A General Procedure to Design Good Codes at a Target BER

Size: px
Start display at page:

Download "A General Procedure to Design Good Codes at a Target BER"

Transcription

1 A General Procedure to Design Good odes at a Target BER Speaker: Xiao Ma 1 maxiao@mail.sysu.edu.cn Joint work with: hulong Liang 1, Qiutao Zhuang 1, and Baoming Bai 2 1 Dept. Electronics and omm. Eng., Sun Yat-sen University, Guangzhou , GD, hina 2 The State Key Lab of ISN, Xidian University, Xi an , SN, hina IST, Bremen, August 19, Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

2 Outline 1 Review of BMST Repetition Increases Reliability Superposition Increases Efficiency 2 A General Procedure of Designing BMST 3 Genie-aided Bounds 4 Two-phase Decoding 5 Simulation Results 6 onclusions and Future Works. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

3 Outline 1 Review of BMST Repetition Increases Reliability Superposition Increases Efficiency 2 A General Procedure of Designing BMST 3 Genie-aided Bounds 4 Two-phase Decoding 5 Simulation Results 6 onclusions and Future Works. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

4 Repetition Increases Reliability 10 0 u Enc v m c (0) w (1) w (m) BI- BI- BI- y (0) y (1) y (m) BER once SNR (db) The codeword is transmitted once. We assume a basic code [n,k], whose performance curve in terms of BER versus SNR is available. In this talk, we assume that [N,K ] B, the B-fold artesian product of a short block code [N,K ], consisting of all vectors of the form (v 0,v 1,,v B 1 ), where each v i is a codeword in the [N,K ] code for 0 i B 1.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

5 Repetition Increases Reliability 10 0 u Enc v m c (0) c (1) c (m) BI- BI- BI- y (0) y (1) y (m) BER twice 10log 10 (2) once SNR (db) The same codeword is transmitted twice. The performance curve shifts to the left by 3 db.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

6 Repetition Increases Reliability 10 0 u Enc v m c (0) c (1) c (m) BI- BI- BI- y (0) y (1) y (m) BER m1 times twice 10log 10 (2) once 10log 10 (m1) SNR (db) The same codeword is transmitted m1 times. The performance curve shifts to the left by 10log 10 (m1) db. Repetition increases reliability but decreases efficiency (code rate).. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

7 Superposition Increases Efficiency 10 0 u u Enc u Enc v Enc w w v v w w w c BI- y w c BI- y c BI- y BER once SNR (db) The first transmission Initially, the transmitter sends a codeword from the code that corresponds to the first data block.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

8 Superposition Increases Efficiency 10 0 u u Enc u Enc Enc v v w w v w c BI- y w w c BI- y w c BI- y BER log 10 (2) twice once SNR (db) The second transmission Since the short code is weak, the receiver is unable to recover reliably the data from the current received block. Hence the transmitter transmits the codeword (possibly in its interleaved version) one more time.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

9 Superposition Increases Efficiency 10 0 u u Enc u Enc Enc v v w w v w c BI- y w w c BI- y w c BI- y BER BMST 10log 10 (2) twice once SNR (db) The second transmission Since the short code is weak, the receiver is unable to recover reliably the data from the current received block. Hence the transmitter transmits the codeword (possibly in its interleaved version) one more time. In the meanwhile, a fresh codeword from that corresponds to the second data block is superimposed on the second block transmission.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

10 Superposition Increases Efficiency u # u Enc Enc v v # # w!#"# u!$ Enc v $ w!$" w!#% # w!"# c w!% c # c $ BI- y BI- BI- y # y $ BER BMST 10log 10 (2) twice once SNR (db) The third transmission for encoding memory m 1 In the third transmission, the current codeword v (2) is superimposed to ( mixed into ) the previous codeword v (1) and then transmitted. This system can be iteratively decoded by passing extrinsic messages between adjacent layers. The performance is intuitively lower bounded by the repetition system.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

11 Superposition Increases Efficiency 10 0 u &( u &'( Enc Enc w )*,.( u ),( Enc v &,( v &'( v &(,-, w ),*'( w )'*,( w )/'( w )'*( Transmission with memory m c &'( BI- y &'( w )'/'( c &( BI- y &( c &,( BI- y &,( BER BMST twice BMST m1 times 10log 10 (2) once 10log (m1) SNR (db) Generally, for a BMST system with memory m, the t-th transmission is a superposition of the current codeword and the m consecutive past codewords, all in their randomly-interleaved version. The code rate remains almost the same, except that termination is needed, while the minimum distance increases very likely by m times for large B m. Hence the error floor can be predicted by shifting the performance curve to the left by 10log 10 (m1) db.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

12 Summary The BMST system The encoding diagram of a BMST system with memory m. c (t) m-1 m u (t) EN D D D v (t) v (t-1) v (t-2) v (t-m1) v (t-m) The normal graph for a BMST system with L4 and m 2. (0) (1) (2) (3) (4) (5) V (0) V (1) V (2) V (3) a decoding layer U (0) U (1) U (2) U (3). Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

13 Summary The BMST system The encoding diagram of a BMST system with memory m. c (t) m-1 m u (t) EN D D D v (t) v (t-1) v (t-2) v (t-m1) v (t-m) The normal graph for a BMST system with L4 and m 2. (0) (1) (2) (3) (4) (5) V (0) V (1) V (2) V (3) a decoding layer U (0) U (1) U (2) The lower bound can be obtained by shifting the performance curve of the basic code to the left by 10log 10 (m1) db. U (3). Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

14 Outline 1 Review of BMST 2 A General Procedure of Designing BMST 3 Genie-aided Bounds 4 Two-phase Decoding 5 Simulation Results 6 onclusions and Future Works. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

15 A General Procedure of Designing BMST With the genie-aided lower bound, to construct a BMST system of a given rate R with a target BER of p target, we can perform the following steps. 1 Take a code [N,K ] B with the given rate R as the basic code. In order to approach the channel capacity, we set the code length n NB in our simulations; 2 Find the performance curve f basic (γ b ) of the basic code. From this curve, find the required SNR ( 1 ) to achieve the target BER. That is, findγ σ 2 target such that f basic (γ target ) p target ; 3 Find the Shannon limit for the code rate, denoted byγ lim ; 4 Determine the encoding memory by 10log 10 (m1) γ target γ lim. That is, m 10 γ target γ lim 10 1, (1) where x stands for the integer that is closest to x. 5 Generate m 1 interleavers randomly.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

