Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel

Size: px
Start display at page:

Download "Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel"

Transcription

1 Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel Pål Ellingsen Susanna Spinsante Angela Barbero May 31, 2005 Øyvind Ytrehus Abstract The aim of this paper is to extend some basic concepts related to the Maximum Likelihood decoding of codes on the Z-channel, which is a particular, but very important, example of an asymmetric channel. We study distance properties of linear codes over the Z-channel, in order to define a suitable metric for the implementation of a Maximum Likelihood decoder on the channel. A combinatorial expression for an upper bound on the probability of incorrect Maximum Likelihood decoding is also provided, and comparisons are given to evaluate the tightness of the bound, when a Hamming code, a Turbo code and an LDPC code are decoded on the asymmetric channel. 1 Introduction Errors induced by communications on a noisy channel or storage medium can be reduced to any desired level by proper encoding of the information, as long as the information rate is less than the capacity of the channel. This fact was shown in a landmark paper by Shannon, in 1948 [1]; since that time, much work has been devoted to the problem of devising efficient encoding and decoding methods for error control in a noisy environment. In a block-coded system, the source output u represents a k-bit message, the encoder output c represents an n-symbol codeword, the demodulator output r represents the corresponding binary received n-tuple and the decoder output û represents the k-bit estimate of the encoded message. The decoder must produce an estimate û of the information sequence u based on the received sequence r. Equivalently, since there is a one-to-one correspondence between the information sequence u and the codeword c, the decoder can produce an estimate ĉ of the codeword c. Obviously, û = u if and only if ĉ = c. The strategy adopted for choosing an Susanna Spinsante completed this work under the FASTSEC Marie Curie Training Site contract HPMT- CT , Selmersenteret, Department of Informatics, University of Bergen. 1

2 estimated codeword ĉ for each possible received sequence r is called a decoding rule. If the codeword c was transmitted, a decoding error occurs if and only if ĉ c. Let E be the event that the decoder makes an error. Then, given that r is received, the conditional error probability of the decoder is defined as P (E r) P (ĉ c r). The error probability of the decoder is then given by P (E) = r P (E r)p (r), where P (r) is the probability of the received sequence r. P (r) is independent of the decoding rule adopted, since r is produced prior to decoding. So, an optimum decoding rule that minimizes P (E), must minimize P (E r) = P (ĉ c r) for all r. Because minimizing P (ĉ c r) is equivalent to maximizing P (ĉ = c r), P (E r) is minimized for a given r by choosing ĉ as the codeword c that maximizes P (r c) P (c) P (c r) = ; (1) P (r) that is, ĉ is chosen as the most likely codeword given that r is received. P (r) is independent of the decoding rule, so if all the information sequences and consequently all the codewords are equally likely, P (c) is the same for all c, then, maximizing the last expression is equivalent to maximizing P (r c). For a DMC (Discrete Memoryless Channel), P (r c) = i P (r i c i ), (2) since for a memoryless channel each received symbol depends only on the corresponding transmitted symbol. If the decoder chooses its estimate to maximize P (r c), it is called Maximum Likelihood (ML) decoder. If the codewords are not equally likely, an ML decoder is not necessarily optimum and the conditional probabilities P (r c) must be weighted by the codeword probabilities P (c) to determine the codeword which maximizes P (c r); the corresponding decoding rule turns into the more general MAP (Maximum A Posteriori probability) decoder. For the purpose of this paper, we have to deal with binary outputs, so that many quantities, including the distance metric, can have a simplified definition. An ML decoder is sometimes called a minimum distance decoder as the ML decoding rule chooses the codeword c which minimizes the distance between the received vector r and the codeword c itself. The literature contains a great amount of papers dealing with ML decoding over different channels, like the AWGN (Additive White Gaussian Noise) channel, the BSC or the BEC (Binary Erasure Channel) and the problems related to the probability of incorrect decoding. As in the case of symmetric codes, when the code dimension is not trivial, the ML rule becomes too complex to be applied, also in the case of an asymmetric channel. In this paper, a performance evaluation based on a union bound approach is proposed, regarding the application of ML decoding to the asymmetric channel. In the next section, we describe the relevant distance properties of linear codes over asymmetric channels. These will be useful to develop our final result in section 3. 2

3 2 Distance properties of linear codes over the Z-channel The BSC can be suitably adopted to model binary communication systems where the crossover probabilities are independent and identical. In other communication systems, however, the 1 0 crossover probability can be much larger than the 0 1 one. If we assume that the 0 1 crossover probability is 0, the communication system can be modeled by the Z-channel. According to Kløve [2], the following definition can be given: Definition The Z-channel is the channel with {0, 1} as input and output alphabets, where the crossover 1 0 occurs with positive probability q, whereas the crossover 0 1 never occurs. Kløve [2] also defines an asymmetric distance metric between two binary vectors in the following way: Definition Let x and y be binary vectors and let N(x, y) be the number of positions i where x i = 1 and y i = 0. The asymmetric distance d A (x, y) between x and y is max{n(x, y), N(y, x)}. By definition, a distance measure d must satisfy these requirements for any pair (x, y) of points: 1. d(x, y) d(x, y) = d(y, x). 3. d(x, y) d(x, a) + d(a, y) for any point a. It can easily be checked that d H satisfies all three requirements, so it is indeed a distance function. For a given codeword x we define the minimum asymmetric distance d min A (x) to be the minimum d A (x, y) for all y C. Similarly, the minimum asymmetric distance d min A (C) of a code C is the minimum d A (x, y) over all pairs of codewords x and y. From Definition we can derive some properties of the asymmetric distance: 1. Since d H (x, y) = N(x, y) + N(y, x), d A (x, y) d H (x, y). 2. From Property 1. follows d min (C) dmin (C). A 3. Since max(n(x, y), N(y, x)) N(x,y)+N(y,x), d min 2 A (C) dmin H (C)/2. H If we assume ML-decoding, correct decoding is guaranteed if less than d A (x, y) asymmetric errors occur. Further, for a given codeword an error will occur if the number of bit errors is greater than d min A (x), so the probability of incorrect decoding is at least qdmin A (x)+1. Even if d A determines the probability of incorrect decoding over the Z-channel, this definition of the asymmetric distance cannot be used to formulate an ML-decoding rule for the Z-channel. To this end, we define the following function: 3

