst.) The larger n, the easier for our algorithm. Wang, Kulkarni, & Poor p. 18/24
52 Frame Error Rates and Irregular Codes Frame error rate (FER): f FER = n i=1 f i. Efficiency: More cycles = less efficiency. (The Golay code is the worst.) The larger n, the easier for our algorithm. Experimental results Consider codes of n = For regular codes, d SS 12 can be exhausted. (( ) = trials) The FER of irregular codes suits the algorithm most. d SS 13 can be exhausted. (( ) = trials) Wang, Kulkarni, & Poor p. 18/24
53 The FER of A Rate 1/2 Irregular Code λ(x) = x x x 5 ρ(x) = x 5. 61% variable nodes of degree 2 A rate 1/2 n = 572 irregular LDPC code, (order, multi)=(13*,104*) Error Probability Typical CL CL+d2opt 10 5 CL+CA (DA+CA)+CL+CA 10 6 (DA+CA)+CL+CA, asym. Random Constr. Direct CA Erasure Probability ε Wang, Kulkarni, & Poor p. 19/24
54 Summary Upper bounding and exhausting the bad patterns An NP-complete problem but feasible for at least short practical LDPC codes. Wang, Kulkarni, & Poor p. 20/24
55 Summary Upper bounding and exhausting the bad patterns An NP-complete problem but feasible for at least short practical LDPC codes. Taking advantages of the tree-like structure. Wang, Kulkarni, & Poor p. 20/24
56 Summary Upper bounding and exhausting the bad patterns An NP-complete problem but feasible for at least short practical LDPC codes. Taking advantages of the tree-like structure. Suitable for both FER and ber, punctured codes, unequal sub-channel analysis, non-sparse codes, etc. Wang, Kulkarni, & Poor p. 20/24
57 Summary Upper bounding and exhausting the bad patterns An NP-complete problem but feasible for at least short practical LDPC codes. Taking advantages of the tree-like structure. Suitable for both FER and ber, punctured codes, unequal sub-channel analysis, non-sparse codes, etc. Our algorithm can be easily modified for trapping sets. Wang, Kulkarni, & Poor p. 20/24
58 Summary Upper bounding and exhausting the bad patterns An NP-complete problem but feasible for at least short practical LDPC codes. Taking advantages of the tree-like structure. Suitable for both FER and ber, punctured codes, unequal sub-channel analysis, non-sparse codes, etc. Our algorithm can be easily modified for trapping sets. A useful tool for finite code optimization. Wang, Kulkarni, & Poor p. 20/24
59 Summary Upper bounding and exhausting the bad patterns An NP-complete problem but feasible for at least short practical LDPC codes. Taking advantages of the tree-like structure. Suitable for both FER and ber, punctured codes, unequal sub-channel analysis, non-sparse codes, etc. Our algorithm can be easily modified for trapping sets. A useful tool for finite code optimization. A starting point for more efficient algorithms. Wang, Kulkarni, & Poor p. 20/24
60 Thank you for the attention. Wang, Kulkarni, & Poor p. 21/24
61 Searching for Trapping Sets We define the k-out trapping set, namely, the induced graph has k check node of degree Theorem 5 Consider a fixed k. Determining the k-out trapping distance is NP-complete. Our algorithm can be modified for trapping set exhaustion. Wang, Kulkarni, & Poor p. 22/24
62 Some Notes Complexity of evaluating UB: O( T log( T )), even for arbitrarily small ǫ. Wang, Kulkarni, & Poor p. 23/24
63 Some Notes Complexity of evaluating UB: O( T log( T )), even for arbitrarily small ǫ. A pleasant byproduct: an exhaustive list of minimum SS leading to a lower bound tight in both order and multiplicity. Wang, Kulkarni, & Poor p. 23/24
64 Some Notes Complexity of evaluating UB: O( T log( T )), even for arbitrarily small ǫ. A pleasant byproduct: an exhaustive list of minimum SS leading to a lower bound tight in both order and multiplicity. Complexity and performance tradeoff. Wang, Kulkarni, & Poor p. 23/24
65 Some Notes Complexity of evaluating UB: O( T log( T )), even for arbitrarily small ǫ. A pleasant byproduct: an exhaustive list of minimum SS leading to a lower bound tight in both order and multiplicity. Complexity and performance tradeoff. Punctured vs. Shortened Codes Wang, Kulkarni, & Poor p. 23/24
