An Upper Bound on the Minimum Distance of Serially Concatenated Convolutional Codes

Size: px
Start display at page:

Download "An Upper Bound on the Minimum Distance of Serially Concatenated Convolutional Codes"

Transcription

1 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY An Upper Boun on the Minimum Distance o Serially Concatenate Convolutional Coes Alberto Perotti, Member, IEEE, an Sergio Beneetto, Fellow, IEEE Abstract This paper presents an upper boun on the minimum istance o serially concatenate convolutional coes with interleaver employing rate k 0/n 0 constituent encoers. The resulting expression shows that their minimum istance cannot grow more than approximately K 1 1/(O), where K is the inormation wor length, an (O) is the ree istance o the outer coe. This result can also be applie to serial concatenations where the outer coe is a linear block coe. The obtaine upper boun is shown to agree with an, in some cases, improve over previously known results. Inex Terms Serial, concatenate, convolutional, minimum istance, combinatorial, perormance bouns. I. INTRODUCTION Serially concatenate convolutional coes with interleaver [1] are known to perorm better than parallel turbo coes in the error loor region [2]. However, when heavy puncturing is applie to obtain higher coe rates, it is not uncommon to observe a signiicant error loor. In orer to estimate the error probability in such a region, the minimum istance is a crucial parameter. In this paper, a metho to obtain an upper boun on the minimum istance o serially concatenate convolutional coes is escribe. The present result also applies to serial concatenations where the outer coe is a linear block coe in general. Moreover, it can be applie to rate k 0 /n 0 general convolutional constituent coes. Results on the minimum istance o serially concatenate coes have been presente in [3] an [4]. Both papers show an exponential epenence o the minimum istance on the block length: in [3] the exponent epens on the minimum istance o the outer coe, while, in [4], it epens on the memory an rate o the outer encoer. Our result, although similar to the cite ones, improves over [4], where a broaer class o constituent encoers is consiere. Moreover, it is coherent with [3]. The metho use here to erive the upper boun has been inspire by that use in [5] an [6] to obtain an upper boun on the minimum istance o parallel turbo coes. Alberto Perotti an Sergio Beneetto are with the Center or Multimeia Raio Communications at Politecnico i Torino, Torino (Italy).

2 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY Sec. II summarizes the previously known results an Sec. III escribes the coing scheme use as a reerence in orer to erive the boun. In Sec. IV the upper boun is erive. Finally, in Sec. V the obtaine upper boun is applie to ierent coing schemes an compare with the previously known results. In the ollowing, we will interchangeably use the ollowing notations or symbol vectors: v = {v i, i = 0,..., N 1} v(d) = II. KNOWN UPPER BOUNDS Result on the minimum istance o serially concatenate coes have been presente in [3] an [4]. In [4], the general class o nonlinear constituent encoers is consiere. These encoers are characterize by a state-transition graph. Each state transition correspons to k 0 = 1 input bits an n 0 output bits. From [4], Theorem 4, the minimum istance obeys the ollowing boun: [ min (BMS) min = 3 n (O) 0 ] 2 ( ) (I) n 0 ν (O) + 2 K 1 1 n (O) N 1 i=0 v i D i. 0 (ν (O) +2) [ ν (I)] 1 n (O) 0 (ν (O) +2) (1) where quantities relate to the outer (inner) encoer are ientiie by a ( ) (O) (equivalently, ( ) (I) ) superscript, the ν parameter is the number o memory bits o the constituent encoers, an K is the inormation wor length. In [3], Theorem 2, an asymptotic result is presente as an average over the set o all serially concatenate coes: { P N } min (C) < N 1 2/(O) { P min (C) > N 1 2/(O) N } = 0 (2) = 0 (3) where N is the coewor length. We can eine the asymptotic minimum istance o serially concatenate convolutional coes as where (O) (KU) min 1 2/(O) N (4) is the ree istance o the outer encoer. This result, while giving the average behavior o the minimum istance, oes not provie inormation on the largest achievable minimum istance. III. REFERENCE CODING SCHEME We consier the serial concatenation o recursive, systematic convolutional coes o rate k 0 /n 0 (see Fig. 1 an Fig. 2). The two constituent encoers are connecte through an interleaver which reorers the outer coewor bits accoring to the permutation Π : i π i, i = 0,..., K (I) 1, where K (I) is the interleaver length. A sequence o K (O) inormation bits enters the outer encoer CC (O). The sequence generate by CC (O) is puncture an an outer coewor o length N (O) = K (I) bits is prouce. The outer coewor is permute by the interleaver an sent to the inner encoer CC (I), which generates, ater puncturing, an inner coewor o length

3 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY N (I) bits. Ater the input symbols have been processe, each constituent encoer is terminate by aing ν trellis steps an orcing its state to zero. ig/sccc.eps Fig. 1. Serially concatenate encoer. The outer coe is the set o outer coewors resulting rom the operations o outer encoing (CC (O) ) an outer puncturing (P UNCT (O) ): Moreover, we eine C (O) = {c k }, k = 0,..., 2 K(I) 1. C (O) C (O), C (O) = {c C (O) : w H (c) = } i.e., C (O) is the subset o outer coewors with Hamming weight. A. Constituent encoers We eine a recursive convolutional encoer o rate k 0 /n 0 as a evice which processes a sequence o K symbols o k 0 bits proucing a sequence o K +ν symbols o n 0 bits. The evice is characterize by the ollowing equations: c i = Fs i Gu i (5) s i+1 = Hu i Ls i where F, G, H an L are matrices corresponing to the encoer connections, an u i, s i an c i inicate the inormation symbol, encoer state an coe symbol at time instant i. Fig. 2 shows the scheme o a rate k 0 /n 0 recursive convolutional encoer. It is worth noting that this moel is a generalization o both systematic recursive encoers an rate 1/n 0 convolutional encoers. It coul also be consiere as a generalization o puncture recursive encoers, when the puncturing pattern is perioic, but here we will consier puncturing as a separate unction. The eeback connections, corresponing to vector L, are here eine accoring to primitive polynomials over GF (2 ν ) [7]. This results in the ollowing property: i the encoer state at time instant i is s i, an the input sequence u j = 0, j = i,..., i + p, then s i+p = s i, where p is the perio o the convolutional encoer. A primitive eeback polynomial results in a perio p = 2 ν 1. Inee, non-primitive polynomials can be consiere as well, but the corresponing encoers eature shorter perios. This property is exploite in the ollowing lemma. Lemma 1: An inormation sequence o type:

4 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY ig/rsc-kn.eps Fig. 2. Rate k 0 /n 0 recursive convolutional encoer. u(d) = u 0 (D)(D k0i + D k0(i+jp) ) i.e., the same inormation symbol is repeate twice at ierent time instants (u i = u i+jp = u 0 ), results in a single error event o length jp + 1 trellis steps. Proo: We assume that the encoer is initialize by orcing the initial state s 0 = 0 ν. Thereore: s 0 =... = s i = 0 ν. By applying (5) at time instant i: c i = Gu 0 (6) s i+1 = Hu 0 Now, moving to instant i + jp, an consiering that u l = 0, l = i + 1,..., i + jp 1: c i+jp = Fs i+jp (7) s i+jp+1 = Hu i+jp Ls i+jp = Hu 0 Ls i+jp Consiering that, or the mentione property o primitive-eeback encoers, Ls i+jp = s i+1, rom (6): s i+jp+1 = 0 ν (8) Thereore, the number o states 0 ν is i + jp i = jp, an the number o trellis steps o the error event is jp + 1. An upper boun to the minimum istance o serially concatenate convolutional coes is erive by assuming that the constituent encoers are ixe, an consiering the set o all permutations: where C C is a subset o the coewors o the concatenate coe. m max min w H(c) (9) Π c C

