Blind identification of code word length for non-binary error-correcting codes in noisy transmission

Size: px
Start display at page:

Download "Blind identification of code word length for non-binary error-correcting codes in noisy transmission"

Transcription

1 Zrell et al. EURASIP Journal on Wreless Communcatons and Networng :43 DOI /s RESEARCH Blnd dentfcaton of code word length for non-bnary error-correctng codes n nosy transmsson Yasamne Zrell 1,2, Roland Gauter 1,2*,ErcRannou 1,3,MélaneMarazn 1,2 and Emanuel Rado 1,2 Open Access Abstract In cogntve rado context, the parameters of codng schemes are unnown at the recever. The desgn of an ntellgent recever s then essental to blndly dentfy these parameters from the receved data. The blnd dentfcaton of code word length has already been extensvely studed n the case of bnary error-correctng codes. Here, we are nterested n non-bnary codes where a nosy transmsson envronment s consdered. To deal wth the blnd dentfcaton problem of code word length, we propose a technque based on the Gauss-Jordan elmnaton n GFq Galos feld, wth q = 2 m,wherems the number of bts per symbol. Ths proposed technque s based on the nformaton provded by the arthmetc mean of the number of zeros n each column of these matrces. The robustness of our technque s studed for dfferent code parameters and over dfferent Galos felds. Keywords: Cogntve rado; Blnd dentfcaton; Non-bnary error-correctng codes; Galos feld Introducton Error-correctng codes are frequently used n modern dgtal transmsson systems n order to mprove the communcaton qualty. These codes are desgned to acheve a good mmunty aganst channel mparments by ntroducng redundancy n the nformatve data. Due to the complexty of both encodng and especally decodng procedures, the maorty of research and practcal mplementatons of real-tme embedded systems were often restrcted to encoders manpulatng bnary data,.e., elements of the Galos feld GF2. Over the last decade, low-densty party chec LDPC codes and turbo codes over GF2 have attracted consderable nterest of many researchers due to ther excellent error correcton capablty. They have been generalzed to fnte felds GFq [1,2], where q = 2 m, and are among the most wdely used errorcorrectng codes n wreless communcaton standards. It *Correspondence: roland.gauter@unv-brest.fr Equal contrbutors 1 Unversté Européenne de Bretagne, 5 Boulevard Laënnec, Rennes, France 2 Unversté de Brest; CNRS, UMR 6285 Lab-STICC, 6 avenue Vctor Le Gorgeu, Brest, France Full lst of author nformaton s avalable at the end of the artcle has been shown n [1] that non-bnary LDPC codes perform generally better than bnary LDPC codes and turbo codes. However, the maor drawbac of these codes s ther decodng complexty for a large Galos feld order q [3,4]. Low complexty decodng algorthms have recently been proposed [5,6], thus allowng the use of non-bnary LDPC codes n practcal mplementatons. Our man research nterests are focused on non-bnary error-correctng codes n order to blndly dentfy ther parameters. Ths topc s a part of a non-cooperatve context le a mltary ntercepton or cogntve rado applcatons. In ths case, the recever has no nowledge about the parameters used to encode the nformaton at the transmtter. The soluton s to desgn an ntellgent recever whch s able to blndly dentfy the encoder parameters from the only nowledge of the receved data stream. Ths blnd dentfcaton functon of the recever permts to ncrease the data rate transmsson, snce t wll be unnecessary to transmt supplementary nformaton about the encoder parameters wth the useful data. Such ntellgent recever s able to adapt automatcally tself to the development of new hgh-performance codng schemes and the fast evoluton of new communcaton standards wthout equpment change. In ths wor, we are only nterested 2015 Zrell et al.; lcensee Sprnger. Ths s an Open Access artcle dstrbuted under the terms of the Creatve Commons Attrbuton Lcense whch permts unrestrcted use, dstrbuton, and reproducton n any medum, provded the orgnal wor s properly credted.

2 Zrell et al. EURASIP Journal on Wreless Communcatons and Networng :43 Page 2 of 16 n blndly dentfyng the code word length of lnear nonbnary bloc codes. In the case of the ntercepton, ths parameter can not be transmtted. Lewse, f we want to change the encoder or get out of the lst of possble choce of encoders, the code word length s not transmtted. In ths context, the publshed research results have been restrcted so far to the blnd recognton of the code word length of bnary codes. To the best of our nowledge, ths paper ntroduces, for the frst tme, an approach to blndly dentfy the code word length of non-bnary codes n nosy condtons. In ths wor, the am s to blndly dentfy the code word length from the only nowledge of receved data. The authors n [7] proposed a technque of dentfcaton of non-bnary LDPC parameters, but the dentfcaton s not blnd because t s based on usng a predefned canddate set of encoders whch s nown by both the transmtter and the recever. Furthermore, ths technque only wors wth LDPC codes unle our proposed technque, whch s general and sutable for all bloc codes. In our paper, the proposed blnd dentfcaton technque s based on a generalzaton of an exstng method used for bnary codes. The prncple of ths generalzaton wll be explaned n ths paper wthout specfyng n detals ts detecton performances. So, we present here state-of-the-art technques to dentfy the code word length of bnary lnear bloc codes. The dea of these technques s to fnd a bass of a dual code composed of party chec relatons. For ths purpose, an approach based on fndng code words of small Hammng weght [8,9] was mproved by Valembos [10] by usng statstcal hypothess tests and recently by Cluzeau [11,12] and Côte [13]. A second approach based on lnear algebra theory was ntroduced n [14] for noseless channel. Ths approach permts to recover the length of code words by studyng behavors of the ran of matrces composed of receved bts. However, the ran crteron was exploted wthout provdng an algebrac and theoretcal ustfcaton of such behavor. In [15], the use of ths crteron was ustfed. In [16], the ran crteron approach was generalzed to convolutonal codes over GFq, where q > 2, assumng a noseless transmsson, but t was shown that ths generalzed technque can be also performed to non-bnary lnear bloc codes. In nosy transmssons, a technque based on the Gauss elmnaton n GF2 was appled n [17-19] to matrces composed of nosy receved bts n order to fnd the number of almost dependent columns permttng the dentfcaton of the code word length n the case of bnary error-correctng codes. Indeed, an almost dependent column of a matrx composed of nosy receved symbols corresponds to a column whch may be a lnear combnaton of some precedng columns wthout thepresenceoferroneoussymbolsandwhchleadstoa column that contans more zero elements after the Gauss elmnaton. Compared to prevous wors, we demonstrate here that t s possble to generalze the blnd dentfcaton technque proposed n [17,18] to non-bnary bloc codes provded that the Galos feld parameters the cardnalty and the prmtve polynomal are nown by the recever. To dentfy the prmtve polynomal, an algorthm of dentfcaton was proposed n [20]. To acheve our purpose, t s necessary to dentfy the number of almost dependent columns n the matrces composed of nosy symbols of GFq by studyng the probablty of detecton of these columns, denoted as P. In fact, the computaton of P s essental n order to determne an optmal detecton threshold. Assumng a transmsson over q-ary symmetrc channel wth an error probablty p e,thetechnques based on fndng a base of a dual code [18,19] for bnary codes requre the nowledge of p e, where a hard decson demodulaton s consdered. For ths reason, we propose here an approach whch s more robust because t allows us the blnd dentfcaton of the code word length of nonbnary and bnary bloc codes wthout usng the error probablty p e. Ths approach s based on analyzng behavors of the arthmetc mean of the number of zeros n the columns of the matrces constructed by the Gauss elmnaton n GFq. In ths paper, the proposed method s a general method that should be appled to all nonbnary bloc codes even though most examples of codes gven here are non-bnary LDPC codes. For ths reason, the propertes of LDPC codes are not exploted by our method. Ths paper s organzed as follows. In the Techncal bacground secton, we present the encodng process of non-bnary error-correctng codes. Then, the prncple of the blnd dentfcaton of code parameters n the noseless case s descrbed. The channel model used n ths study s also defned and ustfed n ths secton. In the Blnd dentfcaton of code word length n the nosy case secton, the blnd dentfcaton method of the code word length n nosy envronment s descrbed. A comparson n terms of error probablty and detecton performances s shown n the Analyss and performances secton. Fnally, some conclusons are drawn n the Conclusons secton and planned future wor s ponted out. Techncal bacground Non-bnary error-correctng codes The use of an effcent codng system n the transmtter as error-correctng codes s essental n order to fght dsturbances present on the transmsson channel. For a long tme, cyclc codes such as BCH codes [21,22] and Reed- Solomon codes [23] have been the most commonly used as codes based on fnte felds snce they are characterzed by large mnmum dstances for a hard decson decodng. The non-bnary LDPC codes descrbed by a sparse party chec matrx wth elements n GFq havebeen