4 Definition The non-symmetric distance d NS (x, y) between the two vectors x = (x 1, x 2,..., x n ) and y = (y 1, y 2,..., y n ) is given by d NS (x, y) = i δ(x i, y i ) where 0 if x i = y i δ(x i, y i ) = 1 if x i > y i if x i < y i Referring to the requirements for distance functions cited above, we see that d NS satisfies conditions 1. and 3., but not 2., i.e. the metric is not symmetric, in the sense that d NS (x, y) = d NS (y, x) may not be true. Therefore we say that the function d NS is a pseudo-metric or a non-symmetric distance measure. This reflects the fact that a transmitted word, in general, can only give rise to a subset of the 2 n possible strings of length n. Using d NS, we can formulate the ML-decoding rule for the Z-channel as: For a received word r, decode to the codeword c which minimizes the distance d NS (c, r). (3) 3 On the probability of incorrect MLD on the Z-channel In Definition the definition of a non-symmetric distance d NS was provided, which can be more suitable than the traditional one for the implementation of an ML decoder on the Z-channel. In this section we show how a bound on the probability of incorrect ML decoding on the Z-channel can be derived, by adopting a general approach. 3.1 An upper bound on ML decoding Assume that a vector r of weight w has been received. If the codewords are chosen with equal probability, the ML decoding strategy given in (3) can be carried out by decoding to a codeword c of weight v w, so that v is minimum. Thus, the ML decoder will determine the codeword c that maximizes P (c transmitted r received) = P (c r). From (1) we know that this is equivalent to minimizing P (r c), so the ML decoder selects the codeword c that maximizes P (r c) = q dns(c,r) as required by the decoding rule. For q < 1, this is equivalent to finding the codeword c that contains r and minimizes w H (c). Let E be the event that a decoding error occurs. Then, the probability of incorrect ML decoding (under the assumption that all codewords are equally likely) is given by: P (E) = c 0 C P (c 0 transmitted)p (E c 0 transmitted) (4) = 2 k 1 P (c 0 transmitted)p ( Decode to c i c 0 transmitted) (5) c 0 C 4 i=1

5 By the Union Bound, the probability of the union of the events is less than or equal to the sum of the individual events, so if we sum over the error events in (5): P (E) 2 k 1 P (c 0 transmitted) P (Decode to c i c 0 transmitted) (6) c 0 C i=1 If we assume the weight distribution within every codeword is random, then for words c 0 of equal weight, the probability P (Decode to c i c 0 transmitted) of a pairwise error event with a codeword c i of weight w is the same, so instead of summing over all words in C, we can rather take the sum over the weights. Further, we express the weight distribution of a code of length n by a weight enumerating function A(X) = n d=0 A dx d where the coordinates A d are the number of codewords of weight d in the code. Then, the first sum in (6) can be written: 2 k 1 P (c 0 transmitted) P (Decode to c i c 0 transmitted) c 0 C = n u=1 i=1 = A u 2 k n A u P (E weight u word transmitted) 2k u P (Decode to weight v word weight u word transmitted) (7) u=1 v=1 Consider the two codewords c 0 and c i. Using the definition of N(, ) in Definition 2.0.2, we let α N(c 0, c i ) and β N(c i, c 0 ) for notational convenience. If we permute the indices of the words so that the 1-bits of c 0 come first and let w H (c 0 ) = u, we can illustrate these quantities as follows: c 0 : u n u {}}{{}}{ α {}}{{}}{ c i : For a general code, we can express the probability P (Decode to c i c 0 transmitted) as a function of α, q and n. In (7), P (Decode to c i c 0 transmitted) is 0 if w H (c i ) > u, so we assume w H (c i u). Then, the probability becomes q α if w H (c i ) < u, and supp(c 0 ) supp(c i ) = u α. Now d H (c 0, c i ) = α + β. Also, since w H (c i ) u and β α, α d H (c 0, c i )/2 d min /2 and β = d H (c 0, c i ) α d min α. The codewords c i that can be mistaken for c 0 must then have weight u α + d min α = u + d min 2α. Thus for a given u and α, the number of possible candidates for decoding is ( u u )( n u ) α v u+α A v ( n (8) v) v=u+d min 2α Substituting into (7), we get an upper bound on the probability of decoding error given by: n A u u ( ) ( u u n u ) v u+α P (E) A 2 k v ( α n q u=d min v) α (9) α= d min /2 5 β v=u+d min 2α

6 For linear codes, each codeword c i that can be mistaken for c 0 determines a unique codeword c 0 c i of weight α + β, so we can simplify the expression to: = n A u 2 k u=d min u α= d min /2 ( ) min(n u,α) u α β=min{n u,max(d min α,0)} ( n u ) β A α+β )q α (10) ( n α+β By applying this formula, we obtain a polynomial expression in the variable q, which represents the crossover probability of the asymmetric channel, for the probability of incorrect decoding. 3.2 Valid range of the bound Because of the weakening of the bound in (9) using the Union Bound theorem, the bound grows quickly with higher values of q because of the overlapping of error events, and rises to values above 1 for larger q. In practice, the problematic terms of the polynomial goes to zero very fast as q decreases, so that the upper bound is tight for any reasonable choice of parameters. We can however limit the impact of the terms with large exponents by splitting the polynomial at some point t. The probability of error then becomes: t n P (E) = P (E i errors) P (i errors) + P (E i errors) P (i errors) (11) i=d min A Now, the last term of the sum is the one that makes the sum grow sharply for higher values of q. We can upper limit it by noticing that n P (E i errors) P (i errors) P (E t + 1 or more errors) P (t + 1 or more errors) i=t+1 = = i=t+1 P (t + 1 or more errors) n j ( ) j P (w H = j) q k (1 q) j k k j=t+1 n j=t+1 ( ) n 1 j 2 Thus, for higher values of q a tighter upper bound is t P (E) min P (E i errors) P (i errors) + t i=d min A 3.3 Examples of Application (7, 4) Hamming code n k=t+1 k=t+1 j ( ) j q k (1 q) j k (12) k n j=t+1 ( ) n 1 j 2 n j k=t+1 ( ) j )q k (1 q) j k k As a first example, we test the tightness of this bound on the Hamming (7,4) code, whose weight spectrum is completely known. For a code of this size, we can compute the exact value 6 (13)

7 of (5) as P (E) = 7 16 (q3 + 2q 2 (1 q)) (q4 + 2q 3 (1 q) + 6q 2 (1 q) 2 ) (1 ((1 q)7 + 7q(1 q) q 2 (1 q) 5 )) (14) The upper bound on performance obtained by applying (10) to the probability of incorrect decoding is compared to the results obtained by application of the ML decoding algorithm to this code, for the Z-channel, by considering a crossover probability q ranging from 10 5 to The results are depicted in Fig. 1, where the dashed line represents the bound computation, while the continuous line refers to the exact error probability for ML decoding on the Z-channel. The graphical comparison in Fig. 1 shows a quite good behavior of the bound expression used to estimate the probability of error, when compared to ML decoding of the Hamming (7,4) code on the Z-channel ML-decoding based on (14) Upper bound based on (10) BER e q Figure 1: Bound performance compared to ML decoding of the Hamming code (150, 48) Turbo code The main problem related to the application of the formula for the upper bound on the probability of incorrect ML decoding, is that it is necessary to know the weight distribution of the code in order to estimate the probability of incorrect decoding for different values of the crossover probability of the Z-channel. Actually, in the case of PCCCs (Parallel Concatenated Convolutional Codes) also known as Turbo codes, we know that as the block length and 7