5 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY We begin our erivation by analyzing the characteristics o the outer encoer an puncturer. Although the main part o our erivation is perorme inepenently o the outer coe type (the only requirement is linearity), the assumption that the outer coe is convolutional (an, eventually, recursive an systematic) allows to better highlight the epenence o the minimum istance on the block length. The cascae o the recursive convolutional encoer an the puncturer can be consiere as a perioic evice, an the resulting perio is an integer multiple o the puncturing perio an n 0 (LCM(p q, n 0 )). This is mae clear in the ollowing Theorem 1. Theorem 1: Let C be the coe generate by a rate k 0 /n 0 recursive convolutional encoer whose output is puncture accoring to the puncturing sequence q. Let p q be the perio o the puncturing sequence, an p = LCM(p q, n 0 ). Let w be the Hamming weight o any subsequence 1 o q with length p. Then: c(d) C ( ) D jw c(d) C, i m w j < N i M w (10) where N is the coewor length an: i M (c) = sup{i : c i = 1} (11) i m (c) = in{i : c i = 1}. (12) In other wors, i a coewor c(d) = N 1 i=0 c id i belongs to the outer coe, all its shits o multiples o w positions belong to the outer coe as well, provie that the coewor bounaries are not crosse. Proo: Consier a rate k 0 /n 0 convolutional encoer CC. When the inormation wor u(d) is sent to the encoer, the output coewor is CC[u(D)] = c(d). It is easy to prove that: CC[D sk0 u(d)] = D sn0 c(d), s Z : 0 ĩ m + sn 0 ĩ M + sn 0 < Ñ where Ñ is the coewor length beore puncturing, an The puncturing operation is perorme in the ollowing way: ĩ M (c) = sup{i : c i = 1} (13) ĩ m (c) = in{i : c i = 1}. (14) c(d) q(d) i M c i q i D i an the symbols corresponing to q i = 0 are einate. Now, eine p = LCM(n 0, p q ): i=i m 1 We eine here a subsequence o a sequence p as a subset o contiguous elements o p.

6 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY since p is an integer multiple o p q. ( D p c(d) ) q(d) = = ĩ M +p i=ĩ m+p c i p q i D i ĩ M i=ĩ m c i q i+p D i+p = D p c(d) q(d) In orer to complete our proo, consier that the symbols corresponing to q i = 0 are iscare, thereore any subsequence o p symbols in c(d) q(d) is reuce to w symbols, then a shit o p positions beore puncturing correspons to a shit o w positions ater puncturing. This proves (10). A irect consequence o Theorem 1 is the ollowing corollary, where we etermine the number o coewors in C resulting rom shits o a given coewor c. Corollary 1: Shiting a coewor o multiples o w positions to obtain another coewor is subject to the ollowing constraints: i M + jw < N i m + jw 0 j Z : i m w j < N i M w. (15) Thereore, given a coewor c C, there are at least n c coewors in C that can be obtaine by shiting c by multiples o w positions, where: n c N i M (c) w + i m(c) w where γ c = 1/(R C w ), an R C = K/N is the coe rate. 1 = N w i M (c) i m (c) w 1 = γ c K γ 0,c (16) In the ollowing corollary, we count the number o coewors with given Hamming weight w. Corollary 2: Let n w be the number o coewors with Hamming weight w in C. The ollowing inequality hols: n w K γ c γ 0,c (17) c:w H (c)=w c:w H (c)=w = Kγ w γ 0,w (18) where K is the length o the inormation wor, an γ w an γ 0,w epen on the encoer connections an puncturing sequence. Corollary 2 is particularly useul in our erivation when use to count the number o nearest neighbors, i.e., when w =. Tables I to III show values o (γ w, γ 0,w ) or ierent recursive systematic convolutional encoers an various coe rates obtaine by puncturing. The rate o the consiere mother constituent encoers is 1 / 2. Moreover, each encoer is characterize by its eeback an eeorwar connections: commonly, the connections

7 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY are expresse as a ratio o octal numbers, where the numerator reers to the eeorwar branch an the enominator reers to the eeback branch. As an example, the encoer o Fig. 3 is eine by 15 8 /13 8. TABLE I VALUES OF (γ w, γ 0,w ) FOR THE 5 8 /7 8 (ν = 2) ENCODER. DIFFERENT CODE RATES ARE OBTAINED BY PUNCTURING. R\w ( ) 1/ , 3 (2, 7) 2 ( 2/3-1 2, 0) ( 2, 22 ) ( ) ( ) 3 7, , ( 3/4-4 3, 3) ( 32 3, 99) ( 100 3, 383) - ( 6/7 5 6, 41 ) ( , 449 ) ( , 2763 ) ( ) ( 7/8 1, , 89) ( 43, 4243 ) TABLE II VALUES OF (γ w, γ 0,w ) FOR THE 15 8 /13 8 (ν = 3) ENCODER OF FIG. 3. DIFFERENT CODE RATES ARE OBTAINED BY PUNCTURING. R\w / (2, 8) 2/3 - - ( 3 2, 22 ) 3 ( 9 2, 95 ) 3 ( 31 2, 162) 3/4 - ( 2 3, 9 ) ( , 101 ) 4 (17, 183) - 6/7 ( 1 2, 25 ) ( ) ( 7 3, , 2259 ) /8 ( 4 7, 5) ( 30 7, 163 ) ( , 1441 ) TABLE III VALUES OF (γ w, γ 0,w ) FOR THE 35 8 /23 8 (ν = 4) ENCODER. DIFFERENT CODE RATES ARE OBTAINED BY PUNCTURING. R\w / (2, 11) 2/3 - - ( 1 2, 1) (0, 0) ( 27 2, 377 ) 3-3/4 - ( 1 3, 3 ) ( 2, 69 ) 4 ( 34 3, 131) - 6/7 7/8 ( ) ( 2, , 913 ) ( , 656) - - ( 1 7, 9 ) ( , 26) ( 104 7, 369 ) The analysis perorme in Theorem 1 an ollowing corollaries will be use in our erivation to characterize the outer coe. The inner encoer is characterize ollowing the work carrie out in [8] an extene in [9].

8 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY ig/rsc8.eps Fig. 3. Recursive convolutional encoer (15 8 /13 8 ). Lemma 2: Let CC be a puncture rate k 0 /n 0 recursive convolutional encoer with memory ν an perio p = 2 ν 1. I the inormation wor u is o the ollowing type: u(d) = D k0i + D k0(i+jp) the ollowing inequality hols: w H [CC(u)] αj + β (19) where α an β epen on the encoer connections, memory an puncturing sequence. Proo: A proo o this lemma is a irect consequence o Lemma 1 when u 0 (D) = D m, 0 m < k 0, i.e., the consiere symbol u 0 has Hamming weight 1. Table IV reports values o α an β or various memory values an rates or a rate 1/2 puncture recursive systematic convolutional encoer with memory ranging rom 2 bits to 4 bits. The consiere puncturing sequence is perioic: the systematic bits are never puncture, while the coe bits are puncture accoring to the ollowing sequence: which results in a rate l/(l + 1) encoer. q(d) = K 1 i=0 K/l 1 D 2i + j=0 D 1+jl (20) Finally, in orer to complete the characterization o the inner encoer, we eine its bit perio as: k 0 (2 ν 1). (21) It ollows rom Lemma 1 that an input wor o type u(d) = D i + D i+jp(i) j/k 0 trellis steps. results in a single error event o length IV. THE UPPER BOUND The upper boun on the minimum istance ollows in Theorem 2.

9 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY ν Connections p R 1/2 2/3 3/4 6/7 7/ / ,2 1,2 1,2 1,2 1, / ,2 2,2 2,2 1,2 1, / ,2 5,2 4,2 3,2 2,2 TABLE IV PARAMETERS α, β OF THE CONSIDERED INNER ENCODERS. THE CONNECTIONS COLUMN SHOWS THE FEEDFORWARD AND FEEDBACK CONNECTIONS OF THE CONVOLUTIONAL ENCODERS. Theorem 2: The minimum istance o a serially concatenate convolutional coe satisies the ollowing inequality: m min (O) w K (I) [α M (w) + (2 + β)w] (22) where α an β erive rom the characterization o the inner encoer perorme in Lemma 2, an M (w), whose meaning will be clariie in the proo, is: { { K (I) } 1 M (w) sup 0,..., w : (γ wk (O) γ 0,w ) w δ w w! [ K (I) 1 ] w } + provie that δ w w! < γ w K (O) γ 0,w. In (23), K (O) is the inormation wor length, γ w an γ 0,w characterize the outer encoer (see Theorem 1 an relate corollaries, an Tables I to III), an (23) ( w + ) 1 δ w = w is the number o istinct unorere sets o w elements rawn rom a set o elements. Proo: For the proo o this theorem, see Appenix I. From the inequality in the RHS o (23) we erive the ollowing constraint on K (O) : (24) K (O) K (O) = δ ww! + γ 0,w γ w (25) Otherwise, M (w), an the upper boun becomes useless. Since w 2, this constraint also inclues the one eriving rom (39) in Appenix I, which results in Table V shows the values o K (O) K (O) > δ w + γ 0,w γ w. or ierent coing schemes. K(O) is generally low or high-rate coes, but it becomes unacceptably large or low-rate coes an large memory o the constituent encoers.