66 Some Notes Complexity of evaluating UB: O( T log( T )), even for arbitrarily small ǫ. A pleasant byproduct: an exhaustive list of minimum SS leading to a lower bound tight in both order and multiplicity. Complexity and performance tradeoff. Punctured vs. Shortened Codes A partitioned approach a hybrid search E{ f } = E{A j }E{ f A j }. j Ex: A 1 = {x 3 = 0}, A 2 = {x 3 = 1, x 7 = 0}, and A 3 = {x 3 = 1, x 7 = 1}. Wang, Kulkarni, & Poor p. 23/24
67 The Tree Converting Algorithm 1: repeat 2: Find the next leaf variable node, say x j. 3: if there exists another non-leaf x j in T then 4: if the youngest common ancestor of the leaf x j and existing non-leaf x j, denoted as yca(x j ), is a check node then 5: Include the new x j in T. 6: else if yca(x j ) is a variable node then 7: Do the pivoting construction. 8: end if 9: end if 10: Construct the immediate children of x j. 11: until the size of T exceeds the preset limit. Wang, Kulkarni, & Poor p. 24/24
Upper Bounding the Performance of Arbitrary Finite LDPC Codes on Binary Erasure Channels
Upper Bounding the Performance of Arbitrary Finite LDPC Codes on Binary Erasure Channels Chih-Chun Wang School of Electrical & Computer Engineering Purdue University West Lafayette, IN 47907, USA Email:
More informationFrom Stopping sets to Trapping sets
From Stopping sets to Trapping sets The Exhaustive Search Algorithm & The Suppressing Effect Chih-Chun Wang School of Electrical & Computer Engineering Purdue University Wang p. 1/21 Content Good exhaustive
More informationOn the Exhaustion and Elimination of Trapping Sets: Algorithms & The Suppressing Effect
On the Exhaustion and Elimination of Trapping Sets: Algorithms & The Suppressing Effect Chih-Chun Wang Center for Wireless Systems and Applications (CWSA) School of ECE, Purdue University, West Lafayette,
More informationSpatially Coupled LDPC Codes
Spatially Coupled LDPC Codes Kenta Kasai Tokyo Institute of Technology 30 Aug, 2013 We already have very good codes. Efficiently-decodable asymptotically capacity-approaching codes Irregular LDPC Codes
More informationLower Bounds on the Graphical Complexity of Finite-Length LDPC Codes
Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International
More informationMessage Passing Algorithm with MAP Decoding on Zigzag Cycles for Non-binary LDPC Codes
Message Passing Algorithm with MAP Decoding on Zigzag Cycles for Non-binary LDPC Codes Takayuki Nozaki 1, Kenta Kasai 2, Kohichi Sakaniwa 2 1 Kanagawa University 2 Tokyo Institute of Technology July 12th,
More informationAn Efficient Algorithm for Finding Dominant Trapping Sets of LDPC Codes
An Efficient Algorithm for Finding Dominant Trapping Sets of LDPC Codes Mehdi Karimi, Student Member, IEEE and Amir H. Banihashemi, Senior Member, IEEE Abstract arxiv:1108.4478v2 [cs.it] 13 Apr 2012 This
More informationSymmetric Product Codes
Symmetric Product Codes Henry D. Pfister 1, Santosh Emmadi 2, and Krishna Narayanan 2 1 Department of Electrical and Computer Engineering Duke University 2 Department of Electrical and Computer Engineering
More informationAn Integer Programming-Based Search Technique for Error-Prone Structures of LDPC Codes
An Integer Programming-Based Search Technique for Error-Prone Structures of LDPC Codes Abdullah Sarıduman a, Ali E. Pusane a, Z. Caner Taşkın b a Department of Electrical and Electronics Engineering, Boğaziçi
More informationECEN 655: Advanced Channel Coding
ECEN 655: Advanced Channel Coding Course Introduction Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 655: Advanced Channel Coding 1 / 19 Outline 1 History
More informationAn Introduction to Low Density Parity Check (LDPC) Codes
An Introduction to Low Density Parity Check (LDPC) Codes Jian Sun jian@csee.wvu.edu Wireless Communication Research Laboratory Lane Dept. of Comp. Sci. and Elec. Engr. West Virginia University June 3,