8 corresponding interleaver size increases the weight spectrum of a PCC code begins to approximate a random-like distribution, that is, the distribution that would result if each bit in every codeword were selected randomly from an independent and identically distributed probability distribution. The exact weight spectrum of a Turbo code depends on the particular interleaver chosen; in order to deal with the weight spectrum of a Turbo code in a general way, the concept of a uniform interleaver [3] has been introduced. This notion allows us to calculate the average weight spectrum of a PCC code which is typical of the weight spectrum obtained for Upper bound, random interleaver Turbo code, random interleaver Upper bound, optimized interleaver Turbo code, optimized interleaver FER Figure 2: Comparison with Turbo code q a randomly chosen interleaver. Recently, Rosnes and Ytrehus [4] presented an algorithm for calculating the weight spectrum of Turbo codes. We have used this algorithm to find the lower part of the weight spectrum of a Turbo code in which both constituent codes are generated by (2,1,2) systematic feedback encoders, for two different interleavers. The first interleaver was a randomly chosen interleaver with minimum distance 9, the second interleaver was a Dithered Relative Prime interleaver optimized with respect to minimum distance, resulting in a code with minimum distance 19. The interleavers and codeword weights up to 25 can be found in Appendix A. Thanks to the uniform interleaver approach, it seems reasonable to approximate the remaining part of the weight spectrum by means of a binomial distribution given by A w = ( n 2 ) k, where w w 2 n is the weight of the codeword, k and n are the code parameters. The results obtained comparing the probability of incorrect decoding on the asymmetric channel, computed by means of the bound, to the same quantity obtained by means of an implementation of a Turbo decoder for the 8

9 previously described Turbo codes, are depicted in Fig.2; the crossover probability q ranges from 0.12 to 0.8. We see that the code with the random interleaver falls below the predicted upper bound, indicating that the decoding performance approaches ML-decoding. The code with the optimized interleaver on the other hand, is well above the predicted bound for the values of q we have used for simulation. A possible explanation for this could be that for a code with large minimum distance, pseudocodewords and stopping sets can deteriorate the performance of the decoding process compared to the performance that could be expected judging from the minimum distance alone. See for example [5] and [6]. However, the impact of these factors in the context of asymmetric channels is not well understood and will be addressed in future work by the authors (495, 433) LDPC code The idea of approximating the WEF of the code by means of a binomial distribution has been also applied to the evaluation of the bound on the probability of incorrect decoding of LDPC (Low Density Parity Check) codes. In this case, nothing similar to the uniform interleaver approach has been developed, in order to represent the code s behavior in a general way, as for the Turbo codes. Actually, many different algorithms and schemes have been proposed in order to get a feasible estimation of the minimum distance of LDPC codes, but the problem is still mostly open. In [7] the authors propose a randomized algorithm, called the Approximately Nearest Codewords (ANC) algorithm, to compute the minimum distance of nontrivial LDPC codes. As an example to support the main idea of the paper, the low-part Hamming weight distribution of MacKay s [8] (495,433) code is computed. The code is a regular rate-433/495 LDPC code, which turns out to have a minimum distance of 4 and a multiplicity of at least 60. The other approximated weight values obtained by means of the ANC algorithm are: A 6 = 256, A 8 = 1024, A 10 = 4096, A 12 = 16384, A 14 = 32768, A 16 = 65536, A 18 = We have used these values and the binomial approximation to compute the WEF of the MacKay s (495,433) code, in order to evaluate the bound on the probability of incorrect decoding and to compare it to the simulation of an LDPC decoder, as shown in Fig Tightness of the bound Previously, the best upper bound known to us on ML decoding on the Z-channel was the bound found in [9]. Also based on the Union Bound, an upper limit on ML decoder error is given by P (E) A(γ) 1 (15) where A( ) is the weight enumerator polynomial of the code and γ is the Battacharya noise parameter, which in the case of the Z-channel is q. Both bounds sum over the error events instead of taking the union, but the bound in [9] is further loosened by multiplying each term of the sum by p(r c i )/p(r c 0 ) which is always greater than or equal to 1. Finally, the bound is weakened by summing over all possible vectors r to avoid finding the subset of vectors that can result from c. Thus, we expect the new bound to be tighter than the bound in [9]. We can verify this for the previous examples by computing the two bounds for each code. As can be seen in Fig. 4(a) and 4(b), the new bound is indeed tighter as asserted. 9

10 10 0 Upper bound LDPC code FER Conclusion Figure 3: Comparison with LDPC code, t = 20 In this paper some concepts related to Maximum Likelihood decoding of codes on the Z-channel have been developed, leading to the definition of an upper bound on the probability of incorrect ML decoding, which relies on the approximate computation of the code weight spectrum. The bound has been evaluated with respect to a Hamming code, a Turbo code and an LDPC code over an asymmetric channel for different values of the error transition probability. Simulations regarding the selected Turbo and LDPC codes have shown that the bound only applies to the decoding results below the waterfall, when the decoder starts performing like an ML decoder. The bound has been proved to be tighter than a previously proposed one and this result could be further improved by the development of new algorithms for a more thorough calculation of the weight spectra, most of all in the case of Turbo and LDPC codes. q 10

11 10 0 Old bound New bound FER q (a) Comparison for the code in section Old bound New bound FER q (b) Comparison for the code in section Figure 4: Performance comparison between the old bound described in [9] and the new bound from (10) 11

12 Appendix A A.1 Random interleaver The following interleaver was chosen at random: Using two constituent encoders with generator matrix ( 1, 1+D2 1+D+D2) and the above interleaver, we obtained the following weight spectrum up to 25: IOWEF of Turbo code: Outputweight 9 : 1 Outputweight 10 : 4 Outputweight 11 : 2 Outputweight 12 : 3 Outputweight 13 : 11 Outputweight 14 : 5 Outputweight 15 : 9 Outputweight 16 : 16 Outputweight 17 : 20 Outputweight 18 : 48 Outputweight 19 : 56 Outputweight 20 : 126 Outputweight 21 : 207 Outputweight 22 : 352 Outputweight 23 : 674 Outputweight 24 : 1065 Outputweight 25 : 1775 A.2 Optimized interleaver The following interleaver was found by exhaustive search of all Dithered Relative Prime interleavers with M = 2 and M = 5, see Crozier and Guinand [10] for details Parallell concatenation of the code in A.1 with this interleaver yields a code with the following weight distribution up to output weight 25: IOWEF of Turbo code: Outputweight 19 : 62 Outputweight 20 : 67 Outputweight 21 : 90 Outputweight 22 :