10 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY VALUES OF K (O) (THEOREM 2), K (O) TABLE V (THEOREM 3) AND K (O) (THEOREM 4) FOR DIFFERENT CODING SCHEMES. Outer coe rate Outer mother Inner encoer K (O) (ater puncturing) encoer connections perio: K (O) K (O) 1/2 5 8 / , /4 5 8 / /7 5 8 / / / , ,572 3/ / ,012 6/ / / / ,025,606 58,146 7,441,926 3/ / ,250 2,050 16,330 6/ / Another rawback o Theorem 2 is the lack o a close-orm solution or the minimum istance o the coe. The ollowing Theorem 3 provies in general a slightly looser upper boun in close-orm with a weaker itation on K (O). Theorem 3: The minimum istance o a serially concatenate convolutional coe satisies the ollowing inequality: m min (O) w K (I) [α M (w) + (2 + β)w] (26) where α an β erive rom the characterization o the inner encoer perorme in Lemma 2, an M (w) 2 where δ w has been eine in Theorem 2. [ K (I) ] w 1 w [ w!δ w R (O) C γ w γ 0,w /K (I) Proo: The proo o this theorem partially coincies with that o Theorem 2 (see Appenix I up to (55)). [ ] w: Consier now the intersection between a sphere U (c) an the region S K = 0, (I) 1 U (c) [ K (I) 1 0, ] w ] 1 w (27) 1 2 w V w() c C (O) w (28) This inequality correspons to the case where c coincies with a vertex o S. In this case, the intersection between U (c) an S ixes the signs o the w coorinates o U (c). Since there are w coorinates, an U eatures symmetry with respect to origin, we can compute the volume o such intersection in a way similar to Appenix II. The only

11 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY ierence is that we compute each o the w integrals on an interval which is hal the size, thereore we obtain a actor o 1/2 w. This result allows to rewrite (57) in Appenix I in a slightly ierent way: (γ w K (O) γ 0,w ) δ w which, ater ew rearrangements, results in (27). w M K (I) w [ ] w! 2 w 1 K (I) w (29) A constraint eriving rom (39) in Appenix I results in Table V shows the values o K (O) coes. K (O) > K (O) = δ w + γ 0,w γ w. or ierent coing schemes. K (O) is signiicantly lower than K(O) or low-rate By constraining w = (O), Theorem 3 allows to highlight the asymptotic behavior o the minimum istance with the block length: since m (C) N N = 0 where N = R (O) C K (I), we can state that serially concatenate convolutional coes are asymptotically ba, in the traitional meaning o this statement [10]. A. A thir version o the upper boun A urther observation on the position o coewors in the region S allows to erive the ollowing theorem. Theorem 4: The minimum istance o a serially concatenate convolutional coe satisies the ollowing inequality: m min [α (O) M (w) + (2 + β)w] (30) q K (I) where α an β erive rom the characterization o the inner encoer perorme in Lemma 2, an provie that M(w) [ K (I) ] w 1 w [ w!δ w 2 w 1 R (O) C γ w (γ 0,w + (2 w 1 )δ w )/K (I) ] 1 w (31) an δ w has been eine in Theorem 2. Proo: γ w K (O) γ 0,w δ w 2 w (32) This theorem is erive by consierations similar to those o Theorem 3. In aition, we note that the region S has 2 w vertices. Suppose there are 2 w spheres with centers in such vertices. Their intersection with

12 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY S is V w ()/2 w. Moreover, the remaining spheres intersect S eining a region whose volume is V w ()/2 w 1. Thereore: [ 2 w w M w! 2 w + γw K (O) ] γ 0,w 2 w w M K (I) w [ ] δ w w! 2 w 1 1 K (I) w (33) which, ater ew rearrangements, results in (31). Similarly to Theorem 2, the constraint (32) results in a range o inormation wor lengths where Theorem 4 hols: K (O) K (O) = 2w δ w + γ 0,w γ w. As in Theorem 2, this constraint inclues the one eriving rom (39) in Appenix I. Table V shows the values o K (O) or ierent coing schemes. Comparing the 3 rightmost columns, we see that Theorem 2 results in the narrower range o inormation wor lengths, while Theorem 3 provies the wier range an Theorem 4 results in an intermeiate range. Moreover, we note that the stronger itation o Theorem 2 correspons to a generally tighter boun, while the weaker itation o Theorem 3 correspons to a looser boun. Finally, Theorem 4 eatures intermeiate values. Since the computation o (23), (27) an (31) might be impractical ue to the large number o values to be consiere or w, we provie a simpliication in the ollowing corollary. Corollary 3: The minimum istance o a serially concatenate convolutional coe satisies the ollowing inequality: m α M ( (O) ) + (2 + β) (O). ( ) (34), rom (27) where M can be substitute with M, M or M accoring to the use boun. By computing M we obtain: [ K M ( (O) (I) ]1 1 (O) ) 2 R (O) C γ (O) (O)!δ (O) γ 0, (O) /K (I) where the exponential relationship between the coewor length an the ree istance o the outer coe is evient. Here, the set over which we perorm the minimization o (22) has been restricte to the lowest possible value w = (O). A reason or this choice is that, or low values o w, the computation o the γ w parameters relative to the outer encoer is easier ue to the low number o error events with Hamming weight (O). Another reason or restricting the range o values or w to (O) w = (O) results in the lowest value o K (O). 1 (O) (O) (35) is the constraint on K (O) given in (25). In act,

13 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY ig/chart_342_232.eps ig/chart_122_122.eps (a) Rate 1/4. Outer coe rate: 1/2; inner coe rate: 1/2; number o states: 4. (b) Rate 1/2. Outer coe rate: 3/4; inner coe rate: 2/3; number o states: 4. ig/chart_343_233.eps ig/chart_672_782.eps (c) Rate 3/4. Outer coe rate: 7/8; inner coe rate: 6/7; number o states: 4. () Rate 1/2. Outer coe rate: 3/4; inner coe rate: 2/3; number o states: 8. Fig. 4. in (). Results. The constituent encoers are both 4-state systematic recursive convolutional encoers in (a), (b) an (c), an 8-state encoers B. Extension to general linear outer coes The result o Theorem 2 an successive theorems can be extene to the case where a general linear block coe is employe as the outer coe. In act, the convolutional nature o the outer coe has been use only in Theorem 1 an ollowing corollaries to relate the number o coewors with given Hamming weight to the inormation wor length K. I a linear block coe is employe as the outer coe, in orer to apply the upper boun it is suicient to in the number o coewors with Hamming weight w or some w (O). V. RESULTS Some results have been obtaine or coing schemes consisting o the serial concatenation o two recursive systematic convolutional encoers. Both encoers are puncture to obtain variable coing rates. Results have been obtaine by using the simpliie result o Corollary 3 applie to Theorem 2, Theorem 3 an Theorem 4. Our results have been compare with the well known Singleton boun an Gilbert-Varshamov boun [11, ch. 10]. Moreover, the result o [3], Theorem 2 has been reporte in the charts. Finally, the result presente in [4], Theorem 4 has also been reporte. Since this result reers to rate 1/n 0 constituent encoers, here it has been extene to the case rate k 0 /n 0 constituent encoers by replacing n 0 with n 0 /k 0.