3 Zrell et al. EURASIP Journal on Wreless Communcatons and Networng :43 Page 3 of 16 developed by Davey and MacKay n 1998 [1]. Sgnfcant wors on the desgn and the decodng complexty reducton of these codes have shown that they have a great potental to replace Reed-Solomon codes n some applcatons of communcaton, such as space communcatons [24], and storage systems [25,26]. In ths paper, we focus on the blnd dentfcaton of code word length for the non-bnary bloc codes, but ths proposed method can also be appled to convolutonal codes and concatenated codes. Let us present the encodng process of these codes over GFq. Actually, the prncple of a transmsson chan s to send dgtal nformaton from a source to one or more recevers. The nformaton yelded by the source s bnary data {0, 1} =GF2. Each bloc of m nformaton bts are combned to generate a symbol of GFq. Then, the generated non-bnary nformaton, denoted as d,sencodedby one of the bloc codes over GFq lstedabove.formost bloc error-correctng codes, a code word, denoted as c, composed of non-bnary symbols s obtaned by the multplcatonofthenformatond and a non-bnary generator matrx G: c = d G 1 In the case of LDPC codes, the encodng process needs the use of the party chec matrx, whch s always sparse compared to the other codes. In most of the standards, such as long-term evoluton LTE standard [27], the encodng s performed n a systematc form n order to facltate the decodng process wthout degradng performances of the error correcton. For ths reason, n the case of bloc codes, the requred parameters to perform the decodng operaton are the number of nputs, denoted as, thecodewordlength, denoted as n, and a party chec matrx, denoted as H. Indeed, the matrx H wll be used by the decoder to detect or/and to correct the errors. The recovered nformaton wll be the frst symbols of the recovered code word due to the systematc form used n the encodng. Our am n ths research wor s to blndly dentfy the parameter n from non-bnary receved symbols whch are affected by nosy transmssons. In the noseless context, we have already demonstrated n [16] that we can dentfy ths parameter wth the only nowledge of the receved data, provded that the Galos feld parameters are nown. The prncple of blnd dentfcaton of the code parameter n n the noseless case s recalled n the followng subsecton. [28] to dentfy the parameters of convolutonal codes over GFq, where q = 2 m.wehaveshownthatour method for the noseless case can be appled to bloc codes. Ths method reshapes row-wse the receved symbols, denoted as r, under a matrx form, denoted as R l,of sze M l. Indeed, R l s flled by receved symbols from the top left corner to the bottom rght as llustrated n Fgure 1. The number of columns l vares between 1 and l max and the number of rows M whch depends on l s gven by the nteger part L l where L s the length of a receved symbol stream. Then, the ran over GFq s calculated for each matrx R l.whenallmatrcesr l have full ran, t s mpossble to detect the exstence of a code. Nevertheless, the redundancy ntroduced by the code leads to ran defcences n some matrces R l.henceforth,theranbehavors of R l allowustodetectthecodeandtodentfytsparameters, n partcular the code word length. As demonstrated n [15] and studed n [16], there are two possble ran behavors accordng to the number of columns l. Ifl s a multple of n.e., l = α n, α N, the rans of the matrces R l are proportonal to the code rate /n.e., ranr l = l /n. Otherwse.e., l = α n, R l have full ran.e., ranr l = l. Thus, the value of the ran defcency depends on code parameters and n. Indeed, only two consecutve ran defcences are necessary to determne all code parameters. The code word length n can be determned by the dfference between two values of l correspondng to two consecutve ran defcences of R l. As shown n [16], the ran method gves good results n a noseless envronment. A theoretcal and algebrac study of the behavor of the ran crteron, as well as partcular cases whch can occur for specfc parameters of Prncple of blnd dentfcaton method of code word length n the noseless case In ths part, we assume that the channel ntroduces no error.in[16],wehaveadaptedthemethodproposedn Fgure 1 Example of a matrx R l. Example of a matrx constructon from the receved symbols.

4 Zrell et al. EURASIP Journal on Wreless Communcatons and Networng :43 Page 4 of 16 codes, were presented n [15]. It was demonstrated that most matrces R l have full ran when l s not a multple of n, except for some partcular cases whch depend on codes generator matrx. In a nosy envronment, the ran method can not be used, snce all the matrces R l have full ran n ths case. Non-bnary channel In order to evaluate our blnd dentfcaton algorthm, we assume that the encoded sequences are transmtted through a q-ary non-bnary, for q = 2 m > 2 symmetrc channel QSC whch s the smplest channel. However, our proposed algorthms can wor for every type of channel provded that the error probablty p e computed at the output of the demodulator s nown. Indeed, we consder that the blocs of the transmsson chan, the modulator, the transmsson channel, and the demodulator can be modeled by a non-bnary channel, where a hard decson demodulaton s consdered. In a cogntve rado context, a multpath fadng channel s used. Ths realstc channel leads to burst errors whch can be corrected by usng an nterleaver and error-correctng codes. In ths context, the errors at the output of a denterleaver at the recever sdecanbemodeledbyaqscwhenadecodngprocess wth hard decson wll be used. The problem of a blnd dentfcaton of the nterleaver perod, as well as a blnd synchronzaton wth the nterleaver blocs was handled n [14,18]. Let us defne the q-ary symmetrc channel whch s the generalzaton of the bnary symmetrc channel BSC. In fact, t s a dscrete memoryless channel wth an error probablty p e andcomposedofnon-bnarynputsand non-bnary outputs belongng to the GFq, where q = 2 m. Thesymbolsatthenputofthechannelarendependent and dstrbuted unformly wth a probablty equal to 1/q. Asymbolδ GFq at the channel nput s receved ncorrectly wth a probablty p e /q 1 [29]. In other words, t s replaced at the recever by a dfferent symbol β of GFq. The probablty of correctly recevng a symbol s equal to 1 p e. The QSC channel s characterzed by the condtonal probabltes: p r = β r = δ = p e q 1, δ = β 2 p r = δ r = δ = 1 p e where the transmtted symbol s denoted r,.e., r = c,for {1,, L}, and the nosy receved symbol s denoted r such that r = r + e wth e the transmsson error ntroduced n the symbol r. An example of a non-bnary symmetrc channel for q = 2 2 s depcted n Fgure 2. In the followng secton, we present the blnd dentfcaton method of the parameter n n a nosy framewor. Blnd dentfcaton of code word length n the nosy case In ths part, we present the mplementaton method whch allows us to dentfy the code word length of a non-bnary code n a nosy envronment. Ths method s based on the concept of fndng the ran-defcent matrces among R l, l {1,..., l max }, correspondng to matrces havng at least one almost dependent column. Indeed, the matrces R l are reshaped n the same way as R l usng the nosy receved symbols r. In [19], a method devoted to determne these matrces n the case of bnary codes was presented. However, ths method requres the nowledge of the error probablty p e. In order to avod ths constrant, we propose a method based on usng the arthmetc mean crteron n order to detect the ran-defcent matrces whch have some almost dependent columns wthout the need of the error probablty p e. Prncple In a noseless case, the ran crteron s used to fnd the maxmum number of lnearly ndependent columns n the matrces R l. Ths allows us to derve the number of lnearly dependent columns n R l columns whch are lnear combnatons of other columns. The fnte-feld Gauss Fgure 2 Non-bnary symmetrc channel. An example of a non-bnary symmetrc channel for q = 2 2.