More informationLow-density parity-check (LDPC) codes
Low-density parity-check (LDPC) codes Performance similar to turbo codes Do not require long interleaver to achieve good performance Better block error performance Error floor occurs at lower BER Decoding
More informationPerformance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels
Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering
More informationLecture 4 : Introduction to Low-density Parity-check Codes
Lecture 4 : Introduction to Low-density Parity-check Codes LDPC codes are a class of linear block codes with implementable decoders, which provide near-capacity performance. History: 1. LDPC codes were
More informationError Floors of LDPC Coded BICM
Electrical and Computer Engineering Conference Papers, Posters and Presentations Electrical and Computer Engineering 2007 Error Floors of LDPC Coded BICM Aditya Ramamoorthy Iowa State University, adityar@iastate.edu
More informationDesign of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal
Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Behzad Amiri Electrical Eng. Department University of California, Los Angeles Los Angeles, USA Email: amiri@ucla.edu Jorge Arturo Flores
More informationGraph-based codes for flash memory
1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background
More informationIterative Encoding of Low-Density Parity-Check Codes
Iterative Encoding of Low-Density Parity-Check Codes David Haley, Alex Grant and John Buetefuer Institute for Telecommunications Research University of South Australia Mawson Lakes Blvd Mawson Lakes SA
More informationPractical Polar Code Construction Using Generalised Generator Matrices
Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:
More informationCoding Techniques for Data Storage Systems
Coding Techniques for Data Storage Systems Thomas Mittelholzer IBM Zurich Research Laboratory /8 Göttingen Agenda. Channel Coding and Practical Coding Constraints. Linear Codes 3. Weight Enumerators and
More informationIterative Quantization. Using Codes On Graphs
Iterative Quantization Using Codes On Graphs Emin Martinian and Jonathan S. Yedidia 2 Massachusetts Institute of Technology 2 Mitsubishi Electric Research Labs Lossy Data Compression: Encoding: Map source
More informationDensity Evolution for Asymmetric Memoryless Channels: The Perfect Projection Condition and the Typicality of the Linear LDPC Code Ensemble
Density Evolution for Asymmetric Memoryless Channels: The Perfect Projection Condition and the Typicality of the Linear LDPC Code Ensemble Chih-Chun Wang, Sanjeev R. Kulkarni, H. Vincent Poor This work
More informationEnhancing Binary Images of Non-Binary LDPC Codes
Enhancing Binary Images of Non-Binary LDPC Codes Aman Bhatia, Aravind R Iyengar, and Paul H Siegel University of California, San Diego, La Jolla, CA 92093 0401, USA Email: {a1bhatia, aravind, psiegel}@ucsdedu
More informationA Deviation-Based Conditional Upper Bound on the Error Floor Performance for Min-Sum Decoding of Short LDPC Codes
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 12, DECEMBER 2012 3567 A Deviation-Based Conditional Upper Bound on the Error Floor Performance for Min-Sum Decoding of Short LDPC Codes Eric T. Psota,
More informationOn Bit Error Rate Performance of Polar Codes in Finite Regime
On Bit Error Rate Performance of Polar Codes in Finite Regime A. Eslami and H. Pishro-Nik Abstract Polar codes have been recently proposed as the first low complexity class of codes that can provably achieve
More informationOn the Typicality of the Linear Code Among the LDPC Coset Code Ensemble
5 Conference on Information Sciences and Systems The Johns Hopkins University March 16 18 5 On the Typicality of the Linear Code Among the LDPC Coset Code Ensemble C.-C. Wang S.R. Kulkarni and H.V. Poor
More informationDesign of regular (2,dc)-LDPC codes over GF(q) using their binary images