14 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY ig/chart_nu.eps Fig. 5. Results or increasing number o states o the constituent encoers. Overall coe rate: 1/2; outer coe rate: 3/4; inner coe rate: 2/3. ig/chart_w.eps Fig. 6. Results or w = (O) to w = (O) + 2. Overall coe rate: 1/2; outer coe rate: 3/4; inner coe rate: 2/3; number o states: 8. Fig. 4 shows the obtaine results compare to some previously known results on linear block coes an serially concatenate coes. The chart shows that our result improves over the Singleton boun an even over the Gilbert- Varshamov boun, which is an existence boun on the minimum istance o linear block coes. As expecte, the Kahale-Urbanke result [3], which is an average result over the set o all the serially concatenate coes with given coewor length an outer ree istance, is always lower than our results. In particular, when (O) we have (KU) min = 1. = 2 (as in 4(c)), Fig. 5 shows the upper boun or a rate 1/2 coe (rate 3/4 outer coe an rate 2/3 inner coe) with increasing number o states. As expecte, a larger number o states results in a larger upper boun an in a reuce range o inormation wor sizes. This is a irect consequence o the act that a larger number o states results in a larger ree istance o the constituent encoers. Fig. 6 shows the upper boun o Theorem 4 or a rate 1/2 coe (rate 3/4, 8-state outer coe an rate 2/3, 8-state inner coe). The boun has been compute or increasing values o w, starting rom w = (O). The chart shows that the best result is obtaine or w = (O). VI. CONCLUSION We have presente an upper boun on the minimum istance o serially concatenate convolutional coes with interleaver employing rate k 0 /n 0 constituent encoers. The result shows that the minimum istance cannot grow

15 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY more than a power o the inormation wor length, where the exponent is approximately 1 1 (O), where (O) the ree istance o the outer coe. This result can be easily extene to serial concatenations where the outer coe is a linear block coe. Improvements over the previously known results have been shown. is Given the set o inices at the interleaver output: APPENDIX I PROOF OF THEOREM 2 I = {ι i }, i = 0,..., K (I) 1 we eine a partition o I in parts I j, j = 0,..., 1 corresponing to the resiue classes mo : ι i I j i mo = j, j = 0,..., 1 (36) an we reer to these parts as the inner classes o I. Clearly: Consier the set C (O) w K (I) K (I) I j, j = 0,..., 1. o outer coewors whose Hamming weight is w. For each o the coewors c C (O) w, we eine a label L(c) consisting o an unorere set o integers eine as ollows: L(c) = {i mo, i : (Π(c)) i = 1} where (Π(c)) i inicates the i + 1-th element o the permute outer coewor Π(c). There are exactly ( w + ) 1 δ w = w ierent values or L(c), i.e., the number o unorere combinations o w elements rawn rom a set o elements with repetition. As a irect consequence o the pigeonhole principle [12, ch. 2], we can state that: L : C (O) w,l C w (O) where C (O) is the set o outer coewors with Hamming weight w an label L. w,l I δ w w! < C w (O) : L : C (O) 2 (39) w,l Now pick at ranom two coewors c 1 an c 2 C (O) w,l. Since we assume that the outer coe is linear, c 1 c 2 C (O) (where inicates the moulo-2 sum). Since c 1 an c 2 have equal labels, Π(c 1 c 2 ) eatures an even number δ w (37) (38)

16 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY ig/classes.eps Fig. 7. Classiication o inices at the input o the inner encoer ( = 3). Two outer coewors with Hamming weight w = 3 an equal label generate short inner error events. o 1 in each inner class (in act, the label values inicate to which inner class each 1 belongs ater interleaving). This situation is shown in Fig. 7. I we make the urther assumption that the values in labels L(c 1 ) an L(c 2 ) are all ierent: L j (c i ) L k (c i ), i = 1, 2, j, k {0,..., w 1}, j k (40) we can state that v = Π(c 1 c 2 ) results in exactly two 1 in each inner class. This assumption results in a simpler calculation o the boun; moreover, as we will see later, it oes not invaliate our result. We can then write the input wor to the inner encoer v as the moulo-2 sum o w wors : v = w 1 i=0 v i where the symbol inicates a moulo-2 summation, an v i contains ones only in positions belonging to the same inner class: Clearly: v i = D ji + D ji+kip(i), i = 0,..., w 1. (41) w H (v i ) = 2, i = 0,..., w 1 an CC (I) (v i ) consists o a single error event o length k i + 1 trellis steps. Since the inner coe is linear, the inner coewor (beore inner puncturing) is w = CC (I) (v) = w 1 i=0 CC(I) (v i ) (42)

17 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY an its weight is w H (w) This is a consequence o the triangle inequality: w 1 i=0 ) w H (CC (I) (v i ) (43) w H (a b) w H (a) w H (b). In orer to evaluate this upper boun, we must in an approximation or the RHS o (43). From (41), applying Lemma 2: Thereore, rom (43) we obtain: ) w H (CC (I) (v i ) αk i + β + w H (v i ) (44) which can be evaluate i the quantities k i are known. w 1 w H (w) w(β + 2) + α k i (45) A urther step in our proo is perorme by consiering that each outer coewor whose Hamming weight is w can be represente as a point in a w-imensional space S R w with each imension corresponing to one label value L i (c). To this purpose, we eine the ollowing set o inices: i=0 (Π[c]) J c = {j 0,..., j w 1 } : ji = 1, i = 0,..., w 1 j i mo j i+1 mo, i = 0,..., w 2 (46) where the sign can be substitute with < i c satisies (40). We associate to this outer coewor the ollowing set o coorinates: s(c) = { ji, j i J c } (47) which etermines the position o point s S. It is worth noting that the permutation etermines the position o points s(c) since it is involve in the einition o J c. We eine the istance between two points s 1 an s 2 in S using the l 1 -norm: s(c 1 ) s(c 2 ) 1 w 1 i=0 s i (c 1 ) s i (c 2 ) = Using einition (48), we can reormulate (45) in the ollowing way: w 1 i=0 k i (48) w H (w) w(β + 2) + α s(c 1 ) s(c 2 ) 1 (49)

18 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY Thereore, the problem o maximizing (9) over all the permutations, reuces to ining the maximum allowable minimum istance between any two points in S corresponing to ierent outer coewors. This task can be easily accomplishe ater some consierations: the coorinates o the points associate to the outer coewors are K (I) 1 0 s i hence these point lie in a rectangular region S S whose volume is: (50) K S (I) w 1 = (51) Using the mentione einition o istance, we eine the sphere o iameter centere in point s(c) as the region U (c) = { p S : s(c) p 1 } 2 (52) Fig. 8 shows a sphere in S. ig/sphere.eps Fig. 8. A sphere in l 1 -norm (w = 2). Given two outer coewors c 1 an c 2, each surroune by a sphere U (c i ), i = 1, 2, we can state that: U (c 1 ) U (c 2 ) p U (c 1 ) U (c 2 ) : p s(c i ) 1 /2, i = 1, 2 (53) an, rom the triangle inequality applie to l 1 norm: s(c 1 ) s(c 2 ) 1 s(c 1 ) p 1 + p s(c 2 ) 1 = (54)

19 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY Suppose now that the points s(c), c C (O) satisy the ollowing istance constraint or a given value o : w,l s(c 1 ) s(c 2 ) 1 > U (c 1 ) U (c 2 ) =, c 1, c 2 C (O) w,l. (55) Otherwise, rom (53) an (54), the istance between s(c 1 ) an s(c 2 ) woul be. Consiering that c C (O) w,l we can erive an upper boun on the value o : where V w () is the volume o U. Applying (17) an (38), we obtain: C (O) w,l C (O) w,l [ K (I) w 1 U (c) + ] (56) [ K (I) 1 V w () n(o) w δ w K(O) γ w (O) an, consiering that the spheres are isjoint, we can rewrite (57) as ollows: n (O) w V w () δ w [ K (I) 1 where V w () = w /w! is the volume o U (see Appenix). + ] w (57) γ (O) 0,w (58) δ w + ] w (59) In orer to complete our proo, we must show that our result is vali even when the consiere label value L has two or more equal elements, i.e., constraint (40) is not satisie. In this case, i two label elements are equal, the number o involve inner classes reuces rom w to w 1, thereore we shoul perorm our erivation on a (w 1)-imensional space. However, we can assign at ranom the coewor bits corresponing to equal label values to ierent coorinates an hence obtain the w inner inormation wors v i o (42) an (43). Then or the linearity o the inner coe, the remaining part o the proo remains unchange. This consieration implies the valiity o our result also when w >. APPENDIX II VOLUME OF THE SPHERE IN l 1 -NORM The region U (n) (p) R n eine by the ollowing inequality: x 1 + x x n /2 is the n-imensional sphere o iameter with center in p. The volume o U (n) is:

20 SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY, FEBRUARY V (n) Proo: The problem o computing the volume V (n) = n n! (60) o U (n) can be solve recursively. Clearly, when n = 2: We will prove the ollowing recursive expression: V (2) = 2 2. We have: V (n) = V n 1 n. an this proves the result. V (n) = 2 = 2 /2 0 /2 0 V (n 1) ( 2z)z ( 2z) n 1 z (n 1)! = 1 [ 2z]/2 0 = n n! n! (61) REFERENCES [1] S. Beneetto, D. Divsalar, G. Montorsi, an F. Pollara, Serial concatenation o interleave coes: Perormance analysis, esign an iterative ecoing, IEEE Transactions on Inormation Theory, vol. 44, no. 3, pp , May [2] R. Garello, P. Pierleoni, an S. Beneetto, Computing the ree istance o turbo coes an serially concatenate coes with interleavers: Algorithms an applications, IEEE Journal on Selecte Areas in Communications, vol. 19, no. 5, pp , May [3] N. Kahale an R. Urbanke, On the minimum istance o parallel an serially concatenate coes, submitte to IEEE Transactions on Inormation Theory. [Online]. Available: rueiger/papers/weight.ps [4] L. Bazzi, M. Mahian, an D. Spielman, The minimum istance o turbo-like coes. [Online]. Available: mahian/tc3.ps [5] M. Breiling an J. B. Huber, Upper boun on the minimum istance o turbo coes, IEEE Transactions on Communications, vol. 49, no. 5, pp , May [6], Combinatorial analysis o the minimum istance o turbo coes, IEEE Transactions on Inormation Theory, vol. 47, no. 7, pp , Nov [7] S. Beneetto an G. Montorsi, Design o parallel concatenate convolutional coes, IEEE Transactions on Communications, vol. 44, no. 5, pp , May [8] M. Breiling an J. B. Huber, A logarithmic upper boun on the minimum istance o turbo coes. [Online]. Available: breiling/research/publications/bre01b.p [9] A. Perotti an S. Beneetto, A new upper boun on the minimum istance o turbo coes. [Online]. Available: [10] N. J. A. Sloane an F. J. MacWilliams, The Theory o Error-Correcting Coes. Amsteram: North-Hollan, [11] S. Beneetto an E. Biglieri, Principles o Digital Transmission with Wireless Applications. New York: Kluwer Acaemic/Plenum Publishers, [12] N. L. Biggs, Discrete Mathematics. Oxor: Oxor Science Publications, 1987.

Permanent vs. Determinant

Permanent vs. Determinant Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an

More information

Space-time Linear Dispersion Using Coordinate Interleaving

Space-time Linear Dispersion Using Coordinate Interleaving Space-time Linear Dispersion Using Coorinate Interleaving Jinsong Wu an Steven D Blostein Department of Electrical an Computer Engineering Queen s University, Kingston, Ontario, Canaa, K7L3N6 Email: wujs@ieeeorg

More information

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Lecture XII. where Φ is called the potential function. Let us introduce spherical coordinates defined through the relations

Lecture XII. where Φ is called the potential function. Let us introduce spherical coordinates defined through the relations Lecture XII Abstract We introuce the Laplace equation in spherical coorinates an apply the metho of separation of variables to solve it. This will generate three linear orinary secon orer ifferential equations:

More information

Lecture 12: November 6, 2013

Lecture 12: November 6, 2013 Information an Coing Theory Autumn 204 Lecturer: Mahur Tulsiani Lecture 2: November 6, 203 Scribe: Davi Kim Recall: We were looking at coes of the form C : F k q F n q, where q is prime, k is the message

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

A Short Note on Self-Similar Solution to Unconfined Flow in an Aquifer with Accretion

A Short Note on Self-Similar Solution to Unconfined Flow in an Aquifer with Accretion Open Journal o Flui Dynamics, 5, 5, 5-57 Publishe Online March 5 in SciRes. http://www.scirp.org/journal/oj http://x.oi.org/.46/oj.5.57 A Short Note on Sel-Similar Solution to Unconine Flow in an Aquier

More information

ERROR-detecting codes and error-correcting codes work

ERROR-detecting codes and error-correcting codes work 1 Convolutional-Coe-Specific CRC Coe Design Chung-Yu Lou, Stuent Member, IEEE, Babak Daneshra, Member, IEEE, an Richar D. Wesel, Senior Member, IEEE arxiv:1506.02990v1 [cs.it] 9 Jun 2015 Abstract Cyclic

More information

Product and Quotient Rules and Higher-Order Derivatives. The Product Rule

Product and Quotient Rules and Higher-Order Derivatives. The Product Rule 330_003.q 11/3/0 :3 PM Page 119 SECTION.3 Prouct an Quotient Rules an Higher-Orer Derivatives 119 Section.3 Prouct an Quotient Rules an Higher-Orer Derivatives Fin the erivative o a unction using the Prouct

More information

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels.

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels. Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Constraine Coes for Two-Dimensional Channels Keren Censor Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Technion

More information

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Coes Kaiann Fu an Achilleas Anastasopoulos Electrical Engineering an Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

Shifted Independent Component Analysis

Shifted Independent Component Analysis Downloae rom orbit.tu.k on: Dec 06, 2017 Shite Inepenent Component Analysis Mørup, Morten; Masen, Kristoer Hougaar; Hansen, Lars Kai Publishe in: 7th International Conerence on Inepenent Component Analysis

More information

VUMAT for Fabric Reinforced Composites

VUMAT for Fabric Reinforced Composites VUMAT or Fabric Reinorce Composites. Introuction This ocument escribes a constitutive mo or abric reinorce composites that was introuce in Abaqus/Exicit 6.8. The mo has been imemente as a built-in VUMAT

More information

A Sketch of Menshikov s Theorem

A Sketch of Menshikov s Theorem A Sketch of Menshikov s Theorem Thomas Bao March 14, 2010 Abstract Let Λ be an infinite, locally finite oriente multi-graph with C Λ finite an strongly connecte, an let p

More information

Differentiation Rules c 2002 Donald Kreider and Dwight Lahr

Differentiation Rules c 2002 Donald Kreider and Dwight Lahr Dierentiation Rules c 00 Donal Kreier an Dwigt Lar Te Power Rule is an example o a ierentiation rule. For unctions o te orm x r, were r is a constant real number, we can simply write own te erivative rater

More information

A DYNAMIC MODEL OF POLYELECTROLYTE GELS

A DYNAMIC MODEL OF POLYELECTROLYTE GELS A DYNAMIC MODEL OF POLYELECTROLYTE GELS M.CARME CALDERER, HAORAN CHEN, CATHERINE MICEK, AND Y. MORI Abstract. We erive a moel o the couple mechanical an electrochemical eects o polyelectrolyte gels. We

More information

Multi-edge Optimization of Low-Density Parity-Check Codes for Joint Source-Channel Coding

Multi-edge Optimization of Low-Density Parity-Check Codes for Joint Source-Channel Coding Multi-ege Optimization of Low-Density Parity-Check Coes for Joint Source-Channel Coing H. V. Beltrão Neto an W. Henkel Jacobs University Bremen Campus Ring 1 D-28759 Bremen, Germany Email: {h.beltrao,

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

Derivation of the fundamental traffic diagram for two circular roads and a crossing using minplus algebra and Petri net modeling.