5 Zrell et al. EURASIP Journal on Wreless Communcatons and Networng :43 Page 5 of 16 elmnaton method [30] has to be used to elmnate those lnear-dependent columns to zero. In nosy transmssons, all matrces R l have full ran. A matrx R l can be expressed accordng to R l by: R l = R l + E l 3 where E l s the error matrx of sze M l constructed n the same way as R l usng the errors nduced by the channel. Therefore, the dependence of the columns s dsturbed by the presence of errors n some receved symbols. In such context, the authors n [17,18] proposed to loo for the number of almost dependent columns n the matrces composed of nosy receved bts by usng the Gauss elmnaton over GF2. Inspred by ths dea, t s suffcent, n the case of non-bnary error correctng codes, to apply the fnte-feld Gauss elmnaton n GFq to R l n order to obtan a new matrx T l of sze M l. Ths algorthm gves also at output a matrx of sze l l, denoted à l, that descrbes the combnaton operatons performed to the columns of the matrx R l n order to obtan the transformaton matrx T l. A recall of the fnte-feld Gauss elmnaton over GFq spresentednalgorthm1.to descrbe ths algorthm, we denote I l the dentty matrx of sze l l, x l the -th column of a gven matrx X l and x l a coeffcent of a matrx X l placed n the -th column and n the -th row. By means of ths algorthm, the lnear-dependent columns n the matrx wll be elmnated to zeros. The whole matrx s consdered n our proposed method nstead of only the lower part of the matrx R l as mentoned n [17]. It would be more accurate than assumng that errors do not occur n the upper part of the matrx, buttsnottherealcase. We can note that the fnte-feld Gauss elmnaton over GFq can be defned by a lnear applcaton gven by: R l à l = T l 4 In noseless transmssons, the number of dependent columns n R l,forl = α n, α N, corresponds to the number of the zero columns n the matrx T l whch s the result of the transformaton of R l by the fnte-feld Gauss elmnaton n GFqR l A l = T l. The matrx form of T l s descrbed n Fgure 3. In fact, the dmenson dentfcaton of a vector space generated by a code C s equvalent to fndng the Algorthm 1 The fnte-feld Gauss elmnaton over GFq. Requre: R l Ensure: T l and à l Intalzaton: T l R l and à l I l for = 1tol do f the -th element of the -th column t l Permute the -th column t l = 0 then wth the frst column t l > thathasanon-zeroonts-th element Permute the column ã l wth ã l end f Multply the columns t l and ã l to have t l = 1 for = + 1tol do by v = 1/ t l n order Let b = t l. Apply the followng operaton to the columns t l t l = t l and t l b t l n order to have t l = 0: Apply the followng operatons to the columns of the matrx A l : end for end for ã l = ã l b ã l Fgure 3 Matrx form of T l. An example of a matrx form of T l for l = α n.

6 Zrell et al. EURASIP Journal on Wreless Communcatons and Networng :43 Page 6 of 16 dmenson of a vector space generated by ts dual code C. For any vector h belongng to C and for any code word r of C, the relaton between both s defned by r h T = 0. In noseless condtons, the matrx R n,forl = n, whchs composed of M code words of length n,should satsfy: R n h T = 0 5 We can note that h belongs to the ernel of R n,denoted as er R n.so,wehavec er R n. Snce the dependent columns n R l multpled by the columns a l permt to have the zero columns n the matrx T l,thecorrespondng columns a n wll belong to er R n n whch the dual code C s contaned. Therefore, fndng the dependent columns n R l s equvalent to fndng the columns a l whch belong to the dual code C. Due to the presence of errors nduced by the channel n R l,forl = α n, thecolumnsof T l correspondng to the almost dependent columns n R l wll contan some nonzero symbols. Assumng that the frst l rows and the pvots of the matrx T l do not contan transmsson errors, usng 3 and 4 allows us to wrte the matrx T l as: T l = T l + E l A l 6 parameters M and P, denoted as BM, P.The parameter P corresponds to the probablty that a coeffcent t l of the column t l s equal to 0.e., P = Pr [ t l = 0 ã l C ]. It s possble to lmt the two behavors of the varable B l by computng an optmal threshold ˆη opt such that: { If Bl > ˆη opt then ã l C If B l ˆη opt then ã l 7 / C where ˆη opt = M q η opt s a real n the nterval [ 0, M]. The optmal threshold η opt s able to mnmze the probablty of wrong detecton of a column ã l C,denoted as P wd, whch corresponds to the sum of the false alarm probablty, denoted as P fa, and the probablty of not detectng a theoretcal dependent column, denoted as P nd. The optmal threshold s determned by: η opt = arg mn η P wd = arg mn η P nd + P fa = arg mn η 1 + M M = Mq η +1 [q M q 1 M P 1 P M ] 8 In ths case, a vector h s a party chec relaton.e., h C wth hgh probablty f the relaton R l h T has a low Hammng weght [11]. However, the opposte s not necessarly true. We can conclude that ã l belongs to C f the correspondng t l = R l ã l has a small Hammng weght. In GFq, the Hammng weght of a vector s the number of non-zero elements n ths vector. So, our am s to determne the columns t l whch have a hgh number of zeros. The dea s to study the number of zeros n the columns of the T l n order to detect the almost dependent columns n R l. Behavors of the number of zeros n the columns of T l Let B l be the number of zeros n the -th column of T l, t l.hence,thevarableb l has two behavors dependng on whether the column ã l belongs to the dual code C or not. Ths varable wll be studed as a functon of ã l assumng that the bts that represent an element of the GFq, where q = 2 m, are unformly dstrbuted and ndependent from each other. If the column ã l does not belong to the dual code C, the varable B l,forall [[ 1, l]], wll follow a bnomal dstrbuton of parameters M and 1/q wth a mean equal to M/q, denoted as BM,1/q. If the column ã l belongs to the dual code C,the varable B l wll follow a bnomal dstrbuton wth The normal dstrbuton can be used to approxmate the bnomal probabltes of B l when M s large: If ã l C : B l N μ 0, σ0 2 If ã l / C : B l N μ 1, σ where N μ 0, σ0 2 s the normal dstrbuton of parameters μ 0 = M P and σ0 2 = M P 1 P and N μ 1, σ1 2 corresponds to the normal dstrbuton of parameters μ 1 = M/q and σ1 2 = M q 1/q2. Henceforth, the optmal value of the threshold ˆη mnmzng the probablty of wrong detecton P wd can be computed by: ˆη opt = arg mn 1 φ ˆη ˆη μ1 σ 1 + φ ˆη μ0 σ where φx s the cumulatve densty functon of the standard normal dstrbuton: φx = 1 x e t2 2 dt 12 2 π

7 Zrell et al. EURASIP Journal on Wreless Communcatons and Networng :43 Page 7 of 16 We can note that the optmal threshold ˆη opt depends on the parameters: M, q, andp. So, n order to delmt the two behavors of the varable B l, t s necessary to compute the probablty P. Computaton of the probablty P In the case of bnary codes, the probablty P has been calculated n [11]. But, t has never been studed n the general case of codes over GF2 m. In fact, the computaton of the parameter P s essental n order to detect the almost dependent columns n R l by delmtng the two behavors of the varable B l. Our am s to nvestgate ths probablty n the case of non-bnary codes. In the followng, the theoretcal study of P s presented. For l = n and a poston of a column ã l contaned n C, a coeffcent t l of the column t l can be obtaned, usng 6, by: t l = t l + n =1 a l e l = n =1 a l e l 13 where t l = 0 n the case of noseless transmssons as explaned prevously. Indeed, the sum n =1 a l e l s null n ths case because e l = 0, {1,, n}, and {1,, M}. However, n the case of nosy transmssons, the coeffcents e l GFq corresponds to the errors ntroduced by the nosy channel n the symbols r l GFq n order to generate the nosy symbols r l GFq. Our am s to determne P the probablty of detectng a zero coeffcent n the column t l correspondng to havng n =1 a l [ n P = Pr =1 a l e l = 0 e l = 0: ] 14 Let N l be the mnmum number of lnear combnatons of columns requred to obtan t l.thsnumbercorresponds also to the Hammng weght of the column ã l. Then, there could be postons among N l where e l = 0. Thus, P can be defned as the probablty of havng s=1 a l e l = 0suchthats s the number of postons among N l where e l = 0: [ N l P = Pr [X = 0] + Pr X = s, s=1 s =1 a l e l = 0 ] 15 where X s a random varable of the erroneous postons number among N l. Indeed,weshownAppendxthat the probablty P of havng t l = 0canbedetermned by: P = 1 + q 1 1 p e q q 1 q N l 16 In the case of GF2.e., q = 2, ths probablty can be wrtten as: P = p e N l 2 17 Ths expresson corresponds to that used n [11]. In Fgure 4, we represent the wrong detecton probablty P wd as a functon of ˆη/M and p e assumng q = 2 3, w ã l = 20 and M = 2, 000. For each value of p e,the optmal threshold ˆη opt correspondng to a root of 11 s computed. From Fgure 4, we can deduce that the threshold nterval satsfyng P wd 0 decreases when the value of p e ncreases. We can conclude that studyng the behavors of B l n order to dentfy n s based on the calculaton of the optmal threshold ˆη opt. However, ths threshold depends on the value of the error probablty p e whch s unnown for the recever. So, the need to estmate ths parameter s a blocng step n the almost dependent columns method and also leads to a lac of robustness. In order to address these problems, we propose a new teratve method based on the arthmetc mean of the varable B l whch do not depend on p e and where the teratve process permts to mprove the detecton probablty. New teratve method based on the arthmetc mean of the varable B l In ths part, the proposed method based on the arthmetc mean of the number of zeros n the columns of the matrx T l s descrbed. We recall that the Gauss elmnaton descrbed n Algorthm 1 should be appled n order to obtan T l. We show here that the dentfcaton of the parameter n by our proposed method does not depend on the error probablty p e. In ths method, n order to mprove the detecton probablty of n, an teraton process s ntroduced. We consder the dea of the teratve process proposed n [18,19]. The prncple of ths process s to perform random permutatons on the rows of the matrx R l n order to obtan a new vrtual realzaton of the receved data. These permutatons permt to ncrease the probablty to obtan non-erroneous pvots durng the Gauss elmnaton.