Design of regular (2,dc)-LDPC codes over GF(q) using their binary images Charly Poulliat, Marc Fossorier, David Declercq To cite this version: Charly Poulliat, Marc Fossorier, David Declercq. Design of
More informationRecent Results on Capacity-Achieving Codes for the Erasure Channel with Bounded Complexity
26 IEEE 24th Convention of Electrical and Electronics Engineers in Israel Recent Results on Capacity-Achieving Codes for the Erasure Channel with Bounded Complexity Igal Sason Technion Israel Institute
More informationTrapping Set Enumerators for Specific LDPC Codes
Trapping Set Enumerators for Specific LDPC Codes Shadi Abu-Surra Samsung Telecommunications America 1301 E. Lookout Dr. Richardson TX 75082 Email: sasurra@sta.samsung.com David DeClercq ETIS ENSEA/UCP/CNRS
More informationSTUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION
EE229B PROJECT REPORT STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION Zhengya Zhang SID: 16827455 zyzhang@eecs.berkeley.edu 1 MOTIVATION Permutation matrices refer to the square matrices with
More informationLow-Density Parity-Check Codes
Department of Computer Sciences Applied Algorithms Lab. July 24, 2011 Outline 1 Introduction 2 Algorithms for LDPC 3 Properties 4 Iterative Learning in Crowds 5 Algorithm 6 Results 7 Conclusion PART I
More informationAdaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes
Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes Xiaojie Zhang and Paul H. Siegel University of California, San Diego, La Jolla, CA 9093, U Email:{ericzhang, psiegel}@ucsd.edu
More informationOn Generalized EXIT Charts of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels
2012 IEEE International Symposium on Information Theory Proceedings On Generalied EXIT Charts of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels H Mamani 1, H Saeedi 1, A Eslami
More informationAn Introduction to Algorithmic Coding Theory
An Introduction to Algorithmic Coding Theory M. Amin Shokrollahi Bell Laboratories Part : Codes - A puzzle What do the following problems have in common? 2 Problem : Information Transmission MESSAGE G
More informationON THE MINIMUM DISTANCE OF NON-BINARY LDPC CODES. Advisor: Iryna Andriyanova Professor: R.. udiger Urbanke
ON THE MINIMUM DISTANCE OF NON-BINARY LDPC CODES RETHNAKARAN PULIKKOONATTU ABSTRACT. Minimum distance is an important parameter of a linear error correcting code. For improved performance of binary Low
More informationOptimal Rate and Maximum Erasure Probability LDPC Codes in Binary Erasure Channel
Optimal Rate and Maximum Erasure Probability LDPC Codes in Binary Erasure Channel H. Tavakoli Electrical Engineering Department K.N. Toosi University of Technology, Tehran, Iran tavakoli@ee.kntu.ac.ir
More informationThe New Multi-Edge Metric-Constrained PEG/QC-PEG Algorithms for Designing the Binary LDPC Codes With Better Cycle-Structures
HE et al.: THE MM-PEGA/MM-QC-PEGA DESIGN THE LDPC CODES WITH BETTER CYCLE-STRUCTURES 1 arxiv:1605.05123v1 [cs.it] 17 May 2016 The New Multi-Edge Metric-Constrained PEG/QC-PEG Algorithms for Designing the
More informationCodes designed via algebraic lifts of graphs
p./40 Codes designed via algebraic lifts of graphs Clemson Mini-Conference on Discrete Mathematics Oct. 3, 2008. Christine A. Kelley Department of Mathematics University of Nebraska-Lincoln email: ckelley2@math.unl.edu
More informationLDPC Code Ensembles that Universally Achieve Capacity under BP Decoding: A Simple Derivation
LDPC Code Ensembles that Universally Achieve Capacity under BP Decoding: A Simple Derivation Anatoly Khina EE Systems Dept., TAU Tel Aviv, Israel Email: anatolyk@eng.tau.ac.il Yair Yona Dept. of EE, UCLA
More informationMaking Error Correcting Codes Work for Flash Memory
Making Error Correcting Codes Work for Flash Memory Part I: Primer on ECC, basics of BCH and LDPC codes Lara Dolecek Laboratory for Robust Information Systems (LORIS) Center on Development of Emerging