16 onstruction Examples BMST with Different ode Rates Table: The encoding memories required to approach the corresponding Shannon limits using BMST systems for different code rates at given target BERs Basic codes p target γ target (db) γ lim (db) γ target γ lim (db) m R [8,1] R [8,1] R [4,1] R [4,1] R [2,1] R [2,1] R [2,1] R [2,1] SP [4,3] SP [4,3] SP [8,7] SP [8,7] Liang, X. Ma, Q. Zhuang, and B. Bai, Spatial coupling of generator matrix: A general approach to design of good codes at a target BER, submitted to IEEE Trans. ommun.. [Online]. Available: Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

17 A onstruction Example BMST with rate-1/ R[2,1] 10 2 BER SNR (db) Figure: Performance of the BMST systems with the R [2,1] 5000 as the basic code. The target BERs are 10 3 and The systems encode L sub-blocks of data and decode with the SWD algorithm of a maximum iteration I max 18.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

18 A onstruction Example BMST with rate-1/ R[2,1] Shannon limit of rate 1/ BER SNR (db) Figure: Performance of the BMST systems with the R [2,1] 5000 as the basic code. The target BERs are 10 3 and The systems encode L sub-blocks of data and decode with the SWD algorithm of a maximum iteration I max 18.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

19 A onstruction Example BMST with rate-1/ R[2,1] Shannon limit of rate 1/ BER dB SNR (db) Figure: Performance of the BMST systems with the R [2,1] 5000 as the basic code. The target BERs are 10 3 and The systems encode L sub-blocks of data and decode with the SWD algorithm of a maximum iteration I max 18.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

20 A onstruction Example BMST with rate-1/ R[2,1] Shannon limit of rate 1/2 Lower bound for m BER dB 10log 10 (41)dB SNR (db) Figure: Performance of the BMST systems with the R [2,1] 5000 as the basic code. The target BERs are 10 3 and The systems encode L sub-blocks of data and decode with the SWD algorithm of a maximum iteration I max 18.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

21 A onstruction Example BMST with rate-1/ R[2,1] Shannon limit of rate 1/2 Lower bound for m 4 BMST, m 4, d 12, p target 10 3 BER dB 10log 10 (41)dB SNR (db) Figure: Performance of the BMST systems with the R [2,1] 5000 as the basic code. The target BERs are 10 3 and The systems encode L sub-blocks of data and decode with the SWD algorithm of a maximum iteration I max 18.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

22 A onstruction Example BMST with rate-1/ R[2,1] Shannon limit of rate 1/2 Lower bound for m 4 BMST, m 4, d 12, p target 10 3 BER dB 10log 10 (41)dB dB SNR (db) Figure: Performance of the BMST systems with the R [2,1] 5000 as the basic code. The target BERs are 10 3 and The systems encode L sub-blocks of data and decode with the SWD algorithm of a maximum iteration I max 18.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

23 A onstruction Example BMST with rate-1/ R[2,1] Shannon limit of rate 1/2 Lower bound for m 4 BMST, m 4, d 12, p target 10 3 Lower bound for m 10 BER dB 10log 10 (41)dB dB 10log 10 (101)dB SNR (db) Figure: Performance of the BMST systems with the R [2,1] 5000 as the basic code. The target BERs are 10 3 and The systems encode L sub-blocks of data and decode with the SWD algorithm of a maximum iteration I max 18.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

24 A onstruction Example BMST with rate-1/2 BER R[2,1] Shannon limit of rate 1/2 Lower bound for m 4 BMST, m 4, d 12, p target 10 3 Lower bound for m 10 BMST, m 10, d 30, p 10 6 target 6.60dB 10log 10 (41)dB dB 10log 10 (101)dB SNR (db) Figure: Performance of the BMST systems with the R [2,1] 5000 as the basic code. The target BERs are 10 3 and The systems encode L sub-blocks of data and decode with the SWD algorithm of a maximum iteration I max 18.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

25 onstruction Examples BMST with Different ode Rates Shannon limit of rate 1/8 BMST, m 6, d 18, p target 10 3 BMST, m 14, d 42, p target 10 6 Lower bound for m 6 Lower bound for m 14 BER SNR (db) Figure: Performance of the BMST systems with the R [8,1] 1250 as the basic code. The target BERs are 10 3 and The systems encode L sub-blocks of data and decode with the SWD algorithm of a maximum iteration I max 18.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

26 onstruction Examples BMST with Different ode Rates Shannon limit of rate 1/4 BMST, m 5, d 15, p target 10 3 BMST, m 13, d 39, p target 10 6 Lower bound for m 5 Lower bound for m 13 BER SNR (db) Figure: Performance of the BMST systems with the R [4,1] 2500 as the basic code. The target BERs are 10 3 and The systems encode L sub-blocks of data and decode with the SWD algorithm of a maximum iteration I max 18.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

27 onstruction Examples BMST with Different ode Rates Shannon limit of rate 3/4 BMST, m 2, d 6, p target 10 3 BMST, m 5, d 15, p target 10 6 Lower bound for m 2 Lower bound for m 5 BER SNR (db) Figure: Performance of the BMST systems with the SP [4,3] 2500 as the basic code. The target BERs are 10 3 and The systems encode L sub-blocks of data and decode with the SWD algorithm of a maximum iteration I max 18.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

28 onstruction Examples BMST with Different ode Rates Shannon limit of rate 7/8 BMST, m 1, d 3, p target 10 3 BMST, m 3, d 9, p target 10 6 Lower bound for m 2 Lower bound for m 3 BER SNR (db) Figure: Performance of the BMST systems with the SP [8,7] 1250 as the basic code. The target BERs are 10 3 and The systems encode L sub-blocks of data and decode with the SWD algorithm of a maximum iteration I max 18.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

29 onstruction Examples BMST with Different ode Rates Rate (bits/channel use) Performance of the BMST system apacity bound with BPSK signalling SNR (db) Figure: The required SNRs (1/σ 2 ) for the BMST system using repetition codes and single-parity-check codes to achieve the BER of 10 6 over the BI-.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

30 onstruction Examples Hadamard Transform oset odes u 8 u 9:; 0 >?@A BDEFG HIJK 0 Π < H M T 8 T; T L Table: The Memory Required for Each ode Rate Using the BMST of HT-coset odes with N 8 to Approach the Shannon Limit at the BER of 10 5 Rate R K/8 1/8 2/8 3/8 4/8 5/8 6/8 7/8 γ K (db) γ K (db) Gapγ K γ K (db) Memory m K v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7. Liang, J.Hu, X. Ma, and B. Bai, A new class of multiple-rate codes based on block markov superposition transmission, submitted to IEEE Trans. Signal Process.. [Online]. Available: Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