8 Zrell et al. EURASIP Journal on Wreless Communcatons and Networng :43 Page 8 of 16 Fgure 4 Probablty P wd accordng to ˆη/M and p e. The probablty of wrong detecton of almost dependent columns P wd accordng to ˆη/M and p e s represented for q = 2 3, M = 2, 000 and w ã l = 20. The arthmetc mean of the varables B l, [[ 1, l]], denoted E l s defned by: l=1 B l E l = 18 l Property 1. If X 1, X 2,, X m are ndependent random varables respectvely followng: N μ 1, σ1 2, N μ2, σ2 2,..., N μm, σm 2 the mean defned by X 1+X 2 + +X m m follows: μ1 + μ 2 + +μ m N, σ σ σ m 2 m m 2 19 We recall that the varable B l whch s the number of zeros n the -th column of the matrx T l has two possble behavors dependng on l: If l = α n,forα N, the varable B l follows a normal dstrbuton N μ 1, σ1 2 for all columns of T l. In ths case, usng the property 1, the mean E l wll follow: E l N μ 1, σ l We can note that the mean E l wll be close to M/q. If l = α n,forα N: Ifthe -th column s an almost dependent column, the varable B l wll follow the normal dstrbuton of parameters N μ 0, σ 2 0. If the -th column s not an almost dependent column, the varable B l wll follow the normal dstrbuton of parameters N μ 1, σ 2 1. Thereby, the mean E l s gven by: E l N Ql μ0 + l μ 1 l, Ql σ l σ 2 1 l 2 where Ql s the number of almost dependent columns n the matrx R l such that: Ql = Card { [[ 0, l]], B l > ˆη opt } where Cardx s the cardnal functon whch returns the set sze. l = l Ql s the number of ndependent columns n the same matrx. In the noseless envronment, the mean E l s stable at: E l = M q n + q n 23

9 Zrell et al. EURASIP Journal on Wreless Communcatons and Networng :43 Page 9 of 16 We note two behavors of E l wth respect to l = α n or l = α n: If l = α n then E l M q If l = α n then E l > M 24 q The gap between these behavors allows us to fnd the matrces whch have the number of columns l = α n. Let J be a set of l-values where the gap E l M q > 0: J = {l = 1,, l max E l Mq } > 0 25 Thereby, the dentfed length of the code words wll be such that: ñ = modedffj 26 wherethefunctons dffx and modex aredefnedby: Functon dffx: the output of ths functon s a vector of sze s 1 and t corresponds to the dfference between two consecutve elements of the vector x = x1 x2 xs : Algorthm 2 The algorthm based on the arthmetc mean calculaton Requre: r, M, q and maxmum number of teratons t max Ensure: Identfed code word length ñ Intalze the number of teratons t = 1 Intalze the stop crteron end t = 0 whle end t = 0 do for l = 1tol max do Buld matrx R l of sze M l R l T l = R l à l for = 1tol do Count B l end for Compute E l end for Create the set J 25 f J s empty then f t < t max then t = t + 1 Permute randomly the rows of R l else end t = 1 end f else Determne ñ 26 end t = 1 end f end whle dffx = x2 x1 xs xs 1 27 Functon modex: ths operaton provdes the value whch has the hghest occurrence n the vector x. The proposed teratve method of the code word length dentfcaton s summarzed n the Algorthm 2. Example 1. Let us consder the Reed-Solomon code, denoted RS15, 11, overgf2 4 whch s defned by: n = 15 and = 11. The mean E l normalzed by M, whchs set to 1,000, s represented n Fgures 5 and 6. In Fgure 5, a zero probablty of error.e., p e = 0 s consdered. For Fgure 5 Gap between the mean E l /M and 1/q of RS15, 11 over GF2 4 forp e = 0. The mean E l normalzed by M = 1, 000 s represented n the case of p e = 0.

10 Zrell et al. EURASIP Journal on Wreless Communcatons and Networng :43 Page 10 of 16 Fgure 6 Gap between the mean E l /M and 1/q of RS15, 11 over GF2 4 forp e = The mean E l normalzed by M = 1, 000 s represented n the case of p e = l = α n, we can verfy that the mean E l normalzed by M s stable at 1/q = For l = α n,themeane l meets 23: 1 q n + = q n So, the matrces of sze l = α n have peas for E l M 1 q = 0.25 > 0. In Fgure 6, the gap E l M 1 q s represented wth respect to l when p e = 0.01 for one teraton of our algorthm. Accordng to 25, the set J s shown n Table 1. Henceforth, usng 26, the dentfed length of the code words s ñ = 15. Analyss and performances The am of our proposed algorthm s to blndly dentfy the length of non-bnary code words n nosy envronment. Ths purpose can be reached wth an average complexty equal to OM l 3 max t max. Indeed,theproposed algorthm performs l max 1 t max processes of Gaussan elmnatons whch have an average complexty equal to OM l 2,wherel = 2 l max.so,theaverage complexty s such that: O M t max l max l 2 t=1 l=2 = OM lmax 3 t max 28 Table 1 Szes of the matrces R l for E l M 1 q > 0 l J dffj The szes of matrces for whch El M 1 q > 0, J,andthesetdffJ are gven for p e = 0.01 nthecaseofrs15, 11 over GF2 4. In order to analyze the performances of our blnd dentfcaton method, the probablty of correct detecton ofthecodewordlengthn s chosen as a performance crteron. In the smulatons, our method s appled to the non-bnary LDPC codes whch became canddate for future communcaton systems. For each smulaton, 2,000 Monte Carlo trals are run where the data symbols are randomly chosen at each tral. In ths part, we focus on: the gan of the teraton process on the detecton probablty of n the performance comparson n the case of dfferent channels the mpact of ncreasng the Galos feld dmenson q on the detecton probabltes of n the mpact of ncreasng the code word length n on the detecton probabltes for a gven q Gan of the teratve process In our smulatons, we consder a LDPC n = 6, = 3 over GF4. Fgure 7 shows the probablty of detectng n accordng to p e for one, three, fve, and ten teratons. We can see that the gan between the frst and the tenth teraton s sgnfcantly mportant. Indeed, for p e = 0.07, wth one teraton, the detecton probablty s equal to 0.76 and t becomes equal to 0.99 after 10 teratons. We can deduce that the teratve process mproves sgnfcantly the detecton performances of the blnd dentfcaton method based on the mean calculaton. Performance comparson n the case of dfferent channels Let us llustrate the detecton obtaned by the proposed method for a LDPC n = 16, = 8 over GF8 when an AWGN channel the frst channel and a multpath Raylegh channel assocated to an AWGN channel the

11 Zrell et al. EURASIP Journal on Wreless Communcatons and Networng :43 Page 11 of Detecton Probablty of n t=1 t=3 t=5 t= p e Fgure 7 The detecton probablty of the method based on the mean calculaton for LDPC n = 6, = 3nGF4. For LDPC n = 6, = 3 n GF4, the probablty of detectng n s depcted compared wth the error probablty p e for one, three, fve, and ten teratons. second channel are consdered. In order to compensate and reduce the nter-symbol nterference ISI caused by the multpath propagaton, a lnear mean square error MSE equalzer of length 20 was used. We evaluate the performances of our method when the QAM or PAM modulaton of order 8 8-QAM and 8- PAM s used to transmt the symbols coded by LDPC n = 16, = 8 over GF8. In Fgures 8 and 9, a comparson of performances of our blnd dentfcaton method usng 8-PAM or 8-QAM modulatons n the case of an AWGN channel and a multpath channel wth path number L path = 4andt max = 1spresented.InFgure8,a comparson of the detecton performances of our method n the case of AWGN channel s depcted. We can see that the proposed method for 8-QAM modulaton gves better performances than for 8-PAM modulaton when SNR< PAM, AWGN 8 QAM, AWGN 0.8 Detecton Probablty of n SNRdB Fgure 8 The detecton probablty of the method based on the mean calculaton for LDPC n = 16, = 8 n the case of AWGN channel. For LDPC n = 16, = 8 over GF8, the detecton probabltes of the method based on the mean calculaton n the case of AWGN channel are depcted when a 8-PAM and 8-QAM modulatons are used.