More informationJoint Iterative Decoding of LDPC Codes and Channels with Memory
Joint Iterative Decoding of LDPC Codes and Channels with Memory Henry D. Pfister and Paul H. Siegel University of California, San Diego 3 rd Int l Symposium on Turbo Codes September 1, 2003 Outline Channels
More information5. Density evolution. Density evolution 5-1
5. Density evolution Density evolution 5-1 Probabilistic analysis of message passing algorithms variable nodes factor nodes x1 a x i x2 a(x i ; x j ; x k ) x3 b x4 consider factor graph model G = (V ;
More informationQuasi-cyclic Low Density Parity Check codes with high girth
Quasi-cyclic Low Density Parity Check codes with high girth, a work with Marta Rossi, Richard Bresnan, Massimilliano Sala Summer Doctoral School 2009 Groebner bases, Geometric codes and Order Domains Dept
More informationFountain Uncorrectable Sets and Finite-Length Analysis
Fountain Uncorrectable Sets and Finite-Length Analysis Wen Ji 1, Bo-Wei Chen 2, and Yiqiang Chen 1 1 Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology, Chinese
More informationMa/CS 6b Class 25: Error Correcting Codes 2
Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets
More informationAsynchronous Decoding of LDPC Codes over BEC
Decoding of LDPC Codes over BEC Saeid Haghighatshoar, Amin Karbasi, Amir Hesam Salavati Department of Telecommunication Systems, Technische Universität Berlin, Germany, School of Engineering and Applied
More informationCodes on Graphs. Telecommunications Laboratory. Alex Balatsoukas-Stimming. Technical University of Crete. November 27th, 2008
Codes on Graphs Telecommunications Laboratory Alex Balatsoukas-Stimming Technical University of Crete November 27th, 2008 Telecommunications Laboratory (TUC) Codes on Graphs November 27th, 2008 1 / 31
More informationMaximum Likelihood Decoding of Codes on the Asymmetric Z-channel
Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel Pål Ellingsen paale@ii.uib.no Susanna Spinsante s.spinsante@univpm.it Angela Barbero angbar@wmatem.eis.uva.es May 31, 2005 Øyvind Ytrehus
More informationSlepian-Wolf Code Design via Source-Channel Correspondence
Slepian-Wolf Code Design via Source-Channel Correspondence Jun Chen University of Illinois at Urbana-Champaign Urbana, IL 61801, USA Email: junchen@ifpuiucedu Dake He IBM T J Watson Research Center Yorktown
More informationConvergence analysis for a class of LDPC convolutional codes on the erasure channel
Convergence analysis for a class of LDPC convolutional codes on the erasure channel Sridharan, Arvind; Lentmaier, Michael; Costello Jr., Daniel J.; Zigangirov, Kamil Published in: [Host publication title
More information(tree searching technique) (Boolean formulas) satisfying assignment: (X 1, X 2 )
Algorithms Chapter 5: The Tree Searching Strategy - Examples 1 / 11 Chapter 5: The Tree Searching Strategy 1. Ex 5.1Determine the satisfiability of the following Boolean formulas by depth-first search
More informationBounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel
Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel Ohad Barak, David Burshtein and Meir Feder School of Electrical Engineering Tel-Aviv University Tel-Aviv 69978, Israel Abstract
More informationEE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes
EE229B - Final Project Capacity-Approaching Low-Density Parity-Check Codes Pierre Garrigues EECS department, UC Berkeley garrigue@eecs.berkeley.edu May 13, 2005 Abstract The class of low-density parity-check
More informationCapacity-Achieving Ensembles for the Binary Erasure Channel With Bounded Complexity
Capacity-Achieving Ensembles for the Binary Erasure Channel With Bounded Complexity Henry D. Pfister, Member, Igal Sason, Member, and Rüdiger Urbanke Abstract We present two sequences of ensembles of non-systematic
More informationwhere X is the feasible region, i.e., the set of the feasible solutions.