Derivation of the fundamental traffic diagram for two circular roads and a crossing using minplus algebra and Petri net modeling. Derivation o the unamental traic iagram or two circular roas an a crossing using minplus algebra an Petri net moeling. N. Farhi, M. Goursat & J.P. Quarat Abstract The unamental iagram gives the relation

More information

Stability-Guaranteed Impedance Control of Hydraulic Robotic Manipulators

Stability-Guaranteed Impedance Control of Hydraulic Robotic Manipulators Tampere University o Technology Stability-Guarantee Impeance Control o Hyraulic Robotic Manipulators Citation Koivumäki, J., & Mattila, J. (217). Stability-Guarantee Impeance Control o Hyraulic Robotic

More information

Debond crack growth in fatigue along fiber in UD composite with broken fibers

Debond crack growth in fatigue along fiber in UD composite with broken fibers Debon crack growth in atigue along iber in UD composite with broken ibers Johannes Eitzenberger an Janis arna Dept o Applie Physics an Mechanical Engineering Lulea University o Technology, Sween SE 97

More information

inflow outflow Part I. Regular tasks for MAE598/494 Task 1

inflow outflow Part I. Regular tasks for MAE598/494 Task 1 MAE 494/598, Fall 2016 Project #1 (Regular tasks = 20 points) Har copy of report is ue at the start of class on the ue ate. The rules on collaboration will be release separately. Please always follow the

More information

Can Punctured Rate-1/2 Turbo Codes Achieve a Lower Error Floor than their Rate-1/3 Parent Codes?

Can Punctured Rate-1/2 Turbo Codes Achieve a Lower Error Floor than their Rate-1/3 Parent Codes? Can Puncture Rate-1/2 Turbo Coes Achieve a Loer Error Floor than their Rate-1/3 Parent Coes? Ioannis Chatzigeorgiou, Miguel R. D. Rorigues, Ian J. Wassell Digital Technology Group, Computer Laboratory

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

2.3 Product and Quotient Rules and Higher-Order Derivatives

2.3 Product and Quotient Rules and Higher-Order Derivatives Chapter Dierentiation. Prouct an Quotient Rules an Higher-Orer Derivatives Fin the erivative o a unction using the Prouct Rule. Fin the erivative o a unction using the Quotient Rule. Fin the erivative

More information

Acute sets in Euclidean spaces

Acute sets in Euclidean spaces Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of

More information

Ramsey numbers of some bipartite graphs versus complete graphs

Ramsey numbers of some bipartite graphs versus complete graphs Ramsey numbers of some bipartite graphs versus complete graphs Tao Jiang, Michael Salerno Miami University, Oxfor, OH 45056, USA Abstract. The Ramsey number r(h, K n ) is the smallest positive integer

More information

Motivation. CS/EE 3700 : Fundamentals of Digital System Design

Motivation. CS/EE 3700 : Fundamentals of Digital System Design Motivation CS/EE 37 : Funamentals o Digital System Design Chris J. Myers Lecture 4: Logic Optimization Chapter 4 Algebraic manipulation is not systematic. This chapter presents methos that can be automate

More information

Homotopy, Quasi-Isomorphism, and Coinvariants

Homotopy, Quasi-Isomorphism, and Coinvariants LECTURE 10 Homotopy, Quasi-Isomorphism, an Coinvariants Please note that proos o many o the claims in this lecture are let to Problem Set 5. Recall that a sequence o abelian groups with ierential is a

More information

Table of Common Derivatives By David Abraham

Table of Common Derivatives By David Abraham Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec

More information

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,

More information

On non-antipodal binary completely regular codes

On non-antipodal binary completely regular codes Discrete Mathematics 308 (2008) 3508 3525 www.elsevier.com/locate/isc On non-antipoal binary completely regular coes J. Borges a, J. Rifà a, V.A. Zinoviev b a Department of Information an Communications

More information

Discrete Mathematics

Discrete Mathematics Discrete Mathematics 309 (009) 86 869 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: wwwelseviercom/locate/isc Profile vectors in the lattice of subspaces Dániel Gerbner

More information

Lower bounds on Locality Sensitive Hashing

Lower bounds on Locality Sensitive Hashing Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,

More information

On colour-blind distinguishing colour pallets in regular graphs

On colour-blind distinguishing colour pallets in regular graphs J Comb Optim (2014 28:348 357 DOI 10.1007/s10878-012-9556-x On colour-blin istinguishing colour pallets in regular graphs Jakub Przybyło Publishe online: 25 October 2012 The Author(s 2012. This article

More information

On the minimum distance of elliptic curve codes

On the minimum distance of elliptic curve codes On the minimum istance of elliptic curve coes Jiyou Li Department of Mathematics Shanghai Jiao Tong University Shanghai PRChina Email: lijiyou@sjtueucn Daqing Wan Department of Mathematics University of

More information

Generalization of the persistent random walk to dimensions greater than 1

Generalization of the persistent random walk to dimensions greater than 1 PHYSICAL REVIEW E VOLUME 58, NUMBER 6 DECEMBER 1998 Generalization of the persistent ranom walk to imensions greater than 1 Marián Boguñá, Josep M. Porrà, an Jaume Masoliver Departament e Física Fonamental,

More information

Beam Propagation Hazard Calculations for Telescopic Viewing of Laser Beams

Beam Propagation Hazard Calculations for Telescopic Viewing of Laser Beams ILSC 003 Conerence Proceeings Beam Propagation Hazar Calculations or Telescopic Vieing o Laser Beams Ulrie Grabner, Georg Vees an Karl Schulmeister Please register to receive our Laser, LED & Lamp Saety

More information

Pure Further Mathematics 1. Revision Notes

Pure Further Mathematics 1. Revision Notes Pure Further Mathematics Revision Notes June 20 2 FP JUNE 20 SDB Further Pure Complex Numbers... 3 Definitions an arithmetical operations... 3 Complex conjugate... 3 Properties... 3 Complex number plane,

More information

Math 342 Partial Differential Equations «Viktor Grigoryan

Math 342 Partial Differential Equations «Viktor Grigoryan Math 342 Partial Differential Equations «Viktor Grigoryan 6 Wave equation: solution In this lecture we will solve the wave equation on the entire real line x R. This correspons to a string of infinite

More information

Discrete Time Linear Quadratic Optimal Control for an Electrical Servo Drive System

Discrete Time Linear Quadratic Optimal Control for an Electrical Servo Drive System Discrete ime Linear Quaratic Optimal Control or an Electrical Servo Drive System CORNELIU BOAN, FLORIN OSAFI an ALEXANDRU ONEA Dept. o Automatic Control an Inustrial Inormatics Gh. Asachi echnical University

More information

On the Girth of (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs

On the Girth of (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs On the Girth o (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs Sudarsan V S Ranganathan, Dariush Divsalar and Richard D Wesel Department o Electrical Engineering, University o Caliornia, Los

More information

arxiv: v4 [cs.ds] 7 Mar 2014

arxiv: v4 [cs.ds] 7 Mar 2014 Analysis of Agglomerative Clustering Marcel R. Ackermann Johannes Blömer Daniel Kuntze Christian Sohler arxiv:101.697v [cs.ds] 7 Mar 01 Abstract The iameter k-clustering problem is the problem of partitioning

More information

Nonlinear Backstepping Control of Permanent Magnet Synchronous Motor (PMSM)

Nonlinear Backstepping Control of Permanent Magnet Synchronous Motor (PMSM) International ournal o Systems Control (Vol.1-010/Iss.1) Merzoug an Benalla / Nonlinear Backstepping Control o ermanent... / pp. 30-34 Nonlinear Backstepping Control o ermanent Magnet Synchronous Motor

More information

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation JOURNAL OF MATERIALS SCIENCE 34 (999)5497 5503 Thermal conuctivity of grae composites: Numerical simulations an an effective meium approximation P. M. HUI Department of Physics, The Chinese University

More information

Some spaces of sequences of interval numbers defined by a modulus function

Some spaces of sequences of interval numbers defined by a modulus function Global Journal o athematical Analysis, 2 1 2014 11-16 c Science Publishing Corporation wwwsciencepubcocom/inexphp/gja oi: 1014419/gjmav2i12005 Research Paper Some spaces o sequences o interval numbers

More information

Consider for simplicity a 3rd-order IIR filter with a transfer function. where

Consider for simplicity a 3rd-order IIR filter with a transfer function. where Basic IIR Digital Filter The causal IIR igital filters we are concerne with in this course are characterie by a real rational transfer function of or, equivalently by a constant coefficient ifference equation

More information

Qubit channels that achieve capacity with two states

Qubit channels that achieve capacity with two states Qubit channels that achieve capacity with two states Dominic W. Berry Department of Physics, The University of Queenslan, Brisbane, Queenslan 4072, Australia Receive 22 December 2004; publishe 22 March

More information

Euler equations for multiple integrals

Euler equations for multiple integrals Euler equations for multiple integrals January 22, 2013 Contents 1 Reminer of multivariable calculus 2 1.1 Vector ifferentiation......................... 2 1.2 Matrix ifferentiation........................