31 BMST-HT Systems Rate (bits/channel use) Performance of the BMST HT system apacity bound with BPSK signalling SNR (db) Figure: The required SNRs (1/σ 2 ) for the BMST-HT system using the artesian products of HT-coset codes [8,K ] 1250 (1 K 7) to achieve the BER of 10 5 over the BI-.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

32 BMST-HT Systems Rate (bits/channel use) Performance of the BMST HT system apacity bound with BPSK signalling SNR (db) Figure: The required SNR for the BMST-HT system using the artesian products of HT-coset codes [16,K ] 625 (1 K 15) to achieve the BER of 10 5 over the BI-.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

33 onstructing BMST Systems with Extremely Low Error Floor From the previous examples, we can see that good codes can be constructed following the general procedure when the the target BER is around Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

34 onstructing BMST Systems with Extremely Low Error Floor From the previous examples, we can see that good codes can be constructed following the general procedure when the the target BER is around An unavoidable question is that whether or not this procedure is applicable to the case when the target BER is extremely low.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

35 onstructing BMST Systems with Extremely Low Error Floor From the previous examples, we can see that good codes can be constructed following the general procedure when the the target BER is around An unavoidable question is that whether or not this procedure is applicable to the case when the target BER is extremely low. The difficulty lies in the fact that it is very time-consuming and even infeasible to verify this matchness by conventional software simulation in the extremely low error rate region.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

36 onstructing BMST Systems with Extremely Low Error Floor From the previous examples, we can see that good codes can be constructed following the general procedure when the the target BER is around An unavoidable question is that whether or not this procedure is applicable to the case when the target BER is extremely low. The difficulty lies in the fact that it is very time-consuming and even infeasible to verify this matchness by conventional software simulation in the extremely low error rate region. We propose a two-phase decoding (TPD) algorithm for the BMST system, whose performance is predictable.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

37 onstructing BMST Systems with Extremely Low Error Floor From the previous examples, we can see that good codes can be constructed following the general procedure when the the target BER is around An unavoidable question is that whether or not this procedure is applicable to the case when the target BER is extremely low. The difficulty lies in the fact that it is very time-consuming and even infeasible to verify this matchness by conventional software simulation in the extremely low error rate region. We propose a two-phase decoding (TPD) algorithm for the BMST system, whose performance is predictable. For doing so, we propose a genie-aided decoder and a corresponding genie-aided bound, both of which are useful not only for developing the TPD algorithm but also for predicting the performance of the TPD algorithm.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

38 Outline 1 Review of BMST 2 A General Procedure of Designing BMST 3 Genie-aided Bounds 4 Two-phase Decoding 5 Simulation Results 6 onclusions and Future Works. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

39 Genie-aided Bounds Figure: The BMST system. The Genie-aided Lower Bound w [Ya]\_b]Z w [^\_Z w dye_\^z u NOP Enc v NOP c NOP BI- y NOP w QOWOP T S w QORSP u NSP BI- y NSP Enc v NSP c NSP TUS w QSWOP w QSRTVSP w QORTP u QTP c NTP BI- y NTP Enc v NTP w QTROP w [Yb]c]Z w [Yb_c_Z u XYZ Enc v XYZ c XYZ BI- y XYZ w [Yc^Z _ ] w [Ya]c^Z w [Y\]Z w dyb_e]f_z c [Ya]Z BI- y [Y`]Z c [Ya_Z BI- y [Ya_Z Figure: The genie-aided lower bound system. In the derivation of the genie-aided lower bound [Ma], the transmitted data u ( u (0),,u (t 1),u (t1),,u (L 1)) are assumed to be known at the decoder. This is equivalent to assuming a genie who tells the decoder all but one the intermediate codewords v ( v (0),,v (t 1),v (t1),,v (L 1)). This is also equivalent to assuming that w { w (t,i) v (t ) Π i : m t Lm 1,t t,0 i m} are available at the decoder. [Ma] X. Ma,. Liang, K. Huang, and Q. Zhuang, Block Markov superposition transmission: onstruction of big convolutional codes from short codes, revised to IEEE Trans. Inf. Theory. [Online]. Available: Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

40 Genie-aided Bounds u ghi Enc v ghi n jhplrmi w w jhqlrli w jhrmi l w jhkli thqlunqli w jhqnrni w c ghi BI- y ghi c jhpli BI- y jholi u vwx Enc v vwx } yw{x c { w ywz{x ywx c w ywz x c vwx BI- y vwx c yw{x BI- y yw~{x jhplknqli w jhsnkmi w w jmkni c jhpni BI- y jhpni yw }x c w y z}x Figure: The genie-aided bound system. c yw}x BI- y yw}x The genie-aided assumption is relaxed by assuming a genie who tells the decoder w but with each digit being flipped independently with a probability p genie. The genie observes a noisy version of w through a binary symmetric channel (BS) with crossover probability p genie, denoted by w { w (t,i) : m t Lm 1,t t,0 i m }.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

41 Genie-aided Bounds The Genie-aided Decoding Algorithm At time t, upon the observation of w, we can perform a sub-optimal decoding algorithm to recover u (t) by not taking into account the parameter p genie. ancelation: To remove the effect of w from y (t),,y (tm) as if it were w, we compute m c (ti) w (ti l,l) and ỹ (ti) ( 1) c (ti) y (ti) (2) l0,l i for 0 i m, where denotes the component-wise multiplication between two vectors. Minimization: Find û (t) (equivalently ˆv (t) ) that minimizes m ỹ (ti) ( 1) ˆv (t) Π i 2, (3) i0 where 2 represents the squared Euclidean norm. Output: Output û (t) as the decoding result.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

42 Genie-aided Bounds u ƒ Enc v ƒ ˆ Š ƒ c w ƒ ƒ c w ƒ c ƒ BI- y ƒ c Š ƒ BI- y ƒ u Enc v c (0) c (1) BS p Œ Ž BS p Œ Ž BI- BI- y (0) y (1) ˆƒ c w ˆƒ c Šˆƒ BI- y Šˆƒ m c (m) BS p Œ Ž BI- Figure: The genie-aided system (left) and its equivalent system (right). To derive the genie-aided bounds, we need the following two assumptions. Assumption 1. Each component w (t,i) j of w is statistically independent of the corresponding received signal y (ti) j. Assumption 2. The components of w are statistically independent. With the above two assumptions, we can see that each bit v (t) j is transmitted m1 times through a BI- with a flipping error p flip, which is given by ( m r p flip )p ( ) genie 1 p m r genie 1 ( ) 1 2p m genie. (4) r 2 r is odd y (m). Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