3.5 Branch and Bound Consider a generic Discrete Optimization problem (P) z = max{c(x) : x X }, where X is the feasible region, i.e., the set of the feasible solutions. Branch and Bound is a general semi-enumerative
More informationML and Near-ML Decoding of LDPC Codes Over the BEC: Bounds and Decoding Algorithms
1 ML and Near-ML Decoding of LDPC Codes Over the BEC: Bounds and Decoding Algorithms Irina E. Bocharova, Senior Member, IEEE, Boris D. Kudryashov, Senior Member, IEEE, Vitaly Skachek, Member, IEEE, Eirik
More informationSpatially Coupled LDPC Codes Constructed from Protographs
IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Spatially Coupled LDPC Codes Constructed from Protographs David G. M. Mitchell, Member, IEEE, Michael Lentmaier, Senior Member, IEEE, and Daniel
More informationOptimizing Flash based Storage Systems
Optimizing Flash based Storage Systems 1 Lifetime Reliability Latency Throughput 2 Projects Reliability/Latency/Throughput: Error Correction Code (ECC) Parallelization and Incremental Redundancy Lifetime:
More informationLecture 2 Linear Codes
Lecture 2 Linear Codes 2.1. Linear Codes From now on we want to identify the alphabet Σ with a finite field F q. For general codes, introduced in the last section, the description is hard. For a code of
More informationSearching for low weight pseudo-codewords
Searching for low weight pseudo-codewords Michael Chertkov Theoretical Division and Center for Nonlinear Studies LANL, MS B23, T-3, Los Alamos, NM 87545 chertkov@lanl.gov Mikhail Stepanov Department of
More informationBelief propagation decoding of quantum channels by passing quantum messages
Belief propagation decoding of quantum channels by passing quantum messages arxiv:67.4833 QIP 27 Joseph M. Renes lempelziv@flickr To do research in quantum information theory, pick a favorite text on classical
More informationAn algorithm to improve the error rate performance of Accumulate-Repeat-Accumulate codes Tae-Ui Kim
An algorithm to improve the error rate performance of Accumulate-Repeat-Accumulate codes Tae-Ui Kim The Graduate School Yonsei University Department of Electrical and Electronic Engineering An algorithm
More informationLDPC Codes. Slides originally from I. Land p.1
Slides originally from I. Land p.1 LDPC Codes Definition of LDPC Codes Factor Graphs to use in decoding Decoding for binary erasure channels EXIT charts Soft-Output Decoding Turbo principle applied to
More informationLDPC Codes. Intracom Telecom, Peania
LDPC Codes Alexios Balatsoukas-Stimming and Athanasios P. Liavas Technical University of Crete Dept. of Electronic and Computer Engineering Telecommunications Laboratory December 16, 2011 Intracom Telecom,
More information3.4 Relaxations and bounds
3.4 Relaxations and bounds Consider a generic Discrete Optimization problem z = min{c(x) : x X} with an optimal solution x X. In general, the algorithms generate not only a decreasing sequence of upper
More information4216 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Density Evolution for Asymmetric Memoryless Channels
4216 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER 2005 Density Evolution for Asymmetric Memoryless Channels Chih-Chun Wang, Sanjeev R. Kulkarni, Fellow, IEEE, and H. Vincent Poor,
More informationComputing the threshold shift for general channels
Computing the threshold shift for general channels Jeremie Ezri and Rüdiger Urbanke LTHC EPFL jeremie.ezri@epfl.ch, ruediger.urbanke@epfl.ch Andrea Montanari and Sewoong Oh Electrical Engineering Department
More informationOptimisation and Operations Research
Optimisation and Operations Research Lecture 15: The Greedy Heuristic Matthew Roughan http://www.maths.adelaide.edu.au/matthew.roughan/ Lecture_notes/OORII/ School of
More informationGLDPC-Staircase AL-FEC codes: A Fundamental study and New results
GLDPC-Staircase AL-FEC codes: A Fundamental study and New results Ferdaouss Mattoussi, Vincent Roca, Bessam Sayadi To cite this version: Ferdaouss Mattoussi, Vincent Roca, Bessam Sayadi. GLDPC-Staircase
More informationDistance Properties of Short LDPC Codes and Their Impact on the BP, ML and Near-ML Decoding Performance