More information

Basic IIR Digital Filter Structures

Basic IIR Digital Filter Structures Basic IIR Digital Filter Structures The causal IIR igital filters we are concerne with in this course are characterie by a real rational transfer function of or, equivalently by a constant coefficient

More information

Minimum Distance Bounds for Multiple-Serially Concatenated Code Ensembles

Minimum Distance Bounds for Multiple-Serially Concatenated Code Ensembles Minimum Distance Bounds for Multiple-Serially Concatenated Code Ensembles Christian Koller,Jörg Kliewer, Kamil S. Zigangirov,DanielJ.Costello,Jr. ISIT 28, Toronto, Canada, July 6 -, 28 Department of Electrical

More information

Math 1271 Solutions for Fall 2005 Final Exam

Math 1271 Solutions for Fall 2005 Final Exam Math 7 Solutions for Fall 5 Final Eam ) Since the equation + y = e y cannot be rearrange algebraically in orer to write y as an eplicit function of, we must instea ifferentiate this relation implicitly

More information

6 Wave equation in spherical polar coordinates

6 Wave equation in spherical polar coordinates 6 Wave equation in spherical polar coorinates We now look at solving problems involving the Laplacian in spherical polar coorinates. The angular epenence of the solutions will be escribe by spherical harmonics.

More information

On High-Rate Cryptographic Compression Functions

On High-Rate Cryptographic Compression Functions On High-Rate Cryptographic Compression Functions Richard Ostertág and Martin Stanek Department o Computer Science Faculty o Mathematics, Physics and Inormatics Comenius University Mlynská dolina, 842 48

More information

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy,

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy, NOTES ON EULER-BOOLE SUMMATION JONATHAN M BORWEIN, NEIL J CALKIN, AND DANTE MANNA Abstract We stuy a connection between Euler-MacLaurin Summation an Boole Summation suggeste in an AMM note from 196, which

More information

Research on Thin Film Thickness Uniformity for Deposition of Rectangular Planar Sputtering Target

Research on Thin Film Thickness Uniformity for Deposition of Rectangular Planar Sputtering Target Available online at www.scienceirect.com Physics Proceia 3 (01 ) 903 913 18 th International Vacuum Congress (IVC-18) Research on Thin Film Thickness Uniormity or Deposition o Rectangular Planar puttering

More information

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward An Analytical Expression of the Probability of Error for Relaying with Decoe-an-forwar Alexanre Graell i Amat an Ingmar Lan Department of Electronics, Institut TELECOM-TELECOM Bretagne, Brest, France Email:

More information

Supplementary material for Continuous-action planning for discounted infinite-horizon nonlinear optimal control with Lipschitz values

Supplementary material for Continuous-action planning for discounted infinite-horizon nonlinear optimal control with Lipschitz values Supplementary material or Continuous-action planning or discounted ininite-horizon nonlinear optimal control with Lipschitz values List o main notations x, X, u, U state, state space, action, action space,

More information

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k A Proof of Lemma 2 B Proof of Lemma 3 Proof: Since the support of LL istributions is R, two such istributions are equivalent absolutely continuous with respect to each other an the ivergence is well-efine

More information

1 dx. where is a large constant, i.e., 1, (7.6) and Px is of the order of unity. Indeed, if px is given by (7.5), the inequality (7.

1 dx. where is a large constant, i.e., 1, (7.6) and Px is of the order of unity. Indeed, if px is given by (7.5), the inequality (7. Lectures Nine an Ten The WKB Approximation The WKB metho is a powerful tool to obtain solutions for many physical problems It is generally applicable to problems of wave propagation in which the frequency

More information

A Second Time Dimension, Hidden in Plain Sight

A Second Time Dimension, Hidden in Plain Sight A Secon Time Dimension, Hien in Plain Sight Brett A Collins. In this paper I postulate the existence of a secon time imension, making five imensions, three space imensions an two time imensions. I will

More information

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+

More information

Teaching Fourier optics through ray matrices

Teaching Fourier optics through ray matrices INSTITUTE OF PHYSICS PUBLISHING Eur. J. Phys. 26 (2005 261 271 EUROPEAN JOURNAL OF PHYSICS oi:10.1088/0143-0807/26/2/005 Teaching Fourier optics through ray matrices IMoreno 1,MMSánche-Lópe 1,CFerreira

More information

Symbol Interleaved Parallel Concatenated Trellis Coded Modulation

Symbol Interleaved Parallel Concatenated Trellis Coded Modulation Symbol Interleaved Parallel Concatenated Trellis Coded Modulation Christine Fragouli and Richard D. Wesel Electrical Engineering Department University of California, Los Angeles christin@ee.ucla. edu,

More information

How to Minimize Maximum Regret in Repeated Decision-Making

How to Minimize Maximum Regret in Repeated Decision-Making How to Minimize Maximum Regret in Repeate Decision-Making Karl H. Schlag July 3 2003 Economics Department, European University Institute, Via ella Piazzuola 43, 033 Florence, Italy, Tel: 0039-0-4689, email:

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Proceeings of the 4th East-European Conference on Avances in Databases an Information Systems ADBIS) 200 Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Eleftherios Tiakas, Apostolos.

More information

arxiv: v2 [cond-mat.stat-mech] 11 Nov 2016

arxiv: v2 [cond-mat.stat-mech] 11 Nov 2016 Noname manuscript No. (will be inserte by the eitor) Scaling properties of the number of ranom sequential asorption iterations neee to generate saturate ranom packing arxiv:607.06668v2 [con-mat.stat-mech]

More information

CHAPTER 1 : DIFFERENTIABLE MANIFOLDS. 1.1 The definition of a differentiable manifold

CHAPTER 1 : DIFFERENTIABLE MANIFOLDS. 1.1 The definition of a differentiable manifold CHAPTER 1 : DIFFERENTIABLE MANIFOLDS 1.1 The efinition of a ifferentiable manifol Let M be a topological space. This means that we have a family Ω of open sets efine on M. These satisfy (1), M Ω (2) the

More information

Lecture 5. Symmetric Shearer s Lemma

Lecture 5. Symmetric Shearer s Lemma Stanfor University Spring 208 Math 233: Non-constructive methos in combinatorics Instructor: Jan Vonrák Lecture ate: January 23, 208 Original scribe: Erik Bates Lecture 5 Symmetric Shearer s Lemma Here

More information

The chromatic number of graph powers

The chromatic number of graph powers Combinatorics, Probability an Computing (19XX) 00, 000 000. c 19XX Cambrige University Press Printe in the Unite Kingom The chromatic number of graph powers N O G A A L O N 1 an B O J A N M O H A R 1 Department

More information

Capacity-approaching codes

Capacity-approaching codes Chapter 3 Capacity-approaching coes We have previously iscusse coes on graphs an the sum-prouct ecoing algorithm in general terms. In this chapter we will give a brief overview of some particular classes

More information

Computing the Longest Common Subsequence of Multiple RLE Strings

Computing the Longest Common Subsequence of Multiple RLE Strings The 29th Workshop on Combinatorial Mathematics an Computation Theory Computing the Longest Common Subsequence of Multiple RLE Strings Ling-Chih Yao an Kuan-Yu Chen Grauate Institute of Networking an Multimeia

More information

Turbo Codes for Deep-Space Communications

Turbo Codes for Deep-Space Communications TDA Progress Report 42-120 February 15, 1995 Turbo Codes for Deep-Space Communications D. Divsalar and F. Pollara Communications Systems Research Section Turbo codes were recently proposed by Berrou, Glavieux,