13 Outputweight 23 : 112 Outputweight 24 : 584 Outputweight 25 : 1218 References [1] C. E. Shannon, A mathematical theory of communication, Bell System Technical Journal, vol. 27, pp and , July and October [2] T. Kløve, Error Correcting Codes for the Asymmetric Channel. HiB, N-5020 Bergen, Norway: Department of Informatics, University of Bergen, [3] S. Benedetto and G. Montorsi, Unveiling turbo codes: Some results on parallel concatenated coding, IEEE Trans. Inform. Theory, vol. 42, pp , March [4] E. Rosnes and Ø. Ytrehus, Improved algorithms for the determination of turbo-code weight distributions, Communications, IEEE Transactions on, vol. 53, no. 1, pp , January [5] P. O. Vontobel and R. Koetter, Graph-covers and iterative decoding of finite length codes, in Proc. 3rd International Symposium on Turbo Codes 2003, September [6] P. Vontobel and R. Koetter, Lower bounds on the minimum pseudoweight of linear codes, in Proceedings. International Symposium on Information Theory 2004, July 2004, p. 70. [7] X.-Y. Hu and M. Fossorier, On the computation of the minimum distance of low-density parity-check codes, [Online]. Available: [8] D. J. Mackay, Encyclopedia of sparse graph codes. [Online]. Available: [9] P. Ellingsen, Iterative coding for the asymmetric channel, University of Bergen, Tech. Rep. 295, April [10] S. Crozier and P. Guinand, Distance upper bounds and true minimum distance results for turbo-codes designed with drp interleavers, in Proceedings 3rd International Symposium on Turbo Codes & Related Topics, 2003, pp

An Introduction to Low Density Parity Check (LDPC) Codes

An Introduction to Low Density Parity Check (LDPC) Codes An Introduction to Low Density Parity Check (LDPC) Codes Jian Sun jian@csee.wvu.edu Wireless Communication Research Laboratory Lane Dept. of Comp. Sci. and Elec. Engr. West Virginia University June 3,

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land Ingmar Land, SIPCom8-1: Information Theory and Coding (2005 Spring) p.1 Overview Basic Concepts of Channel Coding Block Codes I:

More information

Turbo Codes for Deep-Space Communications

Turbo Codes for Deep-Space Communications TDA Progress Report 42-120 February 15, 1995 Turbo Codes for Deep-Space Communications D. Divsalar and F. Pollara Communications Systems Research Section Turbo codes were recently proposed by Berrou, Glavieux,

More information

Lecture 4 : Introduction to Low-density Parity-check Codes

Lecture 4 : Introduction to Low-density Parity-check Codes Lecture 4 : Introduction to Low-density Parity-check Codes LDPC codes are a class of linear block codes with implementable decoders, which provide near-capacity performance. History: 1. LDPC codes were

More information

Aalborg Universitet. Bounds on information combining for parity-check equations Land, Ingmar Rüdiger; Hoeher, A.; Huber, Johannes

Aalborg Universitet. Bounds on information combining for parity-check equations Land, Ingmar Rüdiger; Hoeher, A.; Huber, Johannes Aalborg Universitet Bounds on information combining for parity-check equations Land, Ingmar Rüdiger; Hoeher, A.; Huber, Johannes Published in: 2004 International Seminar on Communications DOI link to publication

More information

Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes

Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes Xiaojie Zhang and Paul H. Siegel University of California, San Diego, La Jolla, CA 9093, U Email:{ericzhang, psiegel}@ucsd.edu

More information

Code design: Computer search

Code design: Computer search Code design: Computer search Low rate codes Represent the code by its generator matrix Find one representative for each equivalence class of codes Permutation equivalences? Do NOT try several generator

More information

ECEN 655: Advanced Channel Coding

ECEN 655: Advanced Channel Coding ECEN 655: Advanced Channel Coding Course Introduction Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 655: Advanced Channel Coding 1 / 19 Outline 1 History

More information

LDPC Codes. Slides originally from I. Land p.1

LDPC Codes. Slides originally from I. Land p.1 Slides originally from I. Land p.1 LDPC Codes Definition of LDPC Codes Factor Graphs to use in decoding Decoding for binary erasure channels EXIT charts Soft-Output Decoding Turbo principle applied to

More information

Turbo Compression. Andrej Rikovsky, Advisor: Pavol Hanus

Turbo Compression. Andrej Rikovsky, Advisor: Pavol Hanus Turbo Compression Andrej Rikovsky, Advisor: Pavol Hanus Abstract Turbo codes which performs very close to channel capacity in channel coding can be also used to obtain very efficient source coding schemes.

More information

Practical Polar Code Construction Using Generalised Generator Matrices

Practical Polar Code Construction Using Generalised Generator Matrices Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:

More information

Chapter 7: Channel coding:convolutional codes

Chapter 7: Channel coding:convolutional codes Chapter 7: : Convolutional codes University of Limoges meghdadi@ensil.unilim.fr Reference : Digital communications by John Proakis; Wireless communication by Andreas Goldsmith Encoder representation Communication

More information

Introduction to Low-Density Parity Check Codes. Brian Kurkoski

Introduction to Low-Density Parity Check Codes. Brian Kurkoski Introduction to Low-Density Parity Check Codes Brian Kurkoski kurkoski@ice.uec.ac.jp Outline: Low Density Parity Check Codes Review block codes History Low Density Parity Check Codes Gallager s LDPC code

More information

Convolutional Codes ddd, Houshou Chen. May 28, 2012

Convolutional Codes ddd, Houshou Chen. May 28, 2012 Representation I, II Representation III, IV trellis of Viterbi decoding Turbo codes Convolutional Codes ddd, Houshou Chen Department of Electrical Engineering National Chung Hsing University Taichung,

More information

An Efficient Algorithm for Finding Dominant Trapping Sets of LDPC Codes

An Efficient Algorithm for Finding Dominant Trapping Sets of LDPC Codes An Efficient Algorithm for Finding Dominant Trapping Sets of LDPC Codes Mehdi Karimi, Student Member, IEEE and Amir H. Banihashemi, Senior Member, IEEE Abstract arxiv:1108.4478v2 [cs.it] 13 Apr 2012 This

More information

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International

More information

Modern Coding Theory. Daniel J. Costello, Jr School of Information Theory Northwestern University August 10, 2009

Modern Coding Theory. Daniel J. Costello, Jr School of Information Theory Northwestern University August 10, 2009 Modern Coding Theory Daniel J. Costello, Jr. Coding Research Group Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556 2009 School of Information Theory Northwestern University

More information

5. Density evolution. Density evolution 5-1

5. Density evolution. Density evolution 5-1 5. Density evolution Density evolution 5-1 Probabilistic analysis of message passing algorithms variable nodes factor nodes x1 a x i x2 a(x i ; x j ; x k ) x3 b x4 consider factor graph model G = (V ;

More information

Non-Linear Turbo Codes for Interleaver-Division Multiple Access on the OR Channel.