Distance Properties of Short LDPC Codes and Their Impact on the BP, ML and Near-ML Decoding Performance Irina E. Bocharova 1,2, Boris D. Kudryashov 1, Vitaly Skachek 2, Yauhen Yakimenka 2 1 St. Petersburg
More informationIntroduction to Low-Density Parity Check Codes. Brian Kurkoski
Introduction to Low-Density Parity Check Codes Brian Kurkoski kurkoski@ice.uec.ac.jp Outline: Low Density Parity Check Codes Review block codes History Low Density Parity Check Codes Gallager s LDPC code
More informationGraph-based Codes for Quantize-Map-and-Forward Relaying
20 IEEE Information Theory Workshop Graph-based Codes for Quantize-Map-and-Forward Relaying Ayan Sengupta, Siddhartha Brahma, Ayfer Özgür, Christina Fragouli and Suhas Diggavi EPFL, Switzerland, UCLA,
More informationAn Introduction to Low-Density Parity-Check Codes
An Introduction to Low-Density Parity-Check Codes Paul H. Siegel Electrical and Computer Engineering University of California, San Diego 5/ 3/ 7 Copyright 27 by Paul H. Siegel Outline Shannon s Channel
More informationLow-density parity-check codes
Low-density parity-check codes From principles to practice Dr. Steve Weller steven.weller@newcastle.edu.au School of Electrical Engineering and Computer Science The University of Newcastle, Callaghan,
More informationOn the number of circuits in random graphs. Guilhem Semerjian. [ joint work with Enzo Marinari and Rémi Monasson ]
On the number of circuits in random graphs Guilhem Semerjian [ joint work with Enzo Marinari and Rémi Monasson ] [ Europhys. Lett. 73, 8 (2006) ] and [ cond-mat/0603657 ] Orsay 13-04-2006 Outline of the
More informationCS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding
CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.
More informationLinear and conic programming relaxations: Graph structure and message-passing
Linear and conic programming relaxations: Graph structure and message-passing Martin Wainwright UC Berkeley Departments of EECS and Statistics Banff Workshop Partially supported by grants from: National
More informationQuasi-Cyclic Asymptotically Regular LDPC Codes
2010 IEEE Information Theory Workshop - ITW 2010 Dublin Quasi-Cyclic Asymptotically Regular LDPC Codes David G. M. Mitchell, Roxana Smarandache, Michael Lentmaier, and Daniel J. Costello, Jr. Dept. of
More informationInformation, Physics, and Computation
Information, Physics, and Computation Marc Mezard Laboratoire de Physique Thdorique et Moales Statistiques, CNRS, and Universit y Paris Sud Andrea Montanari Department of Electrical Engineering and Department
More informationCommunication by Regression: Achieving Shannon Capacity
Communication by Regression: Practical Achievement of Shannon Capacity Department of Statistics Yale University Workshop Infusing Statistics and Engineering Harvard University, June 5-6, 2011 Practical
More informationCOMPSCI 650 Applied Information Theory Apr 5, Lecture 18. Instructor: Arya Mazumdar Scribe: Hamed Zamani, Hadi Zolfaghari, Fatemeh Rezaei
COMPSCI 650 Applied Information Theory Apr 5, 2016 Lecture 18 Instructor: Arya Mazumdar Scribe: Hamed Zamani, Hadi Zolfaghari, Fatemeh Rezaei 1 Correcting Errors in Linear Codes Suppose someone is to send
More informationMessage-Passing Decoding for Low-Density Parity-Check Codes Harish Jethanandani and R. Aravind, IIT Madras
Message-Passing Decoding for Low-Density Parity-Check Codes Harish Jethanandani and R. Aravind, IIT Madras e-mail: hari_jethanandani@yahoo.com Abstract Low-density parity-check (LDPC) codes are discussed
More informationA Class of Quantum LDPC Codes Derived from Latin Squares and Combinatorial Design
A Class of Quantum LDPC Codes Derived from Latin Squares and Combinatorial Design Salah A Aly Department of Computer Science, Texas A&M University, College Station, TX 77843-3112, USA Email: salah@cstamuedu
More informationInteger Programming ISE 418. Lecture 8. Dr. Ted Ralphs
Integer Programming ISE 418 Lecture 8 Dr. Ted Ralphs ISE 418 Lecture 8 1 Reading for This Lecture Wolsey Chapter 2 Nemhauser and Wolsey Sections II.3.1, II.3.6, II.4.1, II.4.2, II.5.4 Duality for Mixed-Integer
More informationNetwork Design and Game Theory Spring 2008 Lecture 6
Network Design and Game Theory Spring 2008 Lecture 6 Guest Lecturer: Aaron Archer Instructor: Mohammad T. Hajiaghayi Scribe: Fengming Wang March 3, 2008 1 Overview We study the Primal-dual, Lagrangian
More informationPseudocodewords of Tanner Graphs
SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY 1 Pseudocodewords of Tanner Graphs arxiv:cs/0504013v4 [cs.it] 18 Aug 2007 Christine A. Kelley Deepak Sridhara Department of Mathematics Seagate Technology
More informationIntegrated Code Design for a Joint Source and Channel LDPC Coding Scheme
Integrated Code Design for a Joint Source and Channel LDPC Coding Scheme Hsien-Ping Lin Shu Lin and Khaled Abdel-Ghaffar Department of Electrical and Computer Engineering University of California Davis
More informationProbabilistic Graphical Models
School of Computer Science Probabilistic Graphical Models Variational Inference IV: Variational Principle II Junming Yin Lecture 17, March 21, 2012 X 1 X 1 X 1 X 1 X 2 X 3 X 2 X 2 X 3 X 3 Reading: X 4
More informationThe BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes
S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding
More informationLow-complexity error correction in LDPC codes with constituent RS codes 1
Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 348-353 Low-complexity error correction in LDPC codes with constituent RS codes 1
More informationB I N A R Y E R A S U R E C H A N N E L
Chapter 3 B I N A R Y E R A S U R E C H A N N E L The binary erasure channel (BEC) is perhaps the simplest non-trivial channel model imaginable. It was introduced by Elias as a toy example in 954. The
More informationECC for NAND Flash. Osso Vahabzadeh. TexasLDPC Inc. Flash Memory Summit 2017 Santa Clara, CA 1
ECC for NAND Flash Osso Vahabzadeh TexasLDPC Inc. 1 Overview Why Is Error Correction Needed in Flash Memories? Error Correction Codes Fundamentals Low-Density Parity-Check (LDPC) Codes LDPC Encoding and
More informationOn the Design of Fast Convergent LDPC Codes for the BEC: An Optimization Approach
On the Design of Fast Convergent LDPC Codes for the BEC: An Optimization Approach Vahid Jamali, Yasser Karimian, Student Member, IEEE, Johannes Huber, Fellow, IEEE, and Mahmoud Ahmadian, Member, IEEE 1
More informationAccumulate-Repeat-Accumulate Codes: Capacity-Achieving Ensembles of Systematic Codes for the Erasure Channel with Bounded Complexity
Accumulate-Repeat-Accumulate Codes: Capacity-Achieving Ensembles of Systematic Codes for the Erasure Channel with Bounded Complexity Henry D. Pfister, Member, Igal Sason, Member Abstract The paper introduces
More informationError-Correcting Codes:
Error-Correcting Codes: Progress & Challenges Madhu Sudan Microsoft/MIT Communication in presence of noise We are not ready Sender Noisy Channel We are now ready Receiver If information is digital, reliability
More informationHAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS
HAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS Colin Cooper School of Mathematical Sciences, Polytechnic of North London, London, U.K. and Alan Frieze and Michael Molloy Department of Mathematics, Carnegie-Mellon
More informationCodes on graphs and iterative decoding
Codes on graphs and iterative decoding Bane Vasić Error Correction Coding Laboratory University of Arizona Prelude Information transmission 0 0 0 0 0 0 Channel Information transmission signal 0 0 threshold
More informationFinite Alphabet Iterative Decoders Approaching Maximum Likelihood Performance on the Binary Symmetric Channel
Finite Alphabet Iterative Decoders Approaching Maximum Likelihood Performance on the Binary Symmetric Channel David Declercq ETIS ENSEA/UCP/CNRS UMR 8051 95014 Cergy-Pontoise, France Email: declercq@ensea.fr
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 1, JANUARY
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 56, NO 1, JANUARY 2010 181 Analysis of Absorbing Sets Fully Absorbing Sets of Array-Based LDPC Codes Lara Dolecek, Member, IEEE, Zhengya Zhang, Member, IEEE,
More information