More information

Code design: Computer search

Code design: Computer search Code design: Computer search Low rate codes Represent the code by its generator matrix Find one representative for each equivalence class of codes Permutation equivalences? Do NOT try several generator

More information

Combinatorica 9(1)(1989) A New Lower Bound for Snake-in-the-Box Codes. Jerzy Wojciechowski. AMS subject classification 1980: 05 C 35, 94 B 25

Combinatorica 9(1)(1989) A New Lower Bound for Snake-in-the-Box Codes. Jerzy Wojciechowski. AMS subject classification 1980: 05 C 35, 94 B 25 Combinatorica 9(1)(1989)91 99 A New Lower Boun for Snake-in-the-Box Coes Jerzy Wojciechowski Department of Pure Mathematics an Mathematical Statistics, University of Cambrige, 16 Mill Lane, Cambrige, CB2

More information

Construction of Equiangular Signatures for Synchronous CDMA Systems

Construction of Equiangular Signatures for Synchronous CDMA Systems Construction of Equiangular Signatures for Synchronous CDMA Systems Robert W Heath Jr Dept of Elect an Comp Engr 1 University Station C0803 Austin, TX 78712-1084 USA rheath@eceutexaseu Joel A Tropp Inst

More information

23 Implicit differentiation

23 Implicit differentiation 23 Implicit ifferentiation 23.1 Statement The equation y = x 2 + 3x + 1 expresses a relationship between the quantities x an y. If a value of x is given, then a corresponing value of y is etermine. For

More information

Michaelis-Menten Plot

Michaelis-Menten Plot NAM: HAITI CHMISTRY, SPRING, 17 Circle Section Number: 1 11 amination, April 15, 17 Answer each question in the space provie; use back o page i etra space is neee. Answer questions so the graer can RADILY

More information

Proof of SPNs as Mixture of Trees

Proof of SPNs as Mixture of Trees A Proof of SPNs as Mixture of Trees Theorem 1. If T is an inuce SPN from a complete an ecomposable SPN S, then T is a tree that is complete an ecomposable. Proof. Argue by contraiction that T is not a

More information

LECTURE NOTES ON DVORETZKY S THEOREM

LECTURE NOTES ON DVORETZKY S THEOREM LECTURE NOTES ON DVORETZKY S THEOREM STEVEN HEILMAN Abstract. We present the first half of the paper [S]. In particular, the results below, unless otherwise state, shoul be attribute to G. Schechtman.

More information

Bohr Model of the Hydrogen Atom

Bohr Model of the Hydrogen Atom Class 2 page 1 Bohr Moel of the Hyrogen Atom The Bohr Moel of the hyrogen atom assumes that the atom consists of one electron orbiting a positively charge nucleus. Although it oes NOT o a goo job of escribing

More information

Convergence of Random Walks

Convergence of Random Walks Chapter 16 Convergence of Ranom Walks This lecture examines the convergence of ranom walks to the Wiener process. This is very important both physically an statistically, an illustrates the utility of

More information

Counting Lattice Points in Polytopes: The Ehrhart Theory

Counting Lattice Points in Polytopes: The Ehrhart Theory 3 Counting Lattice Points in Polytopes: The Ehrhart Theory Ubi materia, ibi geometria. Johannes Kepler (1571 1630) Given the profusion of examples that gave rise to the polynomial behavior of the integer-point

More information

Make graph of g by adding c to the y-values. on the graph of f by c. multiplying the y-values. even-degree polynomial. graph goes up on both sides

Make graph of g by adding c to the y-values. on the graph of f by c. multiplying the y-values. even-degree polynomial. graph goes up on both sides Reference 1: Transformations of Graphs an En Behavior of Polynomial Graphs Transformations of graphs aitive constant constant on the outsie g(x) = + c Make graph of g by aing c to the y-values on the graph

More information

Basic Strategy for Card-Counters: An Analytic Approach. by N. Richard Werthamer

Basic Strategy for Card-Counters: An Analytic Approach. by N. Richard Werthamer Basic Strategy or Car-Counters: An Analytic Approach by N. Richar Werthamer Abstract We evelop an eicient metho, similar to that o Marcus (7) who calls it Counter Basic Strategy, or casino blackack car

More information

arxiv: v4 [math.pr] 27 Jul 2016

arxiv: v4 [math.pr] 27 Jul 2016 The Asymptotic Distribution of the Determinant of a Ranom Correlation Matrix arxiv:309768v4 mathpr] 7 Jul 06 AM Hanea a, & GF Nane b a Centre of xcellence for Biosecurity Risk Analysis, University of Melbourne,

More information

Diffusion Limit for the Vlasov-Maxwell-Fokker-Planck System

Diffusion Limit for the Vlasov-Maxwell-Fokker-Planck System IAENG International Journal o Applie Mathematics, 40:3, IJAM_40_3_05 Diusion Limit or the Vlasov-Maxwell-Fokker-Planck System Najoua El Ghani Abstract In this paper we stuy the iusion limit o the Vlasov-Maxwell-Fokker-Planck

More information

An Optimal Algorithm for Bandit and Zero-Order Convex Optimization with Two-Point Feedback

An Optimal Algorithm for Bandit and Zero-Order Convex Optimization with Two-Point Feedback Journal of Machine Learning Research 8 07) - Submitte /6; Publishe 5/7 An Optimal Algorithm for Banit an Zero-Orer Convex Optimization with wo-point Feeback Oha Shamir Department of Computer Science an

More information

Analysis on a Localized Pruning Method for Connected Dominating Sets

Analysis on a Localized Pruning Method for Connected Dominating Sets JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 1073-1086 (2007) Analysis on a Localize Pruning Metho for Connecte Dominating Sets JOHN SUM 1, JIE WU 2 AND KEVIN HO 3 1 Department of Information Management

More information

Generalizing Kronecker Graphs in order to Model Searchable Networks

Generalizing Kronecker Graphs in order to Model Searchable Networks Generalizing Kronecker Graphs in orer to Moel Searchable Networks Elizabeth Boine, Babak Hassibi, Aam Wierman California Institute of Technology Pasaena, CA 925 Email: {eaboine, hassibi, aamw}@caltecheu

More information

Error Floors in LDPC Codes: Fast Simulation, Bounds and Hardware Emulation

Error Floors in LDPC Codes: Fast Simulation, Bounds and Hardware Emulation Error Floors in LDPC Coes: Fast Simulation, Bouns an Harware Emulation Pamela Lee, Lara Dolecek, Zhengya Zhang, Venkat Anantharam, Borivoje Nikolic, an Martin J. Wainwright EECS Department University of

More information

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device Close an Open Loop Optimal Control of Buffer an Energy of a Wireless Device V. S. Borkar School of Technology an Computer Science TIFR, umbai, Inia. borkar@tifr.res.in A. A. Kherani B. J. Prabhu INRIA

More information

The Principle of Least Action and Designing Fiber Optics

The Principle of Least Action and Designing Fiber Optics University of Southampton Department of Physics & Astronomy Year 2 Theory Labs The Principle of Least Action an Designing Fiber Optics 1 Purpose of this Moule We will be intereste in esigning fiber optic

More information

Situation awareness of power system based on static voltage security region

Situation awareness of power system based on static voltage security region The 6th International Conference on Renewable Power Generation (RPG) 19 20 October 2017 Situation awareness of power system base on static voltage security region Fei Xiao, Zi-Qing Jiang, Qian Ai, Ran

More information

Angles-Only Orbit Determination Copyright 2006 Michel Santos Page 1

Angles-Only Orbit Determination Copyright 2006 Michel Santos Page 1 Angles-Only Orbit Determination Copyright 6 Michel Santos Page 1 Abstract This ocument presents a re-erivation of the Gauss an Laplace Angles-Only Methos for Initial Orbit Determination. It keeps close

More information

1. Filling an initially porous tube under a constant head imposed at x =0

1. Filling an initially porous tube under a constant head imposed at x =0 Notes on Moving Bounary problems, Voller U o M, volle00@umn.eu. Filling an initially porous tube uner a constant hea impose at x =0 Governing equation is base on calculating the water volume lux by the

More information