12 Zrell et al. EURASIP Journal on Wreless Communcatons and Networng :43 Page 12 of Detecton Probablty of n PAM, multpath Raylegh channel 8 QAM, multpath Raylegh channel SNR db Fgure 9 The detecton probablty of the method based on the mean calculaton n the case of multpath Raylegh channel. For LDPC n = 16, = 8 over GF8, the detecton probabltes of our method are depcted n the case of multpath Raylegh channel wth L path = 4when 8-PAM and 8-QAM modulatons are used. 18 db. The gan between both s equal to 5 db. However, for SNR > 18 db, the performances are smlar and the detecton probablty s equal to 1. To obtan the detecton probabltes presented n Fgure 9, the modulated symbols by 8-PAM or 8-QAM modulatons are transmtted n a quas-statc Raylegh fadng multpath channel wth path number L path = 4, then the receved symbols are treated by the lnear MSE equalzer of length 20. We can observe that, n the case of 8-QAM, our proposed method provdes better performances than for 8-PAM. A gan equal to 5 db s exhbted. We have chosen to evaluate our proposed methods n the worst case of 8-PAM modulaton because our am was to show that our method has the best performances even n the case of the PAM modulaton. In the followng, the performance study of the mpact of n and q on the proposed method s presented. Impact of ncreasng q Let us consder a LDPC n = 6, = 3, constructed n the Galos feld GFq, where q = 4, 8, 16. The matrces R l are reshaped from L = 30, 000 receved symbols wth l = 2,,30and M = 1, 000. For each value of q, the method based on the mean calculaton s appled to blndly dentfy the code word length of LDPC n = 6, = 3 over GFq whent max = 1. Fgure 10 depcts the probablty of detectng the correct n by our blnd dentfcaton method accordng to the error probablty p e n the cases of GF4, GF8, and GF16. Ths fgure shows that the curve behavor s nearly smlar for all q = 4, 8, 16. We can deduce that the method based on the mean calculaton s slghtly senstve to the ncrease of the Galos feld dmenson q. Impact of ncreasng n To evaluate the detecton performances of our blnd dentfcaton method, the mpact of ncreasng the code word length should be studed. In our smulatons, we consder two LDPC codes over GF8, a LDPC n = 6, = 3 and aldpcn = 16, = 8. The matrces R l are reshaped from L = 64, 000 receved symbols wth l = 2,,64 and M = 1, 000. For each code, the method based on the mean calculaton s appled to blndly dentfy the code word length n when t max = 1. Fgure 11 shows the detecton probabltes of n by the method based on the mean calculaton. We can note that the ncrease of the code word length leads to lower detecton performances wth our proposed method. Indeed, for p e = 0.01, the detecton probablty of the method of the mean calculaton s constant and equal to 1 n the case of the two codes. For p e = 0.02, the detecton probablty decreases from 0.99 to In order to show that our method wors n the case of codes of a reasonable code word length, we computed the detecton probablty of the Reed-Solomon code RS n = 31, = 25 over GF32 whch corresponds to an equvalent code over GF2 of length m n = 5 31 = 155. For an error probablty p e = 0.01 and 1,000 trals

13 Zrell et al. EURASIP Journal on Wreless Communcatons and Networng :43 Page 13 of Detecton Probablty of n GF4 GF8 GF p e Fgure 10 Impact of the Galos feld dmenson q on the detecton probablty of n by the proposed method consderng t max = 1. For LDPC n = 6, = 3, the probablty of detectng the correct n by the method based on the arthmetc mean computaton s depcted accordng to the error probablty p e n the cases of GF4, GF8, and GF16. of Monte Carlo, we obtaned a detecton probablty of 0.87 for t max = 50. Ths probablty can be mproved by ncreasng the number of teraton of our algorthm. For t max = 100, we obtaned a detecton probablty of Conclusons In ths paper, we have ntroduced an algorthm devoted to the blnd dentfcaton of the code word length for a nonbnary code n a nosy transmsson envronment. Usng ths algorthm, the code word length can be dentfed by Detecton Probablty of n n=6 n= p e Fgure 11 Impact of ncreasng n on the detecton probablty for LDPC codes. Of szes n = 6andn = 16 by usng the proposed method consderng t max = 1. For LDPC n = 6, = 3 and LDPC n = 16, = 8 over GF8, the probablty of detectng the correct n by the method based on the arthmetc mean calculaton s depcted accordng to the error probablty p e.

14 Zrell et al. EURASIP Journal on Wreless Communcatons and Networng :43 Page 14 of 16 calculatng the arthmetc mean of the number of zeros that occur n the columns of the matrx obtaned by the Gauss elmnaton. We have shown that the proposed algorthm s robust because t does not requre the estmaton of error probablty, s nsenstve to the hgh order of Galos feld, and has the best detecton performances for the most of modulaton types. Furthermore, ths method provdes better performances of detecton when an teratve process s consdered n order to ncrease the probablty to obtan non-erroneous pvots durng the Gauss elmnaton. Our future wor wll focus on dentfyng the remander of the non-bnary code parameters as well as a party chec matrx, permttng to mplement a generc decoder n a nosy envronment. Furthermore, a method based on usng soft nformaton that allows us to mprove the performances of the blnd dentfcaton algorthms wll be publshed soon [31]. Appendx Proof of Equaton 8 We defne H 0 and H 1 by: H 0 f ã l C and H 1 f ã l / C 29 The two behavors of B l are lmted n 7. The am of ths appendx s to demonstrate 8. In order to determne the probabltes of P fa and P nd,weshouldstudythe behavors of the varable B l accordng to the hypotheses H 0 and H 1 : Under the hypothess H 0 : the varable B l follows a bnomal dstrbuton BM, P. So, the probablty that B l s greater than M q η s as follows: [ Pr B l > M ] q η H 0 = M = M q η +1 M P 1 P M 30 Under the hypothess H 1 : the varable B l follows a bnomal dstrbuton BM,1/q. So, the probablty that B l s less than or equal to M q η s as follows: [ Pr B l M ] q η H 1 = M q η =0 M q 1M q M 31 Usng these two probabltes, we wll calculate the false alarm probablty P fa, the probablty of not detectng a theoretcal dependent column P nd and the probablty of detecton P det. Calculaton of the false alarm probablty P fa : ths probablty corresponds to decde that a column ã l belongs to a dual code C even thought n realty t does not belong. Ths probablty can be determned by: [ P fa = Pr B l > M ] q η H 1 = M = M q η +1 M q 1M q M 32 Calculaton of the probablty of not detectng a theoretcal dependent column P nd : ths probablty corresponds to decde that a column ã l does not belong to C even thought n realty t belongs. Ths probablty can be determned by: [ P nd = Pr B l M ] q η H 0 = M q η =0 M P 1 P M 33 Calculaton of the probablty of detecton P det : ths probablty s defned by: [ P det = 1 P nd = Pr B l > M ] q η H 0 = M = M q η M P 1 P M Usng 32 and 34, the optmal threshold can be determned by: η opt = arg mn η P wd = arg mn η P nd + P fa = arg mn η 1 + P fa P det M = arg mn η 1 + M = Mq η +1 [q M q 1 M P 1 P M ] 35 Proof of the equaton 16 The probablty P s ntally expressed by 15. We denote P 1 s = Pr [X = s] and P 2 s = Pr