Non-Linear Turbo Codes for Interleaver-Division Multiple Access on the OR Channel. UCLA Graduate School of Engineering - Electrical Engineering Program Non-Linear Turbo Codes for Interleaver-Division Multiple Access on the OR Channel. Miguel Griot, Andres I. Vila Casado, and Richard

More information

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Brian M. Kurkoski, Paul H. Siegel, and Jack K. Wolf Department of Electrical and Computer Engineering

More information

Extended MinSum Algorithm for Decoding LDPC Codes over GF (q)

Extended MinSum Algorithm for Decoding LDPC Codes over GF (q) Extended MinSum Algorithm for Decoding LDPC Codes over GF (q) David Declercq ETIS ENSEA/UCP/CNRS UMR-8051, 95014 Cergy-Pontoise, (France), declercq@ensea.fr Marc Fossorier Dept. Electrical Engineering,

More information

Tightened Upper Bounds on the ML Decoding Error Probability of Binary Linear Block Codes and Applications

Tightened Upper Bounds on the ML Decoding Error Probability of Binary Linear Block Codes and Applications on the ML Decoding Error Probability of Binary Linear Block Codes and Moshe Twitto Department of Electrical Engineering Technion-Israel Institute of Technology Haifa 32000, Israel Joint work with Igal

More information

Codes designed via algebraic lifts of graphs

Codes designed via algebraic lifts of graphs p./40 Codes designed via algebraic lifts of graphs Clemson Mini-Conference on Discrete Mathematics Oct. 3, 2008. Christine A. Kelley Department of Mathematics University of Nebraska-Lincoln email: ckelley2@math.unl.edu

More information

Graph-based Codes and Iterative Decoding

Graph-based Codes and Iterative Decoding Graph-based Codes and Iterative Decoding Thesis by Aamod Khandekar In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy California Institute of Technology Pasadena, California

More information

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes EE229B - Final Project Capacity-Approaching Low-Density Parity-Check Codes Pierre Garrigues EECS department, UC Berkeley garrigue@eecs.berkeley.edu May 13, 2005 Abstract The class of low-density parity-check

More information

Optimum Soft Decision Decoding of Linear Block Codes

Optimum Soft Decision Decoding of Linear Block Codes Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is

More information

1 1 0, g Exercise 1. Generator polynomials of a convolutional code, given in binary form, are g

1 1 0, g Exercise 1. Generator polynomials of a convolutional code, given in binary form, are g Exercise Generator polynomials of a convolutional code, given in binary form, are g 0, g 2 0 ja g 3. a) Sketch the encoding circuit. b) Sketch the state diagram. c) Find the transfer function TD. d) What

More information

STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION

STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION EE229B PROJECT REPORT STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION Zhengya Zhang SID: 16827455 zyzhang@eecs.berkeley.edu 1 MOTIVATION Permutation matrices refer to the square matrices with

More information

Linear and conic programming relaxations: Graph structure and message-passing

Linear and conic programming relaxations: Graph structure and message-passing Linear and conic programming relaxations: Graph structure and message-passing Martin Wainwright UC Berkeley Departments of EECS and Statistics Banff Workshop Partially supported by grants from: National

More information

ML and Near-ML Decoding of LDPC Codes Over the BEC: Bounds and Decoding Algorithms

ML and Near-ML Decoding of LDPC Codes Over the BEC: Bounds and Decoding Algorithms 1 ML and Near-ML Decoding of LDPC Codes Over the BEC: Bounds and Decoding Algorithms Irina E. Bocharova, Senior Member, IEEE, Boris D. Kudryashov, Senior Member, IEEE, Vitaly Skachek, Member, IEEE, Eirik

More information

Channel Coding for Secure Transmissions

Channel Coding for Secure Transmissions Channel Coding for Secure Transmissions March 27, 2017 1 / 51 McEliece Cryptosystem Coding Approach: Noiseless Main Channel Coding Approach: Noisy Main Channel 2 / 51 Outline We present an overiew of linear

More information

LOW-density parity-check (LDPC) codes were invented

LOW-density parity-check (LDPC) codes were invented IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 1, JANUARY 2008 51 Extremal Problems of Information Combining Yibo Jiang, Alexei Ashikhmin, Member, IEEE, Ralf Koetter, Senior Member, IEEE, and Andrew

More information

Introduction to Convolutional Codes, Part 1

Introduction to Convolutional Codes, Part 1 Introduction to Convolutional Codes, Part 1 Frans M.J. Willems, Eindhoven University of Technology September 29, 2009 Elias, Father of Coding Theory Textbook Encoder Encoder Properties Systematic Codes

More information

Bounds on Mutual Information for Simple Codes Using Information Combining

Bounds on Mutual Information for Simple Codes Using Information Combining ACCEPTED FOR PUBLICATION IN ANNALS OF TELECOMM., SPECIAL ISSUE 3RD INT. SYMP. TURBO CODES, 003. FINAL VERSION, AUGUST 004. Bounds on Mutual Information for Simple Codes Using Information Combining Ingmar

More information

Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 1

Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 1 Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 1 Sunghwan Kim, Jong-Seon No School of Electrical Eng. & Com. Sci. Seoul National University, Seoul, Korea Email: {nodoubt, jsno}@snu.ac.kr

More information

APPLICATIONS. Quantum Communications

APPLICATIONS. Quantum Communications SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction

More information

Encoder. Encoder 2. ,...,u N-1. 0,v (0) ,u 1. ] v (0) =[v (0) 0,v (1) v (1) =[v (1) 0,v (2) v (2) =[v (2) (a) u v (0) v (1) v (2) (b) N-1] 1,...

