Upper Bounding the Performance of Arbitrary Finite LDPC Codes on Binary Erasure Channels

Size: px
Start display at page:

Download "Upper Bounding the Performance of Arbitrary Finite LDPC Codes on Binary Erasure Channels"

Transcription

1 Upper Bounding the Performance of Arbitrary Finite LDPC Codes on Binary Erasure Channels An efficient exhaustion algorithm for error-prone patterns C.-C. Wang, S.R. Kulkarni, and H.V. Poor School of Electrical & Computer Engineering, Purdue Unversity Department of Electrical Engineering, Princeton University Wang, Kulkarni, & Poor p. 1/24

2 Content Brief introduction Stopping sets in erasure channels. Hardness & Applications. Existing approaches for upper / lower bounding the fixed code performance: A tree-based upper bound for bit error rates. Frame error rates and trapping sets. Wang, Kulkarni, & Poor p. 2/24

3 Stopping Sets (SSs) Definition: a set of variable nodes such that the induced graph contains no check node of degree 1. Example: The binary (7,4) Hamming Code i = 1 j = (2, 5, 7) a valid codeword vs. (4, 6, 7) a pure stopping set. Hamming distance vs. Stopping distance Wang, Kulkarni, & Poor p. 3/24

4 Stopping Sets (SSs) Definition: a set of variable nodes such that the induced graph contains no check node of degree 1. Example: The binary (7,4) Hamming Code i = 1 j = (2, 5, 7) a valid codeword vs. (4, 6, 7) a pure stopping set. Hamming distance vs. Stopping distance Wang, Kulkarni, & Poor p. 3/24

5 Stopping Sets (SSs) Definition: a set of variable nodes such that the induced graph contains no check node of degree 1. Example: The binary (7,4) Hamming Code i = 1 j = (2, 5, 7) a valid codeword vs. (4, 6, 7) a pure stopping set. Hamming distance vs. Stopping distance Wang, Kulkarni, & Poor p. 3/24

6 Upper Bounds vs. Exhausting Minimum Stopping Sets An n = 72 regular (3,6) LDPC code ber erasure prob ε V60: Monte Carlo V60: UB Wang, Kulkarni, & Poor p. 4/24

7 Upper Bounds vs. Exhausting Minimum Stopping Sets An n = 72 regular (3,6) LDPC code An NP-Complete Problem!! ber by Krishnan et al erasure prob ε V60: Monte Carlo V60: UB Wang, Kulkarni, & Poor p. 4/24

8 A Hard but Useful Problem As an upper bound: Guaranteed worst performance for extremely low ber regimes. As an SS exhaustion algorithm: Code annealing [Wang 06] Error Probability Typical CL CL+d2opt 10 5 CL+CA (DA+CA)+CL+CA 10 6 (DA+CA)+CL+CA, asym. Random Constr. Direct CA Erasure Probability ε Wang, Kulkarni, & Poor p. 5/24

9 Existing Approaches Ensemble analysis: [Di et al. 02] avg. ber and FER curves, [Amraoui et al. 04] the scaling law for water fall regions. Fixed Code analysis: [Holzlöhner et al. 05] dual adaptive importance sampling, [Stepanov et al. 06] instanton method Enumerating bad patterns: [Richardson 03] error floors of LDPC codes, [Yedidia et al. 01] projection algebra, [Hu et al. 04] the minimum distance of LDPC codes. They are all inexhaustive enumeration. Wang, Kulkarni, & Poor p. 6/24

10 The Bit-Oriented Detection i = 1 j = Using 1: for erasure 0: for non-erasure Wang, Kulkarni, & Poor p. 7/24

11 The Bit-Oriented Detection i = 1 j = Using 1: for erasure 0: for non-erasure f 2,0 = x 2 Wang, Kulkarni, & Poor p. 7/24

12 The Bit-Oriented Detection i = 1 j = Using 1: for erasure 0: for non-erasure f 2,0 = x 2 f 2,1 = x 2 (x 1 + x 3 )(x 4 + x 6 ) Wang, Kulkarni, & Poor p. 7/24

13 The Bit-Oriented Detection i = 1 j = Using 1: for erasure 0: for non-erasure f 2,0 = x 2 f 2,1 = x 2 (x 1 + x 3 )(x 4 + x 6 ) f 2,2 = x 2 (x 1 ( f 5 4,1 + f 6 4,1 ) + x 3 ( f 4 3,1 + f 5 3,1 )) (x 4 ( f 3 3,1 + f 5 3,1 ) + x 6 ( f 1 4,1 + f 5 4,1 )) = x 2 (x 1 (x 5 + x 6 ) + x 3 (x 4 + x 5 )) (x 4 (x 3 + x 5 ) + x 6 (x 1 + x 5 )) Wang, Kulkarni, & Poor p. 7/24

14 The Bit-Oriented Detection i = 1 j = Using 1: for erasure 0: for non-erasure f 2,0 = x 2 f 2,1 = x 2 (x 1 + x 3 )(x 4 + x 6 ) f 2,2 = x 2 (x 1 ( f 5 4,1 + f 6 4,1 ) + x 3 ( f 4 3,1 + f 5 3,1 )) (x 4 ( f 3 3,1 + f 5 3,1 ) + x 6 ( f 1 4,1 + f 5 4,1 )) = x 2 (x 1 (x 5 + x 6 ) + x 3 (x 4 + x 5 )) (x 4 (x 3 + x 5 ) + x 6 (x 1 + x 5 )) f 2 := lim l f 2,l = f 2,2 Wang, Kulkarni, & Poor p. 7/24

15 The Bit-Oriented Detection i = 1 j = Using 1: for erasure 0: for non-erasure f 2,0 = x 2 f 2,1 = x 2 (x 1 + x 3 )(x 4 + x 6 ) f 2,2 = x 2 (x 1 ( f 5 4,1 + f 6 4,1 ) + x 3 ( f 4 3,1 + f 5 3,1 )) (x 4 ( f 3 3,1 + f 5 3,1 ) + x 6 ( f 1 4,1 + f 5 4,1 )) = x 2 (x 1 (x 5 + x 6 ) + x 3 (x 4 + x 5 )) (x 4 (x 3 + x 5 ) + x 6 (x 1 + x 5 )) f 2 := lim f 2,l = f 2,2 l p 2 = E{ f 2 } Wang, Kulkarni, & Poor p. 7/24