15 Zrell et al. EURASIP Journal on Wreless Communcatons and Networng :43 Page 15 of 16 [ s=1 ] a l e l = 0 such that these two probabltes are ndependent. Henceforth, 15 becomes: N l P = P P 1 s P 2 s 36 s=1 Assumng that the errors are ndependent from each other and unformly dstrbuted n GFq\{0},thevarable X follows a bnomal dstrbuton wth parameters N l and p e. Thereby, the probablty P 1 s s determned by: N l P 1 s = p e s 1 p e N l s 37 s The probablty P 2 s s the probablty of havng s=1 a l e l = 0whereel GFq\{0}. We demonstrate by the mathematcal nducton that the probablty P 2 s can be expressed by: P 2 s = 1 P 2s 1 38 q 1 We have P 2 0 = 1 because there are no erroneous postons. In the case of a sngle erroneous poston, we have P 2 1 = 0. However, consderng the example of GF2 2, the probablty P 2 s = 2 can be obtaned by the matrx M whose the ndexes of rows and columns correspond to non-zero elements of ths feld. The coeffcents of ths matrx correspond to the sum over GF2 2 ofthendexes of a row and a column. 032 M = If we have e l 2 a l 1, e l 1 GF2 2 2,and a l 2, GF2 2 2, the probablty of havng a l 1 e l 1 + al 2 e l 2 = 0wllbeP 22 = 3/9 = 1/3. The computed probablty verfes 38. We assume that 38 s verfed for s, and we demonstrate t for s+1. If we have s+1 =1 al e l = 0, we wll have e l s+1 = 1 s a l s+1 =1 a l e l that belongs to GFq wth a probablty equal to 1/q 1. Therefore, the probablty P 2 s + 1 s determned by: s P 2 s + 1 = Pr e l s+1 GFq, a l e l = 0 =1 s = Pr e l s+1 GFq Pr a l e l = 0 = P 2s q 1 = 1 P 2s q 1 =1 40 In order to smplfy the expresson of P 2 s, achange of varable s done by consderng ϕs = q 1 s 1 P 2 s. WhenP 2 s s replaced by ϕs, the expresson 38 becomes: ϕs + ϕs 1 = q 1 s 2 41 Denotng ρs = 1 s ϕs, the expresson 41 can be wrtten as: s 1 ρs = ρ1 + 1 q 42 =0 but, the sum s 1 =0 1 q s a geometrc sequence of common rato 1 q. So,tcanbewrttenas: s 1 1 q = 1 1s 1 q 1 s 1 q =0 43 The computaton of ρ1 gves ρ1 = 0. Therefore, usng 43 and 41, the smplfed expresson of P 2 s s wrtten as: P 2 s = 1s + q 1 s 1 q q 1 s 1 44 Usng 37 and 44, the overall probablty P s gven by: P = 1 q N l =0 N l =0 N l pe 1 p e Nl + q 1 N l pe 1 p e l N q 1 45 In order to smplfy ths equaton, the Newton s bnomal formula can be appled: Z + Y N l = N l =0 N l Z Y N l Thus, the probablty of havng an element of the -th column of T l equal to 0 s determned by: P = 1 + q 1 1 p e q q 1 q N l 46

16 Zrell et al. EURASIP Journal on Wreless Communcatons and Networng :43 Page 16 of 16 Competng nterests The authors declare that they have no competng nterests. Author detals 1 Unversté Européenne de Bretagne, 5 Boulevard Laënnec, Rennes, France. 2 Unversté de Brest; CNRS, UMR 6285 Lab-STICC, 6 avenue Vctor Le Gorgeu, Brest, France. 3 Unversté de Brest; CNRS UMR 6205, Laboratore de Mathématques Bretagne Atlantque, 6 avenue Vctor Le Gorgeu, Brest, France. Receved: 12 February 2014 Accepted: 11 February 2015 References 1. MC Davey, D MacKay, Low-densty party-chec codes over GFq. IEEE Commun. Lett. 2, JA Brffa, HG Schaathun, n 5th Internatonal Symposum on Turbo Codes and Related Topcs. Non-bnary turbo codes and applcatons IEEE Lausanne, D Declercq, M Fossorer, Decodng algorthms for nonbnary LDPC codes over GFq. IEEE Trans. Commun. 554, L Barnault, D Declercq, n Proceedngs ITW. Fast decodng algorthm for LDPC over GF2 q IEEE, Pars, France, 2003, pp A Vocla, D Declercq, F Verder, M Fossorer, P Urard, Low-complexty decodng for non-bnary LDPC codes n hgh order felds. IEEE Trans. Commun. 585, Yang Yu, W Chen, Desgn of low complexty non-bnary LDPC codes wth an approxmated performance-complexty tradeoff. IEEE Commun. Lett. 164, T Xa, HC Wu, Identfcaton of nonbnary LDPC codes usng average LLR of syndrome a posteror probablty. IEEE Commun. Lett. 177, J Stern, A method for fndng code words of small weght. Codng Theory Appl. 388, A Canteaut, F Chabaud, A new algorthm for fndng mnmum-weght words n a lnear code: applcaton to McEleces cryptosystem and to narrow-sense BCH codes of length 511. IEEE Trans. Inf. Theory. 44, A Valembos, Detecton and recognton of a bnary lnear code. Dscrete Appl. Math , M Cluzeau, n 2006 IEEE Internatonal Symposum on Informaton Theory. Bloc code reconstructon usng teratve decodng technques IEEE, Seattle, WA, 2006, pp M Cluzeau, M Fnasz, n IEEE Internatonal Symposum on Informaton Theory Recoverng a code s length and synchronzaton from a nosy ntercepted btstream IEEE, Seoul, 2009, pp M Côte, N Sendrer, n IEEE Internatonal Symposum on Informaton Theory ISIT. Reconstructon of convolutonal codes from nosy observaton IEEE, Seoul, 2009, pp G Burel, R Gauter, n IASTED Internatonal Conference on Communcatons, Internet and Informaton Technology. Blnd estmaton of encoder and nterleaver characterstcs n a non cooperatve context ACTA Press, Scottsdale, AZ, USA, Y Zrell, R Gauter, M Marazn, E Rannou, E Rado, Focus on theoretcal propertes of blnd convolutonal codes dentfcaton methods based on ran crteron. MTA Revew. XXII4, Y Zrell, M Marazn, R Gauter, E Rannou, n Proceedngs of the Internatonal Conference on Computer Communcaton Networs. Blnd dentfcaton of convolutonal encoder parameters over GF2 m n the noseless case IEEE, Mau, Hawa, G Scot, S Houce, n IEEE Internatonal Conference on Acoustcs, Speech and Sgnal Processng ICASSP, vol. 3. Blnd detecton of nterleaver parameters IEEE, Phladelpha, Pennsylvana, 2005, pp G Scot, S Houce, J Barber, Blnd detecton of nterleaver parameters. Sgnal Process. 894, M Marazn, R Gauter, G Burel, Blnd recovery of /n rate convolutonal encoders n a nosy envronment. EURASIP J. Wreless Commun. Netw , Z Jng, H Zhpng, L Chunwu, S Shaong, Z Ymeng, Informaton-dsperson-entropy-based blnd recognton of bnary BCH codes n soft decson stuatons. Entropy. 155, A Hocquenghem, Codes correcteurs d erreurs. Chffres. 2, RC Bose, DK Ray-Chaudhur, On a class of error correctng bnary group codes. Inf. Control. 33, I Reed, G Solomon, Polynomal codes over certan fnte felds. J. Soc. Ind. Appl. Math. 82, M Bald, M Banch, F Charaluce, R Garello, N Maturo, IA Sanchez, S Con, n 2013 IEEE Mltary Communcatons Conference. Advanced codng schemes aganst ammng n telecommand lns IEEE, San Dego, CA, 2013, pp C Junbn, W Ln, L Yong, n Internatonal Conference on Communcatons, Crcuts and Systems. Performance comparson between non-bnary LDPC codes and Reed-Solomon codes over nose bursts channels, vol. 1 IEEE, Hong Kong, Chna, 2005, pp B Zhou, L Zhang, J Kang, Q Huang, YY Ta, S Ln, M Xu, n Informaton Theory and Applcatons Worshop. Non-bnary LDPC codes vs. Reed-Solomon codes IEEE, San Dego, CA, 2008, pp verson Release 8 GT, LTE; Evolved Unversal Terrestral Rado Access E-UTRA; Multplexng and Channel Codng. The 3rd Generaton Partnershp Proect 2, Techncal Specfcaton Group Rado Access Networ M Marazn, R Gauter, G Burel, n IEEE GLOBECOM Worshops. Dual code method for blnd dentfcaton of convolutonal encoder for cogntve rado recever desgn IEEE, Honolulu, HI, EM Moro, Algebrac geometry modelng n nformaton theory. World Scentfc, Sngapore, E Anderson, Z Ba, C Bschof, S Blacford, J Demmel, J Dongarra, JD Croz, A Greenbaum, S Hammarlng, A McKenney, D Sorensen, LAPACK user s gude. SIAM, Phladelpha, Y Zrell, Identfcaton aveugle de codes correcteurs d erreurs basés sur des grands corps de Galos et recherche d algorthmes de type décson souple pour les codes convolutfs. PhD thess, Unversté de Brest, France, 2013 Submt your manuscrpt to a ournal and beneft from: 7 Convenent onlne submsson 7 Rgorous peer revew 7 Immedate publcaton on acceptance 7 Open access: artcles freely avalable onlne 7 Hgh vsblty wthn the feld 7 Retanng the copyrght to your artcle Submt your next manuscrpt at 7 sprngeropen.com