43 Genie-aided Bounds Assume that u (t) 0 is transmitted. Let the decoding output û (t) 0 corresponding to the codeword ˆv (t) with Hamming weight h. Then the pairwise error probability Pr { u (t) û (t)} is the same as the probability m Pr ỹ (ti) ( 1) w (t,i) 2 m ỹ (ti) ( 1)ŵ (t,i) 2. (5) i0 It is not surprising ( that the pair-wise error probability depends only on the Hamming weight W H (ŵ (t,0),,ŵ (t,m) ) ) (m1)h. Since each ỹ (t) j is distributed according to N ( 1,σ 2) with probability p flip andn ( 1,σ 2) with probability 1 p flip, we have Pr { u (t) û (t)} r0 i0 (m1)h ( ) ( ) (m1)h p r ) (m1)h r (m1)h 2r r flip( 1 pflip Q. (6) (m1)hσ Using the union bound, the genie-aided bound is given by f genie (γ b ) K N g1 h1 g K A g,h Pr { u (t) û (t)}, (7) where A g,h, 1 g K,1 h N, are coefficients of the IOWEF of the basic code.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

44 Genie-aided Bounds ẅ ẅ z (0) u v y (0) Enc ẅ ẅ z (1) y (1) ẅ ẅ z (30) y (30) BER log 10 (31) db Shannon limit of rate 1/2 R[2,1], m 0 p genie 10 1, p flip p genie 10 2, p flip p genie 10 3, p flip p genie 10 4, p flip p genie 10 5, p flip p genie 10 6, p flip p genie 10 7, p flip p genie 0, p flip SNR (db) Figure: The genie-aided bounds with different p genie for the BMST system with an encoding memory m 30 using R [2,1] B as the basic code. The performance curve for the basic code (m 0) is also plotted here.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

45 Outline 1 Review of BMST 2 A General Procedure of Designing BMST 3 Genie-aided Bounds 4 Two-phase Decoding 5 Simulation Results 6 onclusions and Future Works. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

46 Two-phase Decoding As seen from the previous example, if we could find a genie who tells us w with an error probability p genie 10 5, we can perform the GAD algorithm. If this is the case, the performance in the extremely low error rate region can be predicted with the help of the genie-aided bound. Two-phase Decoding Steps The phase-i decoding performs the sliding-window decoding algorithm, which serves as a genie. The phase-ii decoding performs the genie-aided decoding algorithm, which cleans up the residual errors once when the phase-i decoding lowers the BER down to around š œ žÿ Ÿ š œ žÿ Ÿ š œ žÿ Ÿ û û û û û û û û û û Figure: The decoding of the two-phase decoding of a BMST system with m 2,L10, and d 3... Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

47 Two-phase Decoding Message flow tree (0) V (0) U (0) V (1) (1) U (1) V (2) (2) U (2) V (3) (3) U (3) 1 2 Figure: The message flow in the normal graph. (4) (5) a decoding layer º ¼ ³» ² ½ ª ««± µ ¹ Figure: A message-flow neighborhood of depth 1. In this figure, m 2 and N 3.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

48 Two-phase Decoding Message flow tree (0) V (0) U (0) V (1) (1) U (1) V (2) (2) U (2) V (3) (3) U (3) 1 2 Figure: The normal graph for a BMST system with L4 and m 2. (4) (5) a decoding layer ¾ À ÁÂÃ Ä Ä ¾ ¾ ¾ ¾ Figure: A message-flow neighborhood of depth 1. In this figure, m 2 and N 3. Å ¾ ¾. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

49 Two-phase Decoding Message flow tree (0) V (0) U (0) V (1) (1) U (1) V (2) (2) U (2) V (3) (3) U (3) 1 2 Figure: The normal graph for a BMST system with L4 and m 2. (4) (5) a decoding layer Ç Ì Æ Ç È ÉÊË Ç Æ Æ Æ Æ Figure: A message-flow neighborhood of depth 1. In this figure, m 2 and N 3. Í Ì Æ Æ. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

50 Two-phase Decoding Message Flow tree (0) V (0) U (0) V (1) (1) U (1) V (2) (2) U (2) V (3) (3) U (3) 1 2 Figure: The normal graph for a BMST system with L4 and m 2. (4) (5) a decoding layer Ï Ô Î Ï Ð ÑÒÓ Ï Î Î Î Î Figure: A message-flow neighborhood of depth 1. In this figure, m 2 and N 3. Õ Ô Î Î. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

51 Two-phase Decoding Message flow tree (0) V (0) U (0) V (1) (1) U (1) V (2) (2) U (2) V (3) (3) U (3) 1 2 Figure: The normal graph for a BMST system with L4 and m 2. (4) (5) a decoding layer Ö Ø ÙÚÛ Ü Ü Ö Ö Ö Ö Figure: A message-flow neighborhood of depth 1. In this figure, m 2 and N 3. Ý Ö Ö. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

52 Two-phase Decoding Message flow tree (0) V (0) U (0) V (1) (1) U (1) V (2) (2) U (2) V (3) (3) U (3) 1 2 Figure: The normal graph for a BMST system with L4 and m 2. (4) (5) a decoding layer ß ä Þ ß à áâã ß Þ Þ Þ Þ Figure: A message-flow neighborhood of depth 1. In this figure, m 2 and N 3. å ä Þ Þ. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

53 Two-phase Decoding Message flow forest To evaluate the performance, we only need to see what happens to one sub-codeword of [N,K ] B. The codeword is transmitted m1 times, where each transmission is affected by both the AWGN and the flipping error. The statistic independence of these noises is analyzed by considering m(m 1)N trees. ú û üýþ ú ÿ ú ÿ ù ù ù ù ù ú û üýþ ú ÿ ú ÿ ù ù ù ù ù ù ù è æ Pï ë ñ ê ð é ú ò û üýþ ú ÿ ú ÿ ù ù ù ù ù ù ù ( ~ ' è í ç ìæ w ) ú û üýþ ú ÿ ú ÿ ù ù ù ù î óôõö ø óôõö ù ù ú û üýþ óôõö ú ÿ ú ÿ ù ù ù ù ù ù ú û üýþ ú ÿ ú ÿ ù ù ù ù ù ú û üýþ ú ÿ ú ÿ ù ù ù ù ù ù ( ~ ' ) w ù P ú û üýþ ú ÿ ú ÿ ù ù ù ù ù ù ù ú û üýþ ú ÿ ú ÿ ù ù ù ù ù ù ú û üýþ ú ÿ ú ÿ ù ù ù ù ù ù Figure: Diagram of message-flow neighborhoods of depth I for the bit W (t,i) j and the bit W (t,i ). Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