16 The Bit-Oriented Detection i = 1 j = Using 1: for erasure 0: for non-erasure f 2,0 = x 2 f 2,1 = x 2 (x 1 + x 3 )(x 4 + x 6 ) f 2,2 = x 2 (x 1 ( f 5 4,1 + f 6 4,1 ) + x 3 ( f 4 3,1 + f 5 3,1 )) (x 4 ( f 3 3,1 + f 5 3,1 ) + x 6 ( f 1 4,1 + f 5 4,1 )) = x 2 (x 1 (x 5 + x 6 ) + x 3 (x 4 + x 5 )) (x 4 (x 3 + x 5 ) + x 6 (x 1 + x 5 )) f 2 := lim f 2,l = f 2,2 l Asymptotically, no repeated variables p 2 = E{ f 2 } Wang, Kulkarni, & Poor p. 7/24

17 Enumeration-Based LB & UB f 2 = x 2 (x 1 (x 5 + x 6 ) + x 3 (x 4 + x 5 )) (x 4 (x 3 + x 5 ) + x 6 (x 1 + x 5 )) = x 1 x 2 x 6 + x 2 x 3 x 4 + x 1 x 2 x 4 x 5 + x 2 x 3 x 5 x 6 Each product term corresponds to an irreducible stopping set. Wang, Kulkarni, & Poor p. 8/24

18 Enumeration-Based LB & UB f 2 = x 2 (x 1 (x 5 + x 6 ) + x 3 (x 4 + x 5 )) (x 4 (x 3 + x 5 ) + x 6 (x 1 + x 5 )) = x 1 x 2 x 6 + x 2 x 3 x 4 + x 1 x 2 x 4 x 5 + x 2 x 3 x 5 x 6 Each product term corresponds to an irreducible stopping set. LB: Graph-based search [Richardson 03], iteration-based relaxation [Yedidia et al. 01] f 2,LBa = x 2 x 3 x 4 f 2,LBb = x 1 x 2 x 4 x 5 LB a = E{ f 2,LB } = ǫ 3 LB b = E{ f 2,LBb } = ǫ 4 Wang, Kulkarni, & Poor p. 8/24

19 Enumeration-Based LB & UB f 2 = x 2 (x 1 (x 5 + x 6 ) + x 3 (x 4 + x 5 )) (x 4 (x 3 + x 5 ) + x 6 (x 1 + x 5 )) = x 1 x 2 x 6 + x 2 x 3 x 4 + x 1 x 2 x 4 x 5 + x 2 x 3 x 5 x 6 Each product term corresponds to an irreducible stopping set. LB: Graph-based search [Richardson 03], iteration-based relaxation [Yedidia et al. 01] f 2,LBa = x 2 x 3 x 4 f 2,LBb = x 1 x 2 x 4 x 5 LB a = E{ f 2,LB } = ǫ 3 LB b = E{ f 2,LBb } = ǫ 4 UB: Iteration-based relaxation [Yedidia et al. 01] f 2,2 = x 2 x 3 x 4 + x 1 x 2 x 4 x 5 + x 1 x 2 x 6 + x 2 x 3 x 5 x 6 x 2 1x 4 + 1x 2 x x 2 x 6 + x 2 1 1x 6 = x 2 x 4 + x 2 x 6 UB = 2ǫ 2 ǫ 3 Wang, Kulkarni, & Poor p. 8/24

20 An Upper Bound f a f b Wang, Kulkarni, & Poor p. 9/24

21 An Upper Bound f a f b f a = f b 3 4 E DE { f a } < p e = E{ f a } = E{ f b } E DE { f b } Wang, Kulkarni, & Poor p. 9/24

22 An Upper Bound f a f b f a = f b 3 4 E DE { f a } < p e = E{ f a } = E{ f b } E DE { f b } Wang, Kulkarni, & Poor p. 9/24

23 An Upper Bound f a f b f a = f b E DE { f a } < p e = E{ f a } = E{ f b } E DE { f b } Wang, Kulkarni, & Poor p. 9/24

24 An Upper Bound (Cont d) Theorem 1 Suppose all messages entering any variable node are independent, or equivalently, the youngest common ancestors of all pairs of repeated bits are check nodes. E DE { f } E{ f } Theorem 2 This upper bound is tight in order. E DE { f }(ǫ) = O(E{ f }(ǫ)), ǫ Wang, Kulkarni, & Poor p. 10/24

25 A Pivoting Rule f = x 0 f x0 =1 + f x0 =0 Wang, Kulkarni, & Poor p. 11/24

26 A Pivoting Rule f = x 0 f x0 =1 + f x0 =0 f x 0 (a) Original x 0 f x0 =1 1 0 (b) Decoupled f f x0 =0 Wang, Kulkarni, & Poor p. 11/24

27 The Two-Stage Algorithm f Wang, Kulkarni, & Poor p. 12/24

28 The Two-Stage Algorithm f Wang, Kulkarni, & Poor p. 12/24

29 The Two-Stage Algorithm f f FINITE Wang, Kulkarni, & Poor p. 12/24

30 The Two-Stage Algorithm f f FINITE Wang, Kulkarni, & Poor p. 12/24

31 The Two-Stage Algorithm f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24

32 The Two-Stage Algorithm w. the same order p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24

33 The Two-Stage Algorithm w. the same order p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24

34 The Two-Stage Algorithm w. the same order p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24

35 The Two-Stage Algorithm w. the same order p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24

36 The Two-Stage Algorithm w. the same order p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24

37 The Two-Stage Algorithm w. the same order p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24

38 The Two-Stage Algorithm w. the same order p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24

39 The Two-Stage Algorithm w. the same order p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 12/24

40 A Narrowing Search Theorem 3 (Asymptotically Tight) With an optimal" growing module, we have UB(ǫ) = O(p e (ǫ)). Wang, Kulkarni, & Poor p. 13/24

41 A Narrowing Search Theorem 3 (Asymptotically Tight) With an optimal" growing module, we have UB(ǫ) = O(p e (ǫ)). Theorem 4 (Exhaustive Enumeration) d := min{size(x) x such that f FINITE (x) = 1}. Then the stopping distance d. If there exists such a minimum x being a SS, then ALL minimum SSs are in the set of all minimum x. The exhaustive list of minimum SSs leads to a lower bound tight in both order and multiplicity. Wang, Kulkarni, & Poor p. 13/24

42 The Two-Stage Algorithm p e = E{ f } E{ f FINITE } E DE { f FINITE } f f FINITE = ffinite Wang, Kulkarni, & Poor p. 14/24

43 Numerical Experiments The (7,4,3) Hamming code: H = Wang, Kulkarni, & Poor p. 15/24

44 Numerical Experiments The (7,4,3) Hamming code: H = i [1, 7], ǫ (0, 1], UB i (ǫ) p i (ǫ) 1.3. Wang, Kulkarni, & Poor p. 15/24

45 Numerical Experiments The (7,4,3) Hamming code: The (23,12,7) Golay code: H = [H I] in which H = H = i [1, 7], ǫ (0, 1], UB i (ǫ) p i (ǫ) Wang, Kulkarni, & Poor p. 15/24