Encoder. Encoder 2. ,...,u N-1. 0,v (0) ,u 1. ] v (0) =[v (0) 0,v (1) v (1) =[v (1) 0,v (2) v (2) =[v (2) (a) u v (0) v (1) v (2) (b) N-1] 1,... Chapter 16 Turbo Coding As noted in Chapter 1, Shannon's noisy channel coding theorem implies that arbitrarily low decoding error probabilities can be achieved at any transmission rate R less than the

More information

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC August 2011 Ravi Motwani, Zion Kwok, Scott Nelson Agenda NAND ECC History Soft Information What is soft information How do we obtain

More information

Lecture 4: Proof of Shannon s theorem and an explicit code

Lecture 4: Proof of Shannon s theorem and an explicit code CSE 533: Error-Correcting Codes (Autumn 006 Lecture 4: Proof of Shannon s theorem and an explicit code October 11, 006 Lecturer: Venkatesan Guruswami Scribe: Atri Rudra 1 Overview Last lecture we stated

More information

Belief-Propagation Decoding of LDPC Codes

Belief-Propagation Decoding of LDPC Codes LDPC Codes: Motivation Belief-Propagation Decoding of LDPC Codes Amir Bennatan, Princeton University Revolution in coding theory Reliable transmission, rates approaching capacity. BIAWGN, Rate =.5, Threshold.45

More information

On Bit Error Rate Performance of Polar Codes in Finite Regime

On Bit Error Rate Performance of Polar Codes in Finite Regime On Bit Error Rate Performance of Polar Codes in Finite Regime A. Eslami and H. Pishro-Nik Abstract Polar codes have been recently proposed as the first low complexity class of codes that can provably achieve

More information

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering

More information

Coding Techniques for Data Storage Systems

Coding Techniques for Data Storage Systems Coding Techniques for Data Storage Systems Thomas Mittelholzer IBM Zurich Research Laboratory /8 Göttingen Agenda. Channel Coding and Practical Coding Constraints. Linear Codes 3. Weight Enumerators and

More information

Bounds on the Error Probability of ML Decoding for Block and Turbo-Block Codes

Bounds on the Error Probability of ML Decoding for Block and Turbo-Block Codes Bounds on the Error Probability of ML Decoding for Block and Turbo-Block Codes Igal Sason and Shlomo Shamai (Shitz) Department of Electrical Engineering Technion Israel Institute of Technology Haifa 3000,

More information

Quasi-cyclic Low Density Parity Check codes with high girth

Quasi-cyclic Low Density Parity Check codes with high girth Quasi-cyclic Low Density Parity Check codes with high girth, a work with Marta Rossi, Richard Bresnan, Massimilliano Sala Summer Doctoral School 2009 Groebner bases, Geometric codes and Order Domains Dept

More information

Decoding the Tail-Biting Convolutional Codes with Pre-Decoding Circular Shift

Decoding the Tail-Biting Convolutional Codes with Pre-Decoding Circular Shift Decoding the Tail-Biting Convolutional Codes with Pre-Decoding Circular Shift Ching-Yao Su Directed by: Prof. Po-Ning Chen Department of Communications Engineering, National Chiao-Tung University July

More information

Lecture 8: Shannon s Noise Models

Lecture 8: Shannon s Noise Models Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecture 8: Shannon s Noise Models September 14, 2007 Lecturer: Atri Rudra Scribe: Sandipan Kundu& Atri Rudra Till now we have

More information

Introducing Low-Density Parity-Check Codes

Introducing Low-Density Parity-Check Codes Introducing Low-Density Parity-Check Codes Sarah J. Johnson School of Electrical Engineering and Computer Science The University of Newcastle Australia email: sarah.johnson@newcastle.edu.au Topic 1: Low-Density

More information

Successive Cancellation Decoding of Single Parity-Check Product Codes

Successive Cancellation Decoding of Single Parity-Check Product Codes Successive Cancellation Decoding of Single Parity-Check Product Codes Mustafa Cemil Coşkun, Gianluigi Liva, Alexandre Graell i Amat and Michael Lentmaier Institute of Communications and Navigation, German

More information

for some error exponent E( R) as a function R,

for some error exponent E( R) as a function R, . Capacity-achieving codes via Forney concatenation Shannon s Noisy Channel Theorem assures us the existence of capacity-achieving codes. However, exhaustive search for the code has double-exponential

More information

16.36 Communication Systems Engineering

16.36 Communication Systems Engineering MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

More information

THE seminal paper of Gallager [1, p. 48] suggested to evaluate

THE seminal paper of Gallager [1, p. 48] suggested to evaluate IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 11, NOVEMBER 2004 2657 Extrinsic Information Transfer Functions: Model and Erasure Channel Properties Alexei Ashikhmin, Member, IEEE, Gerhard Kramer,

More information

LDPC Codes. Intracom Telecom, Peania

LDPC Codes. Intracom Telecom, Peania LDPC Codes Alexios Balatsoukas-Stimming and Athanasios P. Liavas Technical University of Crete Dept. of Electronic and Computer Engineering Telecommunications Laboratory December 16, 2011 Intracom Telecom,

More information

Lecture 4 Noisy Channel Coding

Lecture 4 Noisy Channel Coding Lecture 4 Noisy Channel Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 9, 2015 1 / 56 I-Hsiang Wang IT Lecture 4 The Channel Coding Problem

More information

Binary Convolutional Codes

Binary Convolutional Codes Binary Convolutional Codes A convolutional code has memory over a short block length. This memory results in encoded output symbols that depend not only on the present input, but also on past inputs. An

More information

Pseudocodewords of Tanner Graphs

Pseudocodewords of Tanner Graphs SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY 1 Pseudocodewords of Tanner Graphs arxiv:cs/0504013v4 [cs.it] 18 Aug 2007 Christine A. Kelley Deepak Sridhara Department of Mathematics Seagate Technology

More information

Channel Codes for Short Blocks: A Survey

Channel Codes for Short Blocks: A Survey 11th International ITG Conference on Systems, Communications and Coding February 6, 2017 Channel Codes for Short Blocks: A Survey Gianluigi Liva, gianluigi.liva@dlr.de Fabian Steiner, fabian.steiner@tum.de

More information

Structured Low-Density Parity-Check Codes: Algebraic Constructions

Structured Low-Density Parity-Check Codes: Algebraic Constructions Structured Low-Density Parity-Check Codes: Algebraic Constructions Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, California 95616 Email:shulin@ece.ucdavis.edu

More information

2376 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 7, JULY Note that conic conv(c) = conic(c).