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Low Complexity Soft-Input Soft-Output Hamming Decoder

Low Complexity Soft-Input Soft-Output Hamming Decoder Low Complexty Soft-Input Soft-Output Hammng Der Benjamn Müller, Martn Holters, Udo Zölzer Helmut Schmdt Unversty Unversty of the Federal Armed Forces Department of Sgnal Processng and Communcatons Holstenhofweg

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Composite Hypotheses testing

Composite Hypotheses testing Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Linear Approximation with Regularization and Moving Least Squares

Linear Approximation with Regularization and Moving Least Squares Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models

More information

Asymptotics of the Solution of a Boundary Value. Problem for One-Characteristic Differential. Equation Degenerating into a Parabolic Equation

Asymptotics of the Solution of a Boundary Value. Problem for One-Characteristic Differential. Equation Degenerating into a Parabolic Equation Nonl. Analyss and Dfferental Equatons, ol., 4, no., 5 - HIKARI Ltd, www.m-har.com http://dx.do.org/.988/nade.4.456 Asymptotcs of the Soluton of a Boundary alue Problem for One-Characterstc Dfferental Equaton

More information

Consider the following passband digital communication system model. c t. modulator. t r a n s m i t t e r. signal decoder.

Consider the following passband digital communication system model. c t. modulator. t r a n s m i t t e r. signal decoder. PASSBAND DIGITAL MODULATION TECHNIQUES Consder the followng passband dgtal communcaton system model. cos( ω + φ ) c t message source m sgnal encoder s modulator s () t communcaton xt () channel t r a n

More information

Average Decision Threshold of CA CFAR and excision CFAR Detectors in the Presence of Strong Pulse Jamming 1

Average Decision Threshold of CA CFAR and excision CFAR Detectors in the Presence of Strong Pulse Jamming 1 Average Decson hreshold of CA CFAR and excson CFAR Detectors n the Presence of Strong Pulse Jammng Ivan G. Garvanov and Chrsto A. Kabachev Insttute of Informaton echnologes Bulgaran Academy of Scences

More information

An Improved multiple fractal algorithm

An Improved multiple fractal algorithm Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton

More information

Research Article Green s Theorem for Sign Data

Research Article Green s Theorem for Sign Data Internatonal Scholarly Research Network ISRN Appled Mathematcs Volume 2012, Artcle ID 539359, 10 pages do:10.5402/2012/539359 Research Artcle Green s Theorem for Sgn Data Lous M. Houston The Unversty of

More information

Chapter 6. BCH Codes

Chapter 6. BCH Codes Wreless Informaton Transmsson System Lab Chapter 6 BCH Codes Insttute of Communcatons Engneerng Natonal Sun Yat-sen Unversty Outlne Bnary Prmtve BCH Codes Decodng of the BCH Codes Implementaton of Galos

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Chapter 7 Channel Capacty and Codng Contents 7. Channel models and channel capacty 7.. Channel models Bnary symmetrc channel Dscrete memoryless channels Dscrete-nput, contnuous-output channel Waveform

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

High-Speed Decoding of the Binary Golay Code

High-Speed Decoding of the Binary Golay Code Hgh-Speed Decodng of the Bnary Golay Code H. P. Lee *1, C. H. Chang 1, S. I. Chu 2 1 Department of Computer Scence and Informaton Engneerng, Fortune Insttute of Technology, Kaohsung 83160, Tawan *hpl@fotech.edu.tw

More information

An Application of Fuzzy Hypotheses Testing in Radar Detection

An Application of Fuzzy Hypotheses Testing in Radar Detection Proceedngs of the th WSES Internatonal Conference on FUZZY SYSEMS n pplcaton of Fuy Hypotheses estng n Radar Detecton.K.ELSHERIF, F.M.BBDY, G.M.BDELHMID Department of Mathematcs Mltary echncal Collage

More information

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U) Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of

More information

Digital Modems. Lecture 2

Digital Modems. Lecture 2 Dgtal Modems Lecture Revew We have shown that both Bayes and eyman/pearson crtera are based on the Lkelhood Rato Test (LRT) Λ ( r ) < > η Λ r s called observaton transformaton or suffcent statstc The crtera

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k) ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of

More information

Refined Coding Bounds for Network Error Correction

Refined Coding Bounds for Network Error Correction Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

Parametric fractional imputation for missing data analysis. Jae Kwang Kim Survey Working Group Seminar March 29, 2010

Parametric fractional imputation for missing data analysis. Jae Kwang Kim Survey Working Group Seminar March 29, 2010 Parametrc fractonal mputaton for mssng data analyss Jae Kwang Km Survey Workng Group Semnar March 29, 2010 1 Outlne Introducton Proposed method Fractonal mputaton Approxmaton Varance estmaton Multple mputaton

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

Lecture 12: Classification

Lecture 12: Classification Lecture : Classfcaton g Dscrmnant functons g The optmal Bayes classfer g Quadratc classfers g Eucldean and Mahalanobs metrcs g K Nearest Neghbor Classfers Intellgent Sensor Systems Rcardo Guterrez-Osuna

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Lossy Compression. Compromise accuracy of reconstruction for increased compression.

Lossy Compression. Compromise accuracy of reconstruction for increased compression. Lossy Compresson Compromse accuracy of reconstructon for ncreased compresson. The reconstructon s usually vsbly ndstngushable from the orgnal mage. Typcally, one can get up to 0:1 compresson wth almost

More information

Learning Theory: Lecture Notes

Learning Theory: Lecture Notes Learnng Theory: Lecture Notes Lecturer: Kamalka Chaudhur Scrbe: Qush Wang October 27, 2012 1 The Agnostc PAC Model Recall that one of the constrants of the PAC model s that the data dstrbuton has to be

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl RECURSIVE SPLINE INTERPOLATION METHOD FOR REAL TIME ENGINE CONTROL APPLICATIONS A. Stotsky Volvo Car Corporaton Engne Desgn and Development Dept. 97542, HA1N, SE- 405 31 Gothenburg Sweden. Emal: astotsky@volvocars.com

More information

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1]

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1] DYNAMIC SHORTEST PATH SEARCH AND SYNCHRONIZED TASK SWITCHING Jay Wagenpfel, Adran Trachte 2 Outlne Shortest Communcaton Path Searchng Bellmann Ford algorthm Algorthm for dynamc case Modfcatons to our algorthm

More information

Introduction to Information Theory, Data Compression,

Introduction to Information Theory, Data Compression, Introducton to Informaton Theory, Data Compresson, Codng Mehd Ibm Brahm, Laura Mnkova Aprl 5, 208 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on the 3th of March 208 for a Data Structures

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

Multigradient for Neural Networks for Equalizers 1

Multigradient for Neural Networks for Equalizers 1 Multgradent for Neural Netorks for Equalzers 1 Chulhee ee, Jnook Go and Heeyoung Km Department of Electrcal and Electronc Engneerng Yonse Unversty 134 Shnchon-Dong, Seodaemun-Ku, Seoul 1-749, Korea ABSTRACT

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

On the spectral norm of r-circulant matrices with the Pell and Pell-Lucas numbers

On the spectral norm of r-circulant matrices with the Pell and Pell-Lucas numbers Türkmen and Gökbaş Journal of Inequaltes and Applcatons (06) 06:65 DOI 086/s3660-06-0997-0 R E S E A R C H Open Access On the spectral norm of r-crculant matrces wth the Pell and Pell-Lucas numbers Ramazan

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

= z 20 z n. (k 20) + 4 z k = 4

= z 20 z n. (k 20) + 4 z k = 4 Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5

More information

4DVAR, according to the name, is a four-dimensional variational method.