46 Numerical Experiments (cont d) The (23,12,7) Golay code: bit 0, (4*,75*) ber erasure prob ε V0: MC S V0: UB V0: C UB V0: LB Wang, Kulkarni, & Poor p. 16/24

47 Numerical Experiments (cont d) A fixed, finite LDPC code with var deg. 3, chk deg. 6, n = 50: bit 0, (4*,1*) ber V0: MC S V0: UB V0: C UB V0: LB erasure prob ε Wang, Kulkarni, & Poor p. 17/24

48 Numerical Experiments (cont d) A fixed, finite LDPC code with var deg. 3, chk deg. 6, n = 50: bit 26, (6*,2*) ber V26: MC S V26: UB V26: C UB V26: LB erasure prob ε Wang, Kulkarni, & Poor p. 17/24

49 Numerical Experiments (cont d) A fixed, finite LDPC code with var deg. 3, chk deg. 6, n = 50: bit 19, (7*,10 5*) ber V19: MC S V19: UB V19: C UB V19: LB erasure prob ε Wang, Kulkarni, & Poor p. 17/24

50 Frame Error Rates and Irregular Codes Frame error rate (FER): f FER = n i=1 f i. Wang, Kulkarni, & Poor p. 18/24

51 Frame Error Rates and Irregular Codes Frame error rate (FER): f FER = n i=1 f i. Efficiency: More cycles = less efficiency. (The Golay code is the worst.) The larger n, the easier for our algorithm. Wang, Kulkarni, & Poor p. 18/24

52 Frame Error Rates and Irregular Codes Frame error rate (FER): f FER = n i=1 f i. Efficiency: More cycles = less efficiency. (The Golay code is the worst.) The larger n, the easier for our algorithm. Experimental results Consider codes of n = For regular codes, d SS 12 can be exhausted. (( ) = trials) The FER of irregular codes suits the algorithm most. d SS 13 can be exhausted. (( ) = trials) Wang, Kulkarni, & Poor p. 18/24

53 The FER of A Rate 1/2 Irregular Code λ(x) = x x x 5 ρ(x) = x 5. 61% variable nodes of degree 2 A rate 1/2 n = 572 irregular LDPC code, (order, multi)=(13*,104*) Error Probability Typical CL CL+d2opt 10 5 CL+CA (DA+CA)+CL+CA 10 6 (DA+CA)+CL+CA, asym. Random Constr. Direct CA Erasure Probability ε Wang, Kulkarni, & Poor p. 19/24

54 Summary Upper bounding and exhausting the bad patterns An NP-complete problem but feasible for at least short practical LDPC codes. Wang, Kulkarni, & Poor p. 20/24

55 Summary Upper bounding and exhausting the bad patterns An NP-complete problem but feasible for at least short practical LDPC codes. Taking advantages of the tree-like structure. Wang, Kulkarni, & Poor p. 20/24

56 Summary Upper bounding and exhausting the bad patterns An NP-complete problem but feasible for at least short practical LDPC codes. Taking advantages of the tree-like structure. Suitable for both FER and ber, punctured codes, unequal sub-channel analysis, non-sparse codes, etc. Wang, Kulkarni, & Poor p. 20/24

57 Summary Upper bounding and exhausting the bad patterns An NP-complete problem but feasible for at least short practical LDPC codes. Taking advantages of the tree-like structure. Suitable for both FER and ber, punctured codes, unequal sub-channel analysis, non-sparse codes, etc. Our algorithm can be easily modified for trapping sets. Wang, Kulkarni, & Poor p. 20/24

58 Summary Upper bounding and exhausting the bad patterns An NP-complete problem but feasible for at least short practical LDPC codes. Taking advantages of the tree-like structure. Suitable for both FER and ber, punctured codes, unequal sub-channel analysis, non-sparse codes, etc. Our algorithm can be easily modified for trapping sets. A useful tool for finite code optimization. Wang, Kulkarni, & Poor p. 20/24

59 Summary Upper bounding and exhausting the bad patterns An NP-complete problem but feasible for at least short practical LDPC codes. Taking advantages of the tree-like structure. Suitable for both FER and ber, punctured codes, unequal sub-channel analysis, non-sparse codes, etc. Our algorithm can be easily modified for trapping sets. A useful tool for finite code optimization. A starting point for more efficient algorithms. Wang, Kulkarni, & Poor p. 20/24

60 Thank you for the attention. Wang, Kulkarni, & Poor p. 21/24

61 Searching for Trapping Sets We define the k-out trapping set, namely, the induced graph has k check node of degree Theorem 5 Consider a fixed k. Determining the k-out trapping distance is NP-complete. Our algorithm can be modified for trapping set exhaustion. Wang, Kulkarni, & Poor p. 22/24

62 Some Notes Complexity of evaluating UB: O( T log( T )), even for arbitrarily small ǫ. Wang, Kulkarni, & Poor p. 23/24

63 Some Notes Complexity of evaluating UB: O( T log( T )), even for arbitrarily small ǫ. A pleasant byproduct: an exhaustive list of minimum SS leading to a lower bound tight in both order and multiplicity. Wang, Kulkarni, & Poor p. 23/24

64 Some Notes Complexity of evaluating UB: O( T log( T )), even for arbitrarily small ǫ. A pleasant byproduct: an exhaustive list of minimum SS leading to a lower bound tight in both order and multiplicity. Complexity and performance tradeoff. Wang, Kulkarni, & Poor p. 23/24

65 Some Notes Complexity of evaluating UB: O( T log( T )), even for arbitrarily small ǫ. A pleasant byproduct: an exhaustive list of minimum SS leading to a lower bound tight in both order and multiplicity. Complexity and performance tradeoff. Punctured vs. Shortened Codes Wang, Kulkarni, & Poor p. 23/24

66 Some Notes Complexity of evaluating UB: O( T log( T )), even for arbitrarily small ǫ. A pleasant byproduct: an exhaustive list of minimum SS leading to a lower bound tight in both order and multiplicity. Complexity and performance tradeoff. Punctured vs. Shortened Codes A partitioned approach a hybrid search E{ f } = E{A j }E{ f A j }. j Ex: A 1 = {x 3 = 0}, A 2 = {x 3 = 1, x 7 = 0}, and A 3 = {x 3 = 1, x 7 = 1}. Wang, Kulkarni, & Poor p. 23/24

67 The Tree Converting Algorithm 1: repeat 2: Find the next leaf variable node, say x j. 3: if there exists another non-leaf x j in T then 4: if the youngest common ancestor of the leaf x j and existing non-leaf x j, denoted as yca(x j ), is a check node then 5: Include the new x j in T. 6: else if yca(x j ) is a variable node then 7: Do the pivoting construction. 8: end if 9: end if 10: Construct the immediate children of x j. 11: until the size of T exceeds the preset limit. Wang, Kulkarni, & Poor p. 24/24