54 Two-phase Decoding Summary Assumption 1. Each component w (t,i) j of w is statistically independent of the corresponding received signal y (ti) j. Assumption 2. The components of w are statistically independent. For BMST of [N,K ] B codes, in the case when n m (namely B being large enough for artesian product codes), these two assumptions hold very likely especially for the very beginning several iterations.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

55 Outline 1 Review of BMST 2 A General Procedure of Designing BMST 3 Genie-aided Bounds 4 Two-phase Decoding 5 Simulation Results 6 onclusions and Future Works. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

56 Simulation Results Shannon limit of rate 1/2 R[2,1] 5000, SWD, m 8, d 8 R[2,1] 5000, TPD, p I, m 8, d 8 R[2,1] 5000, TPD, p II, m 8, d 8 Upper bound with p genie p I Lower bound for m BER SNR (db) Figure: Performance of the BMST system with the R [2,1] 5000 as the basic code. The target BER is The system encodes L sub-blocks of data with the encoding memory m 8 and decodes with a decoding delay d 8 and a maximum iteration I max 18.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

57 Simulation Results BER Shannon limit of rate 1/2 R[2,1] 5000, SWD, m 30, d 60 R[2,1] 5000, TPD, p I, m 30, d 60 R[2,1] 5000, TPD, p II, m 30, d 60 Upper bound with p genie p I Lower bound for m SNR (db) Figure: Performance of the BMST system with the R [2,1] 5000 as the basic code. The target BER is The system encodes L sub-blocks of data with the encoding memory m 30 and decodes with a decoding delay d 60 and a maximum iteration I max 18. At the SNR of 0.5 db, p I Hence, according to the genie-aided bound, p II Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

58 Outline 1 Review of BMST 2 A General Procedure of Designing BMST 3 Genie-aided Bounds 4 Two-phase Decoding 5 Simulation Results 6 onclusions and Future Works. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

59 onclusions and Future Works onclusions and Future Works We proposed a noisy genie-aided bound for the BMST; We also proposed a two-phase decoding (TPD) algorithm for the BMST, whose performance can be predicted by the noisy genie-aided bound; We presented a general procedure to constuct good BMST codes; The effectiveness of this procedure has been verified for many other channels (not included in this paper); Future work includes studying the similarities and differences between BMST and other types of good codes... Acknowledgements This work was supported by the 973 Program (No. 2012B316100) and the NSF (No ) of hina.. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

60 Thank You for Your Attention!. Liang, X. Ma, Q. Zhuang, and B. Bai (SYSU) A General Procedure to Design Good odes Bremen, August 19, / 55

Kite Codes: Design, Analysis and Generalizations

Kite Codes: Design, Analysis and Generalizations Kite Codes: Design, Analysis and Generalizations Xiao Ma maxiao@mail.sysu.edu.cn Dept. of ECE, Sun Yat-sen University The Chinese University of Hong Kong, Sept. 2011 Xiao Ma (SYSU) Kite Codes Hong Kong,

More information

Framework for functional tree simulation applied to 'golden delicious' apple trees

Framework for functional tree simulation applied to 'golden delicious' apple trees Purdue University Purdue e-pubs Open Access Theses Theses and Dissertations Spring 2015 Framework for functional tree simulation applied to 'golden delicious' apple trees Marek Fiser Purdue University

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

4 An Introduction to Channel Coding and Decoding over BSC

4 An Introduction to Channel Coding and Decoding over BSC 4 An Introduction to Channel Coding and Decoding over BSC 4.1. Recall that channel coding introduces, in a controlled manner, some redundancy in the (binary information sequence that can be used at the

More information

! " # $! % & '! , ) ( + - (. ) ( ) * + / 0 1 2 3 0 / 4 5 / 6 0 ; 8 7 < = 7 > 8 7 8 9 : Œ Š ž P P h ˆ Š ˆ Œ ˆ Š ˆ Ž Ž Ý Ü Ý Ü Ý Ž Ý ê ç è ± ¹ ¼ ¹ ä ± ¹ w ç ¹ è ¼ è Œ ¹ ± ¹ è ¹ è ä ç w ¹ ã ¼ ¹ ä ¹ ¼ ¹ ±

More information

LA PRISE DE CALAIS. çoys, çoys, har - dis. çoys, dis. tons, mantz, tons, Gas. c est. à ce. C est à ce. coup, c est à ce

LA PRISE DE CALAIS. çoys, çoys, har - dis. çoys, dis. tons, mantz, tons, Gas. c est. à ce. C est à ce. coup, c est à ce > ƒ? @ Z [ \ _ ' µ `. l 1 2 3 z Æ Ñ 6 = Ð l sl (~131 1606) rn % & +, l r s s, r 7 nr ss r r s s s, r s, r! " # $ s s ( ) r * s, / 0 s, r 4 r r 9;: < 10 r mnz, rz, r ns, 1 s ; j;k ns, q r s { } ~ l r mnz,

More information

A Beamforming Method for Blind Calibration of Time-Interleaved A/D Converters

A Beamforming Method for Blind Calibration of Time-Interleaved A/D Converters A Beamforming Method for Blind Calibration of Time-nterleaved A/D Converters Bernard C. Levy University of California, Davis Joint wor with Steve Huang September 30, 200 Outline 1 Motivation Problem Formulation

More information

Lecture 8: Shannon s Noise Models

Lecture 8: Shannon s Noise Models Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecture 8: Shannon s Noise Models September 14, 2007 Lecturer: Atri Rudra Scribe: Sandipan Kundu& Atri Rudra Till now we have

More information

16.36 Communication Systems Engineering

16.36 Communication Systems Engineering MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

More information

Channel Coding and Interleaving

Channel Coding and Interleaving Lecture 6 Channel Coding and Interleaving 1 LORA: Future by Lund www.futurebylund.se The network will be free for those who want to try their products, services and solutions in a precommercial stage.