4DVAR, according to the name, is a four-dimensional variational method. 4D-Varatonal Data Assmlaton (4D-Var) 4DVAR, accordng to the name, s a four-dmensonal varatonal method. 4D-Var s actually a drect generalzaton of 3D-Var to handle observatons that are dstrbuted n tme. The

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

A new Approach for Solving Linear Ordinary Differential Equations

A new Approach for Solving Linear Ordinary Differential Equations , ISSN 974-57X (Onlne), ISSN 974-5718 (Prnt), Vol. ; Issue No. 1; Year 14, Copyrght 13-14 by CESER PUBLICATIONS A new Approach for Solvng Lnear Ordnary Dfferental Equatons Fawz Abdelwahd Department of

More information

Beyond Zudilin s Conjectured q-analog of Schmidt s problem

Beyond Zudilin s Conjectured q-analog of Schmidt s problem Beyond Zudln s Conectured q-analog of Schmdt s problem Thotsaporn Ae Thanatpanonda thotsaporn@gmalcom Mathematcs Subect Classfcaton: 11B65 33B99 Abstract Usng the methodology of (rgorous expermental mathematcs

More information

Estimating the Fundamental Matrix by Transforming Image Points in Projective Space 1

Estimating the Fundamental Matrix by Transforming Image Points in Projective Space 1 Estmatng the Fundamental Matrx by Transformng Image Ponts n Projectve Space 1 Zhengyou Zhang and Charles Loop Mcrosoft Research, One Mcrosoft Way, Redmond, WA 98052, USA E-mal: fzhang,cloopg@mcrosoft.com

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

Multiple Sound Source Location in 3D Space with a Synchronized Neural System

Multiple Sound Source Location in 3D Space with a Synchronized Neural System Multple Sound Source Locaton n D Space wth a Synchronzed Neural System Yum Takzawa and Atsush Fukasawa Insttute of Statstcal Mathematcs Research Organzaton of Informaton and Systems 0- Mdor-cho, Tachkawa,

More information

MAXIMUM A POSTERIORI TRANSDUCTION

MAXIMUM A POSTERIORI TRANSDUCTION MAXIMUM A POSTERIORI TRANSDUCTION LI-WEI WANG, JU-FU FENG School of Mathematcal Scences, Peng Unversty, Bejng, 0087, Chna Center for Informaton Scences, Peng Unversty, Bejng, 0087, Chna E-MIAL: {wanglw,

More information

On an Extension of Stochastic Approximation EM Algorithm for Incomplete Data Problems. Vahid Tadayon 1

On an Extension of Stochastic Approximation EM Algorithm for Incomplete Data Problems. Vahid Tadayon 1 On an Extenson of Stochastc Approxmaton EM Algorthm for Incomplete Data Problems Vahd Tadayon Abstract: The Stochastc Approxmaton EM (SAEM algorthm, a varant stochastc approxmaton of EM, s a versatle tool

More information

Winter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan

Winter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan Wnter 2008 CS567 Stochastc Lnear/Integer Programmng Guest Lecturer: Xu, Huan Class 2: More Modelng Examples 1 Capacty Expanson Capacty expanson models optmal choces of the tmng and levels of nvestments

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

Copyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for P Charts. Dr. Wayne A. Taylor

Copyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for P Charts. Dr. Wayne A. Taylor Taylor Enterprses, Inc. Control Lmts for P Charts Copyrght 2017 by Taylor Enterprses, Inc., All Rghts Reserved. Control Lmts for P Charts Dr. Wayne A. Taylor Abstract: P charts are used for count data

More information

18.1 Introduction and Recap

18.1 Introduction and Recap CS787: Advanced Algorthms Scrbe: Pryananda Shenoy and Shjn Kong Lecturer: Shuch Chawla Topc: Streamng Algorthmscontnued) Date: 0/26/2007 We contnue talng about streamng algorthms n ths lecture, ncludng

More information

Inductance Calculation for Conductors of Arbitrary Shape

Inductance Calculation for Conductors of Arbitrary Shape CRYO/02/028 Aprl 5, 2002 Inductance Calculaton for Conductors of Arbtrary Shape L. Bottura Dstrbuton: Internal Summary In ths note we descrbe a method for the numercal calculaton of nductances among conductors

More information

Supporting Information

Supporting Information Supportng Informaton The neural network f n Eq. 1 s gven by: f x l = ReLU W atom x l + b atom, 2 where ReLU s the element-wse rectfed lnear unt, 21.e., ReLUx = max0, x, W atom R d d s the weght matrx to

More information

DC-Free Turbo Coding Scheme Using MAP/SOVA Algorithms

DC-Free Turbo Coding Scheme Using MAP/SOVA Algorithms Proceedngs of the 5th WSEAS Internatonal Conference on Telecommuncatons and Informatcs, Istanbul, Turkey, May 27-29, 26 (pp192-197 DC-Free Turbo Codng Scheme Usng MAP/SOVA Algorthms Prof. Dr. M. Amr Mokhtar

More information

Iterative Multiuser Receiver Utilizing Soft Decoding Information

Iterative Multiuser Receiver Utilizing Soft Decoding Information teratve Multuser Recever Utlzng Soft Decodng nformaton Kmmo Kettunen and Tmo Laaso Helsn Unversty of Technology Laboratory of Telecommuncatons Technology emal: Kmmo.Kettunen@hut.f, Tmo.Laaso@hut.f Abstract

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Performing Modulation Scheme of Chaos Shift Keying with Hyperchaotic Chen System

Performing Modulation Scheme of Chaos Shift Keying with Hyperchaotic Chen System 6 th Internatonal Advanced echnologes Symposum (IAS 11), 16-18 May 011, Elazığ, urkey Performng Modulaton Scheme of Chaos Shft Keyng wth Hyperchaotc Chen System H. Oğraş 1, M. ürk 1 Unversty of Batman,

More information

The Exact Formulation of the Inverse of the Tridiagonal Matrix for Solving the 1D Poisson Equation with the Finite Difference Method

The Exact Formulation of the Inverse of the Tridiagonal Matrix for Solving the 1D Poisson Equation with the Finite Difference Method Journal of Electromagnetc Analyss and Applcatons, 04, 6, 0-08 Publshed Onlne September 04 n ScRes. http://www.scrp.org/journal/jemaa http://dx.do.org/0.46/jemaa.04.6000 The Exact Formulaton of the Inverse

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

Report on Image warping

Report on Image warping Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016 U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and

More information

Lecture 4: Constant Time SVD Approximation

Lecture 4: Constant Time SVD Approximation Spectral Algorthms and Representatons eb. 17, Mar. 3 and 8, 005 Lecture 4: Constant Tme SVD Approxmaton Lecturer: Santosh Vempala Scrbe: Jangzhuo Chen Ths topc conssts of three lectures 0/17, 03/03, 03/08),

More information

Chapter 13: Multiple Regression

Chapter 13: Multiple Regression Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to

More information

The Geometry of Logit and Probit

The Geometry of Logit and Probit The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.

More information

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017

More information

x i1 =1 for all i (the constant ).

x i1 =1 for all i (the constant ). Chapter 5 The Multple Regresson Model Consder an economc model where the dependent varable s a functon of K explanatory varables. The economc model has the form: y = f ( x,x,..., ) xk Approxmate ths by

More information

Half Rate Quasi Cyclic Low Density Parity Check Codes Based on Combinatorial Designs

Half Rate Quasi Cyclic Low Density Parity Check Codes Based on Combinatorial Designs Journal of Computer and Communcatons, 06, 4, 39-49 http://www.scrp.org/journal/jcc ISSN Onlne: 37-57 ISSN Prnt: 37-59 Half Rate Quas Cyclc Low Densty Party Check Codes Based on Combnatoral Desgns Sna Vaf,

More information

Statistical Energy Analysis for High Frequency Acoustic Analysis with LS-DYNA

Statistical Energy Analysis for High Frequency Acoustic Analysis with LS-DYNA 14 th Internatonal Users Conference Sesson: ALE-FSI Statstcal Energy Analyss for Hgh Frequency Acoustc Analyss wth Zhe Cu 1, Yun Huang 1, Mhamed Soul 2, Tayeb Zeguar 3 1 Lvermore Software Technology Corporaton

More information

An identification algorithm of model kinetic parameters of the interfacial layer growth in fiber composites

An identification algorithm of model kinetic parameters of the interfacial layer growth in fiber composites IOP Conference Seres: Materals Scence and Engneerng PAPER OPE ACCESS An dentfcaton algorthm of model knetc parameters of the nterfacal layer growth n fber compostes o cte ths artcle: V Zubov et al 216

More information

Lecture 10 Support Vector Machines II

Lecture 10 Support Vector Machines II Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

Markov Chain Monte Carlo Lecture 6

Markov Chain Monte Carlo Lecture 6 where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Asymptotic Quantization: A Method for Determining Zador s Constant

Asymptotic Quantization: A Method for Determining Zador s Constant Asymptotc Quantzaton: A Method for Determnng Zador s Constant Joyce Shh Because of the fnte capacty of modern communcaton systems better methods of encodng data are requred. Quantzaton refers to the methods

More information

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family IOSR Journal of Mathematcs IOSR-JM) ISSN: 2278-5728. Volume 3, Issue 3 Sep-Oct. 202), PP 44-48 www.osrjournals.org Usng T.O.M to Estmate Parameter of dstrbutons that have not Sngle Exponental Famly Jubran

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information