Upper Bounding the Performance of Arbitrary Finite LDPC Codes on Binary Erasure Channels

Upper Bounding the Performance of Arbitrary Finite LDPC Codes on Binary Erasure Channels Upper Bounding the Performance of Arbitrary Finite LDPC Codes on Binary Erasure Channels Chih-Chun Wang School of Electrical & Computer Engineering Purdue University West Lafayette, IN 47907, USA Email:

More information

From Stopping sets to Trapping sets

From Stopping sets to Trapping sets From Stopping sets to Trapping sets The Exhaustive Search Algorithm & The Suppressing Effect Chih-Chun Wang School of Electrical & Computer Engineering Purdue University Wang p. 1/21 Content Good exhaustive

More information

On the Exhaustion and Elimination of Trapping Sets: Algorithms & The Suppressing Effect

On the Exhaustion and Elimination of Trapping Sets: Algorithms & The Suppressing Effect On the Exhaustion and Elimination of Trapping Sets: Algorithms & The Suppressing Effect Chih-Chun Wang Center for Wireless Systems and Applications (CWSA) School of ECE, Purdue University, West Lafayette,

More information

Spatially Coupled LDPC Codes

Spatially Coupled LDPC Codes Spatially Coupled LDPC Codes Kenta Kasai Tokyo Institute of Technology 30 Aug, 2013 We already have very good codes. Efficiently-decodable asymptotically capacity-approaching codes Irregular LDPC Codes

More information

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International

More information

Message Passing Algorithm with MAP Decoding on Zigzag Cycles for Non-binary LDPC Codes

Message Passing Algorithm with MAP Decoding on Zigzag Cycles for Non-binary LDPC Codes Message Passing Algorithm with MAP Decoding on Zigzag Cycles for Non-binary LDPC Codes Takayuki Nozaki 1, Kenta Kasai 2, Kohichi Sakaniwa 2 1 Kanagawa University 2 Tokyo Institute of Technology July 12th,

More information

An Efficient Algorithm for Finding Dominant Trapping Sets of LDPC Codes

An Efficient Algorithm for Finding Dominant Trapping Sets of LDPC Codes An Efficient Algorithm for Finding Dominant Trapping Sets of LDPC Codes Mehdi Karimi, Student Member, IEEE and Amir H. Banihashemi, Senior Member, IEEE Abstract arxiv:1108.4478v2 [cs.it] 13 Apr 2012 This

More information

Symmetric Product Codes

Symmetric Product Codes Symmetric Product Codes Henry D. Pfister 1, Santosh Emmadi 2, and Krishna Narayanan 2 1 Department of Electrical and Computer Engineering Duke University 2 Department of Electrical and Computer Engineering

More information

An Integer Programming-Based Search Technique for Error-Prone Structures of LDPC Codes

An Integer Programming-Based Search Technique for Error-Prone Structures of LDPC Codes An Integer Programming-Based Search Technique for Error-Prone Structures of LDPC Codes Abdullah Sarıduman a, Ali E. Pusane a, Z. Caner Taşkın b a Department of Electrical and Electronics Engineering, Boğaziçi

More information

ECEN 655: Advanced Channel Coding

ECEN 655: Advanced Channel Coding ECEN 655: Advanced Channel Coding Course Introduction Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 655: Advanced Channel Coding 1 / 19 Outline 1 History

More information

An Introduction to Low Density Parity Check (LDPC) Codes

An Introduction to Low Density Parity Check (LDPC) Codes An Introduction to Low Density Parity Check (LDPC) Codes Jian Sun jian@csee.wvu.edu Wireless Communication Research Laboratory Lane Dept. of Comp. Sci. and Elec. Engr. West Virginia University June 3,

More information

Low-density parity-check (LDPC) codes

Low-density parity-check (LDPC) codes Low-density parity-check (LDPC) codes Performance similar to turbo codes Do not require long interleaver to achieve good performance Better block error performance Error floor occurs at lower BER Decoding

More information

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering

More information

Lecture 4 : Introduction to Low-density Parity-check Codes

Lecture 4 : Introduction to Low-density Parity-check Codes Lecture 4 : Introduction to Low-density Parity-check Codes LDPC codes are a class of linear block codes with implementable decoders, which provide near-capacity performance. History: 1. LDPC codes were

More information

Error Floors of LDPC Coded BICM

Error Floors of LDPC Coded BICM Electrical and Computer Engineering Conference Papers, Posters and Presentations Electrical and Computer Engineering 2007 Error Floors of LDPC Coded BICM Aditya Ramamoorthy Iowa State University, adityar@iastate.edu

More information

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Behzad Amiri Electrical Eng. Department University of California, Los Angeles Los Angeles, USA Email: amiri@ucla.edu Jorge Arturo Flores

More information

Graph-based codes for flash memory

Graph-based codes for flash memory 1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background

More information

Iterative Encoding of Low-Density Parity-Check Codes

Iterative Encoding of Low-Density Parity-Check Codes Iterative Encoding of Low-Density Parity-Check Codes David Haley, Alex Grant and John Buetefuer Institute for Telecommunications Research University of South Australia Mawson Lakes Blvd Mawson Lakes SA

More information

Practical Polar Code Construction Using Generalised Generator Matrices

Practical Polar Code Construction Using Generalised Generator Matrices Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:

More information

Coding Techniques for Data Storage Systems

Coding Techniques for Data Storage Systems Coding Techniques for Data Storage Systems Thomas Mittelholzer IBM Zurich Research Laboratory /8 Göttingen Agenda. Channel Coding and Practical Coding Constraints. Linear Codes 3. Weight Enumerators and

More information

Iterative Quantization. Using Codes On Graphs

Iterative Quantization. Using Codes On Graphs Iterative Quantization Using Codes On Graphs Emin Martinian and Jonathan S. Yedidia 2 Massachusetts Institute of Technology 2 Mitsubishi Electric Research Labs Lossy Data Compression: Encoding: Map source

More information

Density Evolution for Asymmetric Memoryless Channels: The Perfect Projection Condition and the Typicality of the Linear LDPC Code Ensemble

Density Evolution for Asymmetric Memoryless Channels: The Perfect Projection Condition and the Typicality of the Linear LDPC Code Ensemble Density Evolution for Asymmetric Memoryless Channels: The Perfect Projection Condition and the Typicality of the Linear LDPC Code Ensemble Chih-Chun Wang, Sanjeev R. Kulkarni, H. Vincent Poor This work