2376 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 7, JULY Note that conic conv(c) = conic(c). 2376 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 7, JULY 2007 Pseudo-Codeword Analysis of Tanner Graphs From Projective and Euclidean Planes Roxana Smarandache, Member, IEEE, and Pascal O. Vontobel,

More information

Turbo Codes are Low Density Parity Check Codes

Turbo Codes are Low Density Parity Check Codes Turbo Codes are Low Density Parity Check Codes David J. C. MacKay July 5, 00 Draft 0., not for distribution! (First draft written July 5, 998) Abstract Turbo codes and Gallager codes (also known as low

More information

An algorithm to improve the error rate performance of Accumulate-Repeat-Accumulate codes Tae-Ui Kim

An algorithm to improve the error rate performance of Accumulate-Repeat-Accumulate codes Tae-Ui Kim An algorithm to improve the error rate performance of Accumulate-Repeat-Accumulate codes Tae-Ui Kim The Graduate School Yonsei University Department of Electrical and Electronic Engineering An algorithm

More information

A t super-channel. trellis code and the channel. inner X t. Y t. S t-1. S t. S t+1. stages into. group two. one stage P 12 / 0,-2 P 21 / 0,2

A t super-channel. trellis code and the channel. inner X t. Y t. S t-1. S t. S t+1. stages into. group two. one stage P 12 / 0,-2 P 21 / 0,2 Capacity Approaching Signal Constellations for Channels with Memory Λ Aleksandar Kav»cić, Xiao Ma, Michael Mitzenmacher, and Nedeljko Varnica Division of Engineering and Applied Sciences Harvard University

More information

Polar Code Construction for List Decoding

Polar Code Construction for List Decoding 1 Polar Code Construction for List Decoding Peihong Yuan, Tobias Prinz, Georg Böcherer arxiv:1707.09753v1 [cs.it] 31 Jul 2017 Abstract A heuristic construction of polar codes for successive cancellation

More information

Modulation codes for the deep-space optical channel

Modulation codes for the deep-space optical channel Modulation codes for the deep-space optical channel Bruce Moision, Jon Hamkins, Matt Klimesh, Robert McEliece Jet Propulsion Laboratory Pasadena, CA, USA DIMACS, March 25 26, 2004 March 25 26, 2004 DIMACS

More information

Wrap-Around Sliding-Window Near-ML Decoding of Binary LDPC Codes Over the BEC

Wrap-Around Sliding-Window Near-ML Decoding of Binary LDPC Codes Over the BEC Wrap-Around Sliding-Window Near-ML Decoding of Binary LDPC Codes Over the BEC Irina E Bocharova 1,2, Boris D Kudryashov 1, Eirik Rosnes 3, Vitaly Skachek 2, and Øyvind Ytrehus 3 1 Department of Information

More information

Graph-based codes for flash memory

Graph-based codes for flash memory 1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background

More information

Making Error Correcting Codes Work for Flash Memory

Making Error Correcting Codes Work for Flash Memory Making Error Correcting Codes Work for Flash Memory Part I: Primer on ECC, basics of BCH and LDPC codes Lara Dolecek Laboratory for Robust Information Systems (LORIS) Center on Development of Emerging

More information

2012 IEEE International Symposium on Information Theory Proceedings

2012 IEEE International Symposium on Information Theory Proceedings Decoding of Cyclic Codes over Symbol-Pair Read Channels Eitan Yaakobi, Jehoshua Bruck, and Paul H Siegel Electrical Engineering Department, California Institute of Technology, Pasadena, CA 9115, USA Electrical

More information

Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel

Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel Ohad Barak, David Burshtein and Meir Feder School of Electrical Engineering Tel-Aviv University Tel-Aviv 69978, Israel Abstract

More information

Fountain Uncorrectable Sets and Finite-Length Analysis

Fountain Uncorrectable Sets and Finite-Length Analysis Fountain Uncorrectable Sets and Finite-Length Analysis Wen Ji 1, Bo-Wei Chen 2, and Yiqiang Chen 1 1 Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology, Chinese

More information

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths Kasra Vakilinia, Dariush Divsalar*, and Richard D. Wesel Department of Electrical Engineering, University

More information

Tightened Upper Bounds on the ML Decoding Error Probability of Binary Linear Block Codes and Applications

Tightened Upper Bounds on the ML Decoding Error Probability of Binary Linear Block Codes and Applications on the ML Decoding Error Probability of Binary Linear Block Codes and Department of Electrical Engineering Technion-Israel Institute of Technology An M.Sc. Thesis supervisor: Dr. Igal Sason March 30, 2006

More information

Bounds on the Maximum Likelihood Decoding Error Probability of Low Density Parity Check Codes

Bounds on the Maximum Likelihood Decoding Error Probability of Low Density Parity Check Codes Bounds on the Maximum ikelihood Decoding Error Probability of ow Density Parity Check Codes Gadi Miller and David Burshtein Dept. of Electrical Engineering Systems Tel-Aviv University Tel-Aviv 69978, Israel

More information

Error Exponent Region for Gaussian Broadcast Channels

Error Exponent Region for Gaussian Broadcast Channels Error Exponent Region for Gaussian Broadcast Channels Lihua Weng, S. Sandeep Pradhan, and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

COMPSCI 650 Applied Information Theory Apr 5, Lecture 18. Instructor: Arya Mazumdar Scribe: Hamed Zamani, Hadi Zolfaghari, Fatemeh Rezaei

COMPSCI 650 Applied Information Theory Apr 5, Lecture 18. Instructor: Arya Mazumdar Scribe: Hamed Zamani, Hadi Zolfaghari, Fatemeh Rezaei COMPSCI 650 Applied Information Theory Apr 5, 2016 Lecture 18 Instructor: Arya Mazumdar Scribe: Hamed Zamani, Hadi Zolfaghari, Fatemeh Rezaei 1 Correcting Errors in Linear Codes Suppose someone is to send

More information

Bifurcations and Chaos in Turbo Decoding Algorithms

Bifurcations and Chaos in Turbo Decoding Algorithms Bifurcations and Chaos in Turbo Decoding Algorithms Z. Tasev 1, P. Popovski 2, G.M. Maggio 3, and L. Kocarev 1 1 Institute for Nonlinear Science, University of California, San Diego, 9500 Gilman Drive,

More information

Turbo Code Design for Short Blocks

Turbo Code Design for Short Blocks Turbo Code Design for Short Blocks Thomas Jerkovits, Balázs Matuz Abstract This work considers the design of short parallel turbo codes (PTCs) with block lengths in the order of (a few) hundred code bits.