More information

Graph-based codes for flash memory

Graph-based codes for flash memory 1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background

More information

Partially Block Markov Superposition Transmission of Gaussian Source with Nested Lattice Codes

Partially Block Markov Superposition Transmission of Gaussian Source with Nested Lattice Codes Partially Block Markov Superposition Transmission of Gaussian Source with Nested Lattice Codes 1 arxiv:1603.01943v1 [cs.it] 7 Mar 2016 Shancheng Zhao and Xiao Ma Abstract This paper studies the transmission

More information

Digital Communications

Digital Communications Digital Communications Chapter 8: Trellis and Graph Based Codes Saeedeh Moloudi May 7, 2014 Outline 1 Introduction 2 Convolutional Codes 3 Decoding of Convolutional Codes 4 Turbo Codes May 7, 2014 Proakis-Salehi

More information

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land Ingmar Land, SIPCom8-1: Information Theory and Coding (2005 Spring) p.1 Overview Basic Concepts of Channel Coding Block Codes I:

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

Shannon s noisy-channel theorem

Shannon s noisy-channel theorem Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for

More information

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths Kasra Vakilinia, Dariush Divsalar*, and Richard D. Wesel Department of Electrical Engineering, University

More information

CS6304 / Analog and Digital Communication UNIT IV - SOURCE AND ERROR CONTROL CODING PART A 1. What is the use of error control coding? The main use of error control coding is to reduce the overall probability

More information

List Decoding: Geometrical Aspects and Performance Bounds

List Decoding: Geometrical Aspects and Performance Bounds List Decoding: Geometrical Aspects and Performance Bounds Maja Lončar Department of Information Technology Lund University, Sweden Summer Academy: Progress in Mathematics for Communication Systems Bremen,

More information

Effect of Spatio-Temporal Channel Correlation on the Performance of Space-Time Codes

Effect of Spatio-Temporal Channel Correlation on the Performance of Space-Time Codes Effect of patio-temporal Channel Correlation on the Performance of pace-time Codes C. Fragouli, N. Al-Dhahir, W. Turin AT& T hannon Laboratories 18 Park Ave Florham Park, N 7932 Abstract The determinant

More information

An Introduction to Optimal Control Applied to Disease Models

An Introduction to Optimal Control Applied to Disease Models An Introduction to Optimal Control Applied to Disease Models Suzanne Lenhart University of Tennessee, Knoxville Departments of Mathematics Lecture1 p.1/37 Example Number of cancer cells at time (exponential

More information

Channel Coding for Secure Transmissions

Channel Coding for Secure Transmissions Channel Coding for Secure Transmissions March 27, 2017 1 / 51 McEliece Cryptosystem Coding Approach: Noiseless Main Channel Coding Approach: Noisy Main Channel 2 / 51 Outline We present an overiew of linear

More information

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9 Problem Set 1 These questions are based on the material in Section 1: Introduction to coding theory. You do not need to submit your answers to any of these questions. 1. The following ISBN was received

More information

An Example file... log.txt

An Example file... log.txt # ' ' Start of fie & %$ " 1 - : 5? ;., B - ( * * B - ( * * F I / 0. )- +, * ( ) 8 8 7 /. 6 )- +, 5 5 3 2( 7 7 +, 6 6 9( 3 5( ) 7-0 +, => - +< ( ) )- +, 7 / +, 5 9 (. 6 )- 0 * D>. C )- +, (A :, C 0 )- +,

More information

Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel

Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel Pål Ellingsen paale@ii.uib.no Susanna Spinsante s.spinsante@univpm.it Angela Barbero angbar@wmatem.eis.uva.es May 31, 2005 Øyvind Ytrehus

More information

LDPC Codes. Slides originally from I. Land p.1

LDPC Codes. Slides originally from I. Land p.1 Slides originally from I. Land p.1 LDPC Codes Definition of LDPC Codes Factor Graphs to use in decoding Decoding for binary erasure channels EXIT charts Soft-Output Decoding Turbo principle applied to

More information

An Introduction to Low Density Parity Check (LDPC) Codes

An Introduction to Low Density Parity Check (LDPC) Codes An Introduction to Low Density Parity Check (LDPC) Codes Jian Sun jian@csee.wvu.edu Wireless Communication Research Laboratory Lane Dept. of Comp. Sci. and Elec. Engr. West Virginia University June 3,

More information

Decomposition Methods for Large Scale LP Decoding

Decomposition Methods for Large Scale LP Decoding Decomposition Methods for Large Scale LP Decoding Siddharth Barman Joint work with Xishuo Liu, Stark Draper, and Ben Recht Outline Background and Problem Setup LP Decoding Formulation Optimization Framework

More information

Optimum Soft Decision Decoding of Linear Block Codes

Optimum Soft Decision Decoding of Linear Block Codes Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is

More information

The PPM Poisson Channel: Finite-Length Bounds and Code Design

The PPM Poisson Channel: Finite-Length Bounds and Code Design August 21, 2014 The PPM Poisson Channel: Finite-Length Bounds and Code Design Flavio Zabini DEI - University of Bologna and Institute for Communications and Navigation German Aerospace Center (DLR) Balazs

More information

OC330C. Wiring Diagram. Recommended PKH- P35 / P50 GALH PKA- RP35 / RP50. Remarks (Drawing No.) No. Parts No. Parts Name Specifications

OC330C. Wiring Diagram. Recommended PKH- P35 / P50 GALH PKA- RP35 / RP50. Remarks (Drawing No.) No. Parts No. Parts Name Specifications G G " # $ % & " ' ( ) $ * " # $ % & " ( + ) $ * " # C % " ' ( ) $ * C " # C % " ( + ) $ * C D ; E @ F @ 9 = H I J ; @ = : @ A > B ; : K 9 L 9 M N O D K P D N O Q P D R S > T ; U V > = : W X Y J > E ; Z

More information

The University of Bath School of Management is one of the oldest established management schools in Britain. It enjoys an international reputation for

The University of Bath School of Management is one of the oldest established management schools in Britain. It enjoys an international reputation for The University of Bath School of Management is one of the oldest established management schools in Britain. It enjoys an international reputation for the quality of its teaching and research. Its mission

More information

QUESTIONS ON QUARKONIUM PRODUCTION IN NUCLEAR COLLISIONS

QUESTIONS ON QUARKONIUM PRODUCTION IN NUCLEAR COLLISIONS International Workshop Quarkonium Working Group QUESTIONS ON QUARKONIUM PRODUCTION IN NUCLEAR COLLISIONS ALBERTO POLLERI TU München and ECT* Trento CERN - November 2002 Outline What do we know for sure?

More information

Optimal Control of PDEs

Optimal Control of PDEs Optimal Control of PDEs Suzanne Lenhart University of Tennessee, Knoville Department of Mathematics Lecture1 p.1/36 Outline 1. Idea of diffusion PDE 2. Motivating Eample 3. Big picture of optimal control

More information

Expectation propagation for signal detection in flat-fading channels

Expectation propagation for signal detection in flat-fading channels Expectation propagation for signal detection in flat-fading channels Yuan Qi MIT Media Lab Cambridge, MA, 02139 USA yuanqi@media.mit.edu Thomas Minka CMU Statistics Department Pittsburgh, PA 15213 USA

More information

Low-density parity-check codes

Low-density parity-check codes Low-density parity-check codes From principles to practice Dr. Steve Weller steven.weller@newcastle.edu.au School of Electrical Engineering and Computer Science The University of Newcastle, Callaghan,

More information

ETIKA V PROFESII PSYCHOLÓGA

ETIKA V PROFESII PSYCHOLÓGA P r a ž s k á v y s o k á š k o l a p s y c h o s o c i á l n í c h s t u d i í ETIKA V PROFESII PSYCHOLÓGA N a t á l i a S l o b o d n í k o v á v e d ú c i p r á c e : P h D r. M a r t i n S t r o u

More information

1 1 0, g Exercise 1. Generator polynomials of a convolutional code, given in binary form, are g

1 1 0, g Exercise 1. Generator polynomials of a convolutional code, given in binary form, are g Exercise Generator polynomials of a convolutional code, given in binary form, are g 0, g 2 0 ja g 3. a) Sketch the encoding circuit. b) Sketch the state diagram. c) Find the transfer function TD. d) What

More information

Analysis of coding on non-ergodic block-fading channels

Analysis of coding on non-ergodic block-fading channels Analysis of coding on non-ergodic block-fading channels Joseph J. Boutros ENST 46 Rue Barrault, Paris boutros@enst.fr Albert Guillén i Fàbregas Univ. of South Australia Mawson Lakes SA 5095 albert.guillen@unisa.edu.au

More information

Unit 3. Digital encoding

Unit 3. Digital encoding Unit 3. Digital encoding Digital Electronic Circuits (Circuitos Electrónicos Digitales) E.T.S.I. Informática Universidad de Sevilla 9/2012 Jorge Juan 2010, 2011, 2012 You are free to

More information

State-of-the-Art Channel Coding

State-of-the-Art Channel Coding Institut für State-of-the-Art Channel Coding Prof. Dr.-Ing. Volker Kühn Institute of Communications Engineering University of Rostock, Germany Email: volker.kuehn@uni-rostock.de http://www.int.uni-rostock.de/

More information

Codes on graphs and iterative decoding

Codes on graphs and iterative decoding Codes on graphs and iterative decoding Bane Vasić Error Correction Coding Laboratory University of Arizona Funded by: National Science Foundation (NSF) Seagate Technology Defense Advanced Research Projects

More information

Practical Polar Code Construction Using Generalised Generator Matrices

Practical Polar Code Construction Using Generalised Generator Matrices Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:

More information

FEEDBACK does not increase the capacity of a discrete

FEEDBACK does not increase the capacity of a discrete 1 Sequential Differential Optimization of Incremental Redundancy Transmission Lengths: An Example with Tail-Biting Convolutional Codes Nathan Wong, Kasra Vailinia, Haobo Wang, Sudarsan V. S. Ranganathan,

More information

Lecture 4. Capacity of Fading Channels

Lecture 4. Capacity of Fading Channels 1 Lecture 4. Capacity of Fading Channels Capacity of AWGN Channels Capacity of Fading Channels Ergodic Capacity Outage Capacity Shannon and Information Theory Claude Elwood Shannon (April 3, 1916 February

More information

Coding on a Trellis: Convolutional Codes

Coding on a Trellis: Convolutional Codes .... Coding on a Trellis: Convolutional Codes Telecommunications Laboratory Alex Balatsoukas-Stimming Technical University of Crete November 6th, 2008 Telecommunications Laboratory (TUC) Coding on a Trellis:

More information

Glasgow eprints Service

Glasgow eprints Service Kalna, K. and Asenov, A. (1) Multiple delta doping in aggressively scaled PHEMTs. In, Ryssel, H. and Wachutka, G. and Grunbacher, H., Eds. Solid-State Device Research Conference, 11-13 September 1, pages

More information

THIS paper is aimed at designing efficient decoding algorithms

THIS paper is aimed at designing efficient decoding algorithms IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBER 1999 2333 Sort-and-Match Algorithm for Soft-Decision Decoding Ilya Dumer, Member, IEEE Abstract Let a q-ary linear (n; k)-code C be used

More information

Belief-Propagation Decoding of LDPC Codes

Belief-Propagation Decoding of LDPC Codes LDPC Codes: Motivation Belief-Propagation Decoding of LDPC Codes Amir Bennatan, Princeton University Revolution in coding theory Reliable transmission, rates approaching capacity. BIAWGN, Rate =.5, Threshold.45

More information

Example: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p.

Example: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p. Lecture 20 Page 1 Lecture 20 Quantum error correction Classical error correction Modern computers: failure rate is below one error in 10 17 operations Data transmission and storage (file transfers, cell

More information

Error Detection and Correction: Hamming Code; Reed-Muller Code

Error Detection and Correction: Hamming Code; Reed-Muller Code Error Detection and Correction: Hamming Code; Reed-Muller Code Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Hamming Code: Motivation

More information

Construction of coset-based low rate convolutional codes and their application to low rate turbo-like code design

Construction of coset-based low rate convolutional codes and their application to low rate turbo-like code design Construction of coset-based low rate convolutional codes and their application to low rate turbo-like code design Durai Thirupathi and Keith M Chugg Communication Sciences Institute Dept of Electrical

More information

ECEN 655: Advanced Channel Coding

ECEN 655: Advanced Channel Coding ECEN 655: Advanced Channel Coding Course Introduction Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 655: Advanced Channel Coding 1 / 19 Outline 1 History

More information

Redoing the Foundations of Decision Theory

Redoing the Foundations of Decision Theory Redoing the Foundations of Decision Theory Joe Halpern Cornell University Joint work with Larry Blume and David Easley Economics Cornell Redoing the Foundations of Decision Theory p. 1/21 Decision Making:

More information

Encoder. Encoder 2. ,...,u N-1. 0,v (0) ,u 1. ] v (0) =[v (0) 0,v (1) v (1) =[v (1) 0,v (2) v (2) =[v (2) (a) u v (0) v (1) v (2) (b) N-1] 1,...

Encoder. Encoder 2. ,...,u N-1. 0,v (0) ,u 1. ] v (0) =[v (0) 0,v (1) v (1) =[v (1) 0,v (2) v (2) =[v (2) (a) u v (0) v (1) v (2) (b) N-1] 1,... Chapter 16 Turbo Coding As noted in Chapter 1, Shannon's noisy channel coding theorem implies that arbitrarily low decoding error probabilities can be achieved at any transmission rate R less than the

More information

The E8 Lattice and Error Correction in Multi-Level Flash Memory

The E8 Lattice and Error Correction in Multi-Level Flash Memory The E8 Lattice and Error Correction in Multi-Level Flash Memory Brian M. Kurkoski kurkoski@ice.uec.ac.jp University of Electro-Communications Tokyo, Japan ICC 2011 IEEE International Conference on Communications

More information

Max. Input Power (W) Input Current (Arms) Dimming. Enclosure

Max. Input Power (W) Input Current (Arms) Dimming. Enclosure Product Overview XI025100V036NM1M Input Voltage (Vac) Output Power (W) Output Voltage Range (V) Output urrent (A) Efficiency@ Max Load and 70 ase Max ase Temp. ( ) Input urrent (Arms) Max. Input Power

More information

" #$ P UTS W U X [ZY \ Z _ `a \ dfe ih j mlk n p q sr t u s q e ps s t x q s y i_z { U U z W } y ~ y x t i e l US T { d ƒ ƒ ƒ j s q e uˆ ps i ˆ p q y

 #$ P UTS W U X [ZY \ Z _ `a \ dfe ih j mlk n p q sr t u s q e ps s t x q s y i_z { U U z W } y ~ y x t i e l US T { d ƒ ƒ ƒ j s q e uˆ ps i ˆ p q y " #$ +. 0. + 4 6 4 : + 4 ; 6 4 < = =@ = = =@ = =@ " #$ P UTS W U X [ZY \ Z _ `a \ dfe ih j mlk n p q sr t u s q e ps s t x q s y i_z { U U z W } y ~ y x t i e l US T { d ƒ ƒ ƒ j s q e uˆ ps i ˆ p q y h

More information

Chapter 3 Linear Block Codes

Chapter 3 Linear Block Codes Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and

More information

Codes on graphs and iterative decoding

Codes on graphs and iterative decoding Codes on graphs and iterative decoding Bane Vasić Error Correction Coding Laboratory University of Arizona Prelude Information transmission 0 0 0 0 0 0 Channel Information transmission signal 0 0 threshold

More information

Midterm Exam Information Theory Fall Midterm Exam. Time: 09:10 12:10 11/23, 2016

Midterm Exam Information Theory Fall Midterm Exam. Time: 09:10 12:10 11/23, 2016 Midterm Exam Time: 09:10 12:10 11/23, 2016 Name: Student ID: Policy: (Read before You Start to Work) The exam is closed book. However, you are allowed to bring TWO A4-size cheat sheet (single-sheet, two-sided).

More information

Low-Density Parity-Check Codes

Low-Density Parity-Check Codes Department of Computer Sciences Applied Algorithms Lab. July 24, 2011 Outline 1 Introduction 2 Algorithms for LDPC 3 Properties 4 Iterative Learning in Crowds 5 Algorithm 6 Results 7 Conclusion PART I

More information

Lecture 4 : Introduction to Low-density Parity-check Codes

Lecture 4 : Introduction to Low-density Parity-check Codes Lecture 4 : Introduction to Low-density Parity-check Codes LDPC codes are a class of linear block codes with implementable decoders, which provide near-capacity performance. History: 1. LDPC codes were

More information

On the Construction and Decoding of Cyclic LDPC Codes

On the Construction and Decoding of Cyclic LDPC Codes On the Construction and Decoding of Cyclic LDPC Codes Chao Chen Joint work with Prof. Baoming Bai from Xidian University April 30, 2014 Outline 1. Introduction 2. Construction based on Idempotents and

More information

More advanced codes 0 1 ( , 1 1 (

More advanced codes 0 1 ( , 1 1 ( p. 1/24 More advanced codes The Shor code was the first general-purpose quantum error-correcting code, but since then many others have been discovered. An important example, discovered independently of

More information

channel of communication noise Each codeword has length 2, and all digits are either 0 or 1. Such codes are called Binary Codes.

channel of communication noise Each codeword has length 2, and all digits are either 0 or 1. Such codes are called Binary Codes. 5 Binary Codes You have already seen how check digits for bar codes (in Unit 3) and ISBN numbers (Unit 4) are used to detect errors. Here you will look at codes relevant for data transmission, for example,

More information

Lecture 4 Noisy Channel Coding

Lecture 4 Noisy Channel Coding Lecture 4 Noisy Channel Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 9, 2015 1 / 56 I-Hsiang Wang IT Lecture 4 The Channel Coding Problem

More information

Information Theoretic Imaging

Information Theoretic Imaging Information Theoretic Imaging WU Faculty: J. A. O Sullivan WU Doctoral Student: Naveen Singla Boeing Engineer: James Meany First Year Focus: Imaging for Data Storage Image Reconstruction Data Retrieval

More information

Introduction to Low-Density Parity Check Codes. Brian Kurkoski

Introduction to Low-Density Parity Check Codes. Brian Kurkoski Introduction to Low-Density Parity Check Codes Brian Kurkoski kurkoski@ice.uec.ac.jp Outline: Low Density Parity Check Codes Review block codes History Low Density Parity Check Codes Gallager s LDPC code

More information

Universal Anytime Codes: An approach to uncertain channels in control

Universal Anytime Codes: An approach to uncertain channels in control Universal Anytime Codes: An approach to uncertain channels in control paper by Stark Draper and Anant Sahai presented by Sekhar Tatikonda Wireless Foundations Department of Electrical Engineering and Computer

More information

National University of Singapore Department of Electrical & Computer Engineering. Examination for

National University of Singapore Department of Electrical & Computer Engineering. Examination for National University of Singapore Department of Electrical & Computer Engineering Examination for EE5139R Information Theory for Communication Systems (Semester I, 2014/15) November/December 2014 Time Allowed:

More information

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International

More information

A Functional Quantum Programming Language

A Functional Quantum Programming Language A Functional Quantum Programming Language Thorsten Altenkirch University of Nottingham based on joint work with Jonathan Grattage and discussions with V.P. Belavkin supported by EPSRC grant GR/S30818/01

More information

Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes

Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes Brian M. Kurkoski, Kazuhiko Yamaguchi and Kingo Kobayashi kurkoski@ice.uec.ac.jp Dept. of Information and Communications Engineering

More information

CSCI 2570 Introduction to Nanocomputing

CSCI 2570 Introduction to Nanocomputing CSCI 2570 