More information

Enhancing Binary Images of Non-Binary LDPC Codes

Enhancing Binary Images of Non-Binary LDPC Codes Enhancing Binary Images of Non-Binary LDPC Codes Aman Bhatia, Aravind R Iyengar, and Paul H Siegel University of California, San Diego, La Jolla, CA 92093 0401, USA Email: {a1bhatia, aravind, psiegel}@ucsdedu

More information

A Deviation-Based Conditional Upper Bound on the Error Floor Performance for Min-Sum Decoding of Short LDPC Codes

A Deviation-Based Conditional Upper Bound on the Error Floor Performance for Min-Sum Decoding of Short LDPC Codes IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 12, DECEMBER 2012 3567 A Deviation-Based Conditional Upper Bound on the Error Floor Performance for Min-Sum Decoding of Short LDPC Codes Eric T. Psota,

More information

On Bit Error Rate Performance of Polar Codes in Finite Regime

On Bit Error Rate Performance of Polar Codes in Finite Regime On Bit Error Rate Performance of Polar Codes in Finite Regime A. Eslami and H. Pishro-Nik Abstract Polar codes have been recently proposed as the first low complexity class of codes that can provably achieve

More information

On the Typicality of the Linear Code Among the LDPC Coset Code Ensemble

On the Typicality of the Linear Code Among the LDPC Coset Code Ensemble 5 Conference on Information Sciences and Systems The Johns Hopkins University March 16 18 5 On the Typicality of the Linear Code Among the LDPC Coset Code Ensemble C.-C. Wang S.R. Kulkarni and H.V. Poor

More information

Design of regular (2,dc)-LDPC codes over GF(q) using their binary images

Design of regular (2,dc)-LDPC codes over GF(q) using their binary images Design of regular (2,dc)-LDPC codes over GF(q) using their binary images Charly Poulliat, Marc Fossorier, David Declercq To cite this version: Charly Poulliat, Marc Fossorier, David Declercq. Design of

More information

Recent Results on Capacity-Achieving Codes for the Erasure Channel with Bounded Complexity

Recent Results on Capacity-Achieving Codes for the Erasure Channel with Bounded Complexity 26 IEEE 24th Convention of Electrical and Electronics Engineers in Israel Recent Results on Capacity-Achieving Codes for the Erasure Channel with Bounded Complexity Igal Sason Technion Israel Institute

More information

Trapping Set Enumerators for Specific LDPC Codes

Trapping Set Enumerators for Specific LDPC Codes Trapping Set Enumerators for Specific LDPC Codes Shadi Abu-Surra Samsung Telecommunications America 1301 E. Lookout Dr. Richardson TX 75082 Email: sasurra@sta.samsung.com David DeClercq ETIS ENSEA/UCP/CNRS

More information

STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION

STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION EE229B PROJECT REPORT STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION Zhengya Zhang SID: 16827455 zyzhang@eecs.berkeley.edu 1 MOTIVATION Permutation matrices refer to the square matrices with

More information

Low-Density Parity-Check Codes

Low-Density Parity-Check Codes Department of Computer Sciences Applied Algorithms Lab. July 24, 2011 Outline 1 Introduction 2 Algorithms for LDPC 3 Properties 4 Iterative Learning in Crowds 5 Algorithm 6 Results 7 Conclusion PART I

More information

Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes

Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes Xiaojie Zhang and Paul H. Siegel University of California, San Diego, La Jolla, CA 9093, U Email:{ericzhang, psiegel}@ucsd.edu

More information

On Generalized EXIT Charts of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels

On Generalized EXIT Charts of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels 2012 IEEE International Symposium on Information Theory Proceedings On Generalied EXIT Charts of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels H Mamani 1, H Saeedi 1, A Eslami

More information

An Introduction to Algorithmic Coding Theory

An Introduction to Algorithmic Coding Theory An Introduction to Algorithmic Coding Theory M. Amin Shokrollahi Bell Laboratories Part : Codes - A puzzle What do the following problems have in common? 2 Problem : Information Transmission MESSAGE G

More information

ON THE MINIMUM DISTANCE OF NON-BINARY LDPC CODES. Advisor: Iryna Andriyanova Professor: R.. udiger Urbanke

ON THE MINIMUM DISTANCE OF NON-BINARY LDPC CODES. Advisor: Iryna Andriyanova Professor: R.. udiger Urbanke ON THE MINIMUM DISTANCE OF NON-BINARY LDPC CODES RETHNAKARAN PULIKKOONATTU ABSTRACT. Minimum distance is an important parameter of a linear error correcting code. For improved performance of binary Low

More information

Optimal Rate and Maximum Erasure Probability LDPC Codes in Binary Erasure Channel

Optimal Rate and Maximum Erasure Probability LDPC Codes in Binary Erasure Channel Optimal Rate and Maximum Erasure Probability LDPC Codes in Binary Erasure Channel H. Tavakoli Electrical Engineering Department K.N. Toosi University of Technology, Tehran, Iran tavakoli@ee.kntu.ac.ir

More information

The New Multi-Edge Metric-Constrained PEG/QC-PEG Algorithms for Designing the Binary LDPC Codes With Better Cycle-Structures

The New Multi-Edge Metric-Constrained PEG/QC-PEG Algorithms for Designing the Binary LDPC Codes With Better Cycle-Structures HE et al.: THE MM-PEGA/MM-QC-PEGA DESIGN THE LDPC CODES WITH BETTER CYCLE-STRUCTURES 1 arxiv:1605.05123v1 [cs.it] 17 May 2016 The New Multi-Edge Metric-Constrained PEG/QC-PEG Algorithms for Designing the

More information

Codes designed via algebraic lifts of graphs

Codes designed via algebraic lifts of graphs p./40 Codes designed via algebraic lifts of graphs Clemson Mini-Conference on Discrete Mathematics Oct. 3, 2008. Christine A. Kelley Department of Mathematics University of Nebraska-Lincoln email: ckelley2@math.unl.edu

More information

LDPC Code Ensembles that Universally Achieve Capacity under BP Decoding: A Simple Derivation

LDPC Code Ensembles that Universally Achieve Capacity under BP Decoding: A Simple Derivation LDPC Code Ensembles that Universally Achieve Capacity under BP Decoding: A Simple Derivation Anatoly Khina EE Systems Dept., TAU Tel Aviv, Israel Email: anatolyk@eng.tau.ac.il Yair Yona Dept. of EE, UCLA

More information

Making Error Correcting Codes Work for Flash Memory

Making Error Correcting Codes Work for Flash Memory Making Error Correcting Codes Work for Flash Memory Part I: Primer on ECC, basics of BCH and LDPC codes Lara Dolecek Laboratory for Robust Information Systems (LORIS) Center on Development of Emerging

More information

Joint Iterative Decoding of LDPC Codes and Channels with Memory

Joint Iterative Decoding of LDPC Codes and Channels with Memory Joint Iterative Decoding of LDPC Codes and Channels with Memory Henry D. Pfister and Paul H. Siegel University of California, San Diego 3 rd Int l Symposium on Turbo Codes September 1, 2003 Outline Channels

More information

5. Density evolution. Density evolution 5-1

5. Density evolution. Density evolution 5-1 5. Density evolution Density evolution 5-1 Probabilistic analysis of message passing algorithms variable nodes factor nodes x1 a x i x2 a(x i ; x j ; x k ) x3 b x4 consider factor graph model G = (V ;

More information

Quasi-cyclic Low Density Parity Check codes with high girth

Quasi-cyclic Low Density Parity Check codes with high girth Quasi-cyclic Low Density Parity Check codes with high girth, a work with Marta Rossi, Richard Bresnan, Massimilliano Sala Summer Doctoral School 2009 Groebner bases, Geometric codes and Order Domains Dept

More information

Fountain Uncorrectable Sets and Finite-Length Analysis

Fountain Uncorrectable Sets and Finite-Length Analysis Fountain Uncorrectable Sets and Finite-Length Analysis Wen Ji 1, Bo-Wei Chen 2, and Yiqiang Chen 1 1 Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology, Chinese

More information

Ma/CS 6b Class 25: Error Correcting Codes 2

Ma/CS 6b Class 25: Error Correcting Codes 2 Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets

More information

Asynchronous Decoding of LDPC Codes over BEC

Asynchronous Decoding of LDPC Codes over BEC Decoding of LDPC Codes over BEC Saeid Haghighatshoar, Amin Karbasi, Amir Hesam Salavati Department of Telecommunication Systems, Technische Universität Berlin, Germany, School of Engineering and Applied

More information

Codes on Graphs. Telecommunications Laboratory. Alex Balatsoukas-Stimming. Technical University of Crete. November 27th, 2008

Codes on Graphs. Telecommunications Laboratory. Alex Balatsoukas-Stimming. Technical University of Crete. November 27th, 2008 Codes on Graphs Telecommunications Laboratory Alex Balatsoukas-Stimming Technical University of Crete November 27th, 2008 Telecommunications Laboratory (TUC) Codes on Graphs November 27th, 2008 1 / 31

More information

Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel

Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel Pål Ellingsen paale@ii.uib.no Susanna Spinsante s.spinsante@univpm.it Angela Barbero angbar@wmatem.eis.uva.es May 31, 2005 Øyvind Ytrehus

More information

Slepian-Wolf Code Design via Source-Channel Correspondence

Slepian-Wolf Code Design via Source-Channel Correspondence Slepian-Wolf Code Design via Source-Channel Correspondence Jun Chen University of Illinois at Urbana-Champaign Urbana, IL 61801, USA Email: junchen@ifpuiucedu Dake He IBM T J Watson Research Center Yorktown

More information

Convergence analysis for a class of LDPC convolutional codes on the erasure channel

Convergence analysis for a class of LDPC convolutional codes on the erasure channel Convergence analysis for a class of LDPC convolutional codes on the erasure channel Sridharan, Arvind; Lentmaier, Michael; Costello Jr., Daniel J.; Zigangirov, Kamil Published in: [Host publication title

More information

(tree searching technique) (Boolean formulas) satisfying assignment: (X 1, X 2 )

(tree searching technique) (Boolean formulas) satisfying assignment: (X 1, X 2 ) Algorithms Chapter 5: The Tree Searching Strategy - Examples 1 / 11 Chapter 5: The Tree Searching Strategy 1. Ex 5.1Determine the satisfiability of the following Boolean formulas by depth-first search

More information

Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel

Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel Ohad Barak, David Burshtein and Meir Feder School of Electrical Engineering Tel-Aviv University Tel-Aviv 69978, Israel Abstract

More information

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes EE229B - Final Project Capacity-Approaching Low-Density Parity-Check Codes Pierre Garrigues EECS department, UC Berkeley garrigue@eecs.berkeley.edu May 13, 2005 Abstract The class of low-density parity-check

More information

Capacity-Achieving Ensembles for the Binary Erasure Channel With Bounded Complexity

Capacity-Achieving Ensembles for the Binary Erasure Channel With Bounded Complexity Capacity-Achieving Ensembles for the Binary Erasure Channel With Bounded Complexity Henry D. Pfister, Member, Igal Sason, Member, and Rüdiger Urbanke Abstract We present two sequences of ensembles of non-systematic

More information

where X is the feasible region, i.e., the set of the feasible solutions.

where X is the feasible region, i.e., the set of the feasible solutions. 3.5 Branch and Bound Consider a generic Discrete Optimization problem (P) z = max{c(x) : x X }, where X is the feasible region, i.e., the set of the feasible solutions. Branch and Bound is a general semi-enumerative

More information

ML and Near-ML Decoding of LDPC Codes Over the BEC: Bounds and Decoding Algorithms

ML and Near-ML Decoding of LDPC Codes Over the BEC: Bounds and Decoding Algorithms 1 ML and Near-ML Decoding of LDPC Codes Over the BEC: Bounds and Decoding Algorithms Irina E. Bocharova, Senior Member, IEEE, Boris D. Kudryashov, Senior Member, IEEE, Vitaly Skachek, Member, IEEE, Eirik

More information

Spatially Coupled LDPC Codes Constructed from Protographs

Spatially Coupled LDPC Codes Constructed from Protographs IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Spatially Coupled LDPC Codes Constructed from Protographs David G. M. Mitchell, Member, IEEE, Michael Lentmaier, Senior Member, IEEE, and Daniel

More information

Optimizing Flash based Storage Systems

Optimizing Flash based Storage Systems Optimizing Flash based Storage Systems 1 Lifetime Reliability Latency Throughput 2 Projects Reliability/Latency/Throughput: Error Correction Code (ECC) Parallelization and Incremental Redundancy Lifetime:

More information

Lecture 2 Linear Codes

Lecture 2 Linear Codes Lecture 2 Linear Codes 2.1. Linear Codes From now on we want to identify the alphabet Σ with a finite field F q. For general codes, introduced in the last section, the description is hard. For a code of

More information

Searching for low weight pseudo-codewords

Searching for low weight pseudo-codewords Searching for low weight pseudo-codewords Michael Chertkov Theoretical Division and Center for Nonlinear Studies LANL, MS B23, T-3, Los Alamos, NM 87545 chertkov@lanl.gov Mikhail Stepanov Department of

More information

Belief propagation decoding of quantum channels by passing quantum messages

Belief propagation decoding of quantum channels by passing quantum messages Belief propagation decoding of quantum channels by passing quantum messages arxiv:67.4833 QIP 27 Joseph M. Renes lempelziv@flickr To do research in quantum information theory, pick a favorite text on classical

More information

An algorithm to improve the error rate performance of Accumulate-Repeat-Accumulate codes Tae-Ui Kim

An algorithm to improve the error rate performance of Accumulate-Repeat-Accumulate codes Tae-Ui Kim An algorithm to improve the error rate performance of Accumulate-Repeat-Accumulate codes Tae-Ui Kim The Graduate School Yonsei University Department of Electrical and Electronic Engineering An algorithm

More information

LDPC Codes. Slides originally from I. Land p.1

LDPC Codes. Slides originally from I. Land p.1 Slides originally from I. Land p.1 LDPC Codes Definition of LDPC Codes Factor Graphs to use in decoding Decoding for binary erasure channels EXIT charts Soft-Output Decoding Turbo principle applied to

More information

LDPC Codes. Intracom Telecom, Peania

LDPC Codes. Intracom Telecom, Peania LDPC Codes Alexios Balatsoukas-Stimming and Athanasios P. Liavas Technical University of Crete Dept. of Electronic and Computer Engineering Telecommunications Laboratory December 16, 2011 Intracom Telecom,

More information

3.4 Relaxations and bounds

3.4 Relaxations and bounds 3.4 Relaxations and bounds Consider a generic Discrete Optimization problem z = min{c(x) : x X} with an optimal solution x X. In general, the algorithms generate not only a decreasing sequence of upper

More information

4216 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Density Evolution for Asymmetric Memoryless Channels

4216 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Density Evolution for Asymmetric Memoryless Channels 4216 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER 2005 Density Evolution for Asymmetric Memoryless Channels Chih-Chun Wang, Sanjeev R. Kulkarni, Fellow, IEEE, and H. Vincent Poor,

More information

Computing the threshold shift for general channels

Computing the threshold shift for general channels Computing the threshold shift for general channels Jeremie Ezri and Rüdiger Urbanke LTHC EPFL jeremie.ezri@epfl.ch, ruediger.urbanke@epfl.ch Andrea Montanari and Sewoong Oh Electrical Engineering Department

More information

Optimisation and Operations Research

Optimisation and Operations Research Optimisation and Operations Research Lecture 15: The Greedy Heuristic Matthew Roughan http://www.maths.adelaide.edu.au/matthew.roughan/ Lecture_notes/OORII/ School of

More information

GLDPC-Staircase AL-FEC codes: A Fundamental study and New results

GLDPC-Staircase AL-FEC codes: A Fundamental study and New results GLDPC-Staircase AL-FEC codes: A Fundamental study and New results Ferdaouss Mattoussi, Vincent Roca, Bessam Sayadi To cite this version: Ferdaouss Mattoussi, Vincent Roca, Bessam Sayadi. GLDPC-Staircase

More information

Distance Properties of Short LDPC Codes and Their Impact on the BP, ML and Near-ML Decoding Performance

Distance Properties of Short LDPC Codes and Their Impact on the BP, ML and Near-ML Decoding Performance Distance Properties of Short LDPC Codes and Their Impact on the BP, ML and Near-ML Decoding Performance Irina E. Bocharova 1,2, Boris D. Kudryashov 1, Vitaly Skachek 2, Yauhen Yakimenka 2 1 St. Petersburg

More information

Introduction to Low-Density Parity Check Codes. Brian Kurkoski

Introduction to Low-Density Parity Check Codes. Brian Kurkoski Introduction to Low-Density Parity Check Codes Brian Kurkoski kurkoski@ice.uec.ac.jp Outline: Low Density Parity Check Codes Review block codes History Low Density Parity Check Codes Gallager s LDPC code

More information

Graph-based Codes for Quantize-Map-and-Forward Relaying

Graph-based Codes for Quantize-Map-and-Forward Relaying 20 IEEE Information Theory Workshop Graph-based Codes for Quantize-Map-and-Forward Relaying Ayan Sengupta, Siddhartha Brahma, Ayfer Özgür, Christina Fragouli and Suhas Diggavi EPFL, Switzerland, UCLA,

More information

An Introduction to Low-Density Parity-Check Codes

An Introduction to Low-Density Parity-Check Codes An Introduction to Low-Density Parity-Check Codes Paul H. Siegel Electrical and Computer Engineering University of California, San Diego 5/ 3/ 7 Copyright 27 by Paul H. Siegel Outline Shannon s Channel

More information

Low-density parity-check codes

Low-density parity-check codes Low-density parity-check codes From principles to practice Dr. Steve Weller steven.weller@newcastle.edu.au School of Electrical Engineering and Computer Science The University of Newcastle, Callaghan,

More information

On the number of circuits in random graphs. Guilhem Semerjian. [ joint work with Enzo Marinari and Rémi Monasson ]

On the number of circuits in random graphs. Guilhem Semerjian. [ joint work with Enzo Marinari and Rémi Monasson ] On the number of circuits in random graphs Guilhem Semerjian [ joint work with Enzo Marinari and Rémi Monasson ] [ Europhys. Lett. 73, 8 (2006) ] and [ cond-mat/0603657 ] Orsay 13-04-2006 Outline of the

More information

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.

More information

Linear and conic programming relaxations: Graph structure and message-passing

Linear and conic programming relaxations: Graph structure and message-passing Linear and conic programming relaxations: Graph structure and message-passing Martin Wainwright UC Berkeley Departments of EECS and Statistics Banff Workshop Partially supported by grants from: National

More information

Quasi-Cyclic Asymptotically Regular LDPC Codes

Quasi-Cyclic Asymptotically Regular LDPC Codes 2010 IEEE Information Theory Workshop - ITW 2010 Dublin Quasi-Cyclic Asymptotically Regular LDPC Codes David G. M. Mitchell, Roxana Smarandache, Michael Lentmaier, and Daniel J. Costello, Jr. Dept. of

More information

Information, Physics, and Computation

Information, Physics, and Computation Information, Physics, and Computation Marc Mezard Laboratoire de Physique Thdorique et Moales Statistiques, CNRS, and Universit y Paris Sud Andrea Montanari Department of Electrical Engineering and Department

More information

Communication by Regression: Achieving Shannon Capacity

Communication by Regression: Achieving Shannon Capacity Communication by Regression: Practical Achievement of Shannon Capacity Department of Statistics Yale University Workshop Infusing Statistics and Engineering Harvard University, June 5-6, 2011 Practical

More information

COMPSCI 650 Applied Information Theory Apr 5, Lecture 18. Instructor: Arya Mazumdar Scribe: Hamed Zamani, Hadi Zolfaghari, Fatemeh Rezaei

COMPSCI 650 Applied Information Theory Apr 5, Lecture 18. Instructor: Arya Mazumdar Scribe: Hamed Zamani, Hadi Zolfaghari, Fatemeh Rezaei COMPSCI 650 Applied Information Theory Apr 5, 2016 Lecture 18 Instructor: Arya Mazumdar Scribe: Hamed Zamani, Hadi Zolfaghari, Fatemeh Rezaei 1 Correcting Errors in Linear Codes Suppose someone is to send

More information

Message-Passing Decoding for Low-Density Parity-Check Codes Harish Jethanandani and R. Aravind, IIT Madras

Message-Passing Decoding for Low-Density Parity-Check Codes Harish Jethanandani and R. Aravind, IIT Madras Message-Passing Decoding for Low-Density Parity-Check Codes Harish Jethanandani and R. Aravind, IIT Madras e-mail: hari_jethanandani@yahoo.com Abstract Low-density parity-check (LDPC) codes are discussed

More information

A Class of Quantum LDPC Codes Derived from Latin Squares and Combinatorial Design

A Class of Quantum LDPC Codes Derived from Latin Squares and Combinatorial Design A Class of Quantum LDPC Codes Derived from Latin Squares and Combinatorial Design Salah A Aly Department of Computer Science, Texas A&M University, College Station, TX 77843-3112, USA Email: salah@cstamuedu

More information

Integer Programming ISE 418. Lecture 8. Dr. Ted Ralphs

Integer Programming ISE 418. Lecture 8. Dr. Ted Ralphs Integer Programming ISE 418 Lecture 8 Dr. Ted Ralphs ISE 418 Lecture 8 1 Reading for This Lecture Wolsey Chapter 2 Nemhauser and Wolsey Sections II.3.1, II.3.6, II.4.1, II.4.2, II.5.4 Duality for Mixed-Integer

More information

Network Design and Game Theory Spring 2008 Lecture 6

Network Design and Game Theory Spring 2008 Lecture 6 Network Design and Game Theory Spring 2008 Lecture 6 Guest Lecturer: Aaron Archer Instructor: Mohammad T. Hajiaghayi Scribe: Fengming Wang March 3, 2008 1 Overview We study the Primal-dual, Lagrangian

More information

Pseudocodewords of Tanner Graphs

Pseudocodewords of Tanner Graphs SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY 1 Pseudocodewords of Tanner Graphs arxiv:cs/0504013v4 [cs.it] 18 Aug 2007 Christine A. Kelley Deepak Sridhara Department of Mathematics Seagate Technology

More information

Integrated Code Design for a Joint Source and Channel LDPC Coding Scheme

Integrated Code Design for a Joint Source and Channel LDPC Coding Scheme Integrated Code Design for a Joint Source and Channel LDPC Coding Scheme Hsien-Ping Lin Shu Lin and Khaled Abdel-Ghaffar Department of Electrical and Computer Engineering University of California Davis

More information

Probabilistic Graphical Models

Probabilistic Graphical Models School of Computer Science Probabilistic Graphical Models Variational Inference IV: Variational Principle II Junming Yin Lecture 17, March 21, 2012 X 1 X 1 X 1 X 1 X 2 X 3 X 2 X 2 X 3 X 3 Reading: X 4

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

Low-complexity error correction in LDPC codes with constituent RS codes 1

Low-complexity error correction in LDPC codes with constituent RS codes 1 Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 348-353 Low-complexity error correction in LDPC codes with constituent RS codes 1

More information

B I N A R Y E R A S U R E C H A N N E L

B I N A R Y E R A S U R E C H A N N E L Chapter 3 B I N A R Y E R A S U R E C H A N N E L The binary erasure channel (BEC) is perhaps the simplest non-trivial channel model imaginable. It was introduced by Elias as a toy example in 954. The

More information

ECC for NAND Flash. Osso Vahabzadeh. TexasLDPC Inc. Flash Memory Summit 2017 Santa Clara, CA 1

ECC for NAND Flash. Osso Vahabzadeh. TexasLDPC Inc. Flash Memory Summit 2017 Santa Clara, CA 1 ECC for NAND Flash Osso Vahabzadeh TexasLDPC Inc. 1 Overview Why Is Error Correction Needed in Flash Memories? Error Correction Codes Fundamentals Low-Density Parity-Check (LDPC) Codes LDPC Encoding and

More information

On the Design of Fast Convergent LDPC Codes for the BEC: An Optimization Approach

On the Design of Fast Convergent LDPC Codes for the BEC: An Optimization Approach On the Design of Fast Convergent LDPC Codes for the BEC: An Optimization Approach Vahid Jamali, Yasser Karimian, Student Member, IEEE, Johannes Huber, Fellow, IEEE, and Mahmoud Ahmadian, Member, IEEE 1

More information

Accumulate-Repeat-Accumulate Codes: Capacity-Achieving Ensembles of Systematic Codes for the Erasure Channel with Bounded Complexity

Accumulate-Repeat-Accumulate Codes: Capacity-Achieving Ensembles of Systematic Codes for the Erasure Channel with Bounded Complexity Accumulate-Repeat-Accumulate Codes: Capacity-Achieving Ensembles of Systematic Codes for the Erasure Channel with Bounded Complexity Henry D. Pfister, Member, Igal Sason, Member Abstract The paper introduces

More information

Error-Correcting Codes:

Error-Correcting Codes: Error-Correcting Codes: Progress & Challenges Madhu Sudan Microsoft/MIT Communication in presence of noise We are not ready Sender Noisy Channel We are now ready Receiver If information is digital, reliability

More information

HAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS

HAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS HAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS Colin Cooper School of Mathematical Sciences, Polytechnic of North London, London, U.K. and Alan Frieze and Michael Molloy Department of Mathematics, Carnegie-Mellon

More information

Codes on graphs and iterative decoding

Codes on graphs and iterative decoding Codes on graphs and iterative decoding Bane Vasić Error Correction Coding Laboratory University of Arizona Prelude Information transmission 0 0 0 0 0 0 Channel Information transmission signal 0 0 threshold

More information

Finite Alphabet Iterative Decoders Approaching Maximum Likelihood Performance on the Binary Symmetric Channel

Finite Alphabet Iterative Decoders Approaching Maximum Likelihood Performance on the Binary Symmetric Channel Finite Alphabet Iterative Decoders Approaching Maximum Likelihood Performance on the Binary Symmetric Channel David Declercq ETIS ENSEA/UCP/CNRS UMR 8051 95014 Cergy-Pontoise, France Email: declercq@ensea.fr

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 1, JANUARY

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 1, JANUARY IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 56, NO 1, JANUARY 2010 181 Analysis of Absorbing Sets Fully Absorbing Sets of Array-Based LDPC Codes Lara Dolecek, Member, IEEE, Zhengya Zhang, Member, IEEE,

More information