More information

Lecture 2 Linear Codes

Lecture 2 Linear Codes Lecture 2 Linear Codes 2.1. Linear Codes From now on we want to identify the alphabet Σ with a finite field F q. For general codes, introduced in the last section, the description is hard. For a code of

More information

Physical Layer and Coding

Physical Layer and Coding Physical Layer and Coding Muriel Médard Professor EECS Overview A variety of physical media: copper, free space, optical fiber Unified way of addressing signals at the input and the output of these media:

More information

National University of Singapore Department of Electrical & Computer Engineering. Examination for

National University of Singapore Department of Electrical & Computer Engineering. Examination for National University of Singapore Department of Electrical & Computer Engineering Examination for EE5139R Information Theory for Communication Systems (Semester I, 2014/15) November/December 2014 Time Allowed:

More information

Error Floors of LDPC Coded BICM

Error Floors of LDPC Coded BICM Electrical and Computer Engineering Conference Papers, Posters and Presentations Electrical and Computer Engineering 2007 Error Floors of LDPC Coded BICM Aditya Ramamoorthy Iowa State University, adityar@iastate.edu

More information

NAME... Soc. Sec. #... Remote Location... (if on campus write campus) FINAL EXAM EE568 KUMAR. Sp ' 00

NAME... Soc. Sec. #... Remote Location... (if on campus write campus) FINAL EXAM EE568 KUMAR. Sp ' 00 NAME... Soc. Sec. #... Remote Location... (if on campus write campus) FINAL EXAM EE568 KUMAR Sp ' 00 May 3 OPEN BOOK exam (students are permitted to bring in textbooks, handwritten notes, lecture notes

More information

Shannon s noisy-channel theorem

Shannon s noisy-channel theorem Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for

More information

Coding for a Non-symmetric Ternary Channel

Coding for a Non-symmetric Ternary Channel Coding for a Non-symmetric Ternary Channel Nicolas Bitouzé and Alexandre Graell i Amat Department of Electronics, Institut TELECOM-TELECOM Bretagne, 938 Brest, France Email: nicolas.bitouze@telecom-bretagne.eu,

More information

LECTURE 10. Last time: Lecture outline

LECTURE 10. Last time: Lecture outline LECTURE 10 Joint AEP Coding Theorem Last time: Error Exponents Lecture outline Strong Coding Theorem Reading: Gallager, Chapter 5. Review Joint AEP A ( ɛ n) (X) A ( ɛ n) (Y ) vs. A ( ɛ n) (X, Y ) 2 nh(x)

More information

Chapter 4. Data Transmission and Channel Capacity. Po-Ning Chen, Professor. Department of Communications Engineering. National Chiao Tung University

Chapter 4. Data Transmission and Channel Capacity. Po-Ning Chen, Professor. Department of Communications Engineering. National Chiao Tung University Chapter 4 Data Transmission and Channel Capacity Po-Ning Chen, Professor Department of Communications Engineering National Chiao Tung University Hsin Chu, Taiwan 30050, R.O.C. Principle of Data Transmission

More information

Capacity-approaching codes

Capacity-approaching codes Chapter 13 Capacity-approaching codes We have previously discussed codes on graphs and the sum-product decoding algorithm in general terms. In this chapter we will give a brief overview of some particular

More information

Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor

Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor Pravin Salunkhe, Prof D.P Rathod Department of Electrical Engineering, Veermata Jijabai

More information

Optimized Symbol Mappings for Bit-Interleaved Coded Modulation with Iterative Decoding

Optimized Symbol Mappings for Bit-Interleaved Coded Modulation with Iterative Decoding Optimized Symbol Mappings for Bit-nterleaved Coded Modulation with terative Decoding F. Schreckenbach, N. Görtz, J. Hagenauer nstitute for Communications Engineering (LNT) Munich University of Technology

More information

Recent Results on Capacity-Achieving Codes for the Erasure Channel with Bounded Complexity

Recent Results on Capacity-Achieving Codes for the Erasure Channel with Bounded Complexity 26 IEEE 24th Convention of Electrical and Electronics Engineers in Israel Recent Results on Capacity-Achieving Codes for the Erasure Channel with Bounded Complexity Igal Sason Technion Israel Institute

More information

Parallel Concatenated Chaos Coded Modulations

Parallel Concatenated Chaos Coded Modulations Parallel Concatenated Chaos Coded Modulations Francisco J. Escribano, M. A. F. Sanjuán Departamento de Física Universidad Rey Juan Carlos 8933 Móstoles, Madrid, Spain Email: francisco.escribano@ieee.org

More information

An Improved Sphere-Packing Bound for Finite-Length Codes over Symmetric Memoryless Channels

An Improved Sphere-Packing Bound for Finite-Length Codes over Symmetric Memoryless Channels An Improved Sphere-Packing Bound for Finite-Length Codes over Symmetric Memoryless Channels Gil Wiechman Igal Sason Department of Electrical Engineering Technion, Haifa 3000, Israel {igillw@tx,sason@ee}.technion.ac.il

More information

Noisy channel communication

Noisy channel communication Information Theory http://www.inf.ed.ac.uk/teaching/courses/it/ Week 6 Communication channels and Information Some notes on the noisy channel setup: Iain Murray, 2012 School of Informatics, University

More information

Low-density parity-check codes

Low-density parity-check codes Low-density parity-check codes From principles to practice Dr. Steve Weller steven.weller@newcastle.edu.au School of Electrical Engineering and Computer Science The University of Newcastle, Callaghan,

More information

IN this paper, we consider the capacity of sticky channels, a

IN this paper, we consider the capacity of sticky channels, a 72 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 1, JANUARY 2008 Capacity Bounds for Sticky Channels Michael Mitzenmacher, Member, IEEE Abstract The capacity of sticky channels, a subclass of insertion

More information

BASICS OF DETECTION AND ESTIMATION THEORY

BASICS OF DETECTION AND ESTIMATION THEORY BASICS OF DETECTION AND ESTIMATION THEORY 83050E/158 In this chapter we discuss how the transmitted symbols are detected optimally from a noisy received signal (observation). Based on these results, optimal

More information

Lecture 6 I. CHANNEL CODING. X n (m) P Y X

Lecture 6 I. CHANNEL CODING. X n (m) P Y X 6- Introduction to Information Theory Lecture 6 Lecturer: Haim Permuter Scribe: Yoav Eisenberg and Yakov Miron I. CHANNEL CODING We consider the following channel coding problem: m = {,2,..,2 nr} Encoder

More information

Nonlinear Codes Outperform the Best Linear Codes on the Binary Erasure Channel

Nonlinear Codes Outperform the Best Linear Codes on the Binary Erasure Channel Nonear odes Outperform the Best Linear odes on the Binary Erasure hannel Po-Ning hen, Hsuan-Yin Lin Department of Electrical and omputer Engineering National hiao-tung University NTU Hsinchu, Taiwan poning@faculty.nctu.edu.tw,.hsuanyin@ieee.org

More information

REED-SOLOMON CODE SYMBOL AVOIDANCE

REED-SOLOMON CODE SYMBOL AVOIDANCE Vol105(1) March 2014 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 13 REED-SOLOMON CODE SYMBOL AVOIDANCE T Shongwe and A J Han Vinck Department of Electrical and Electronic Engineering Science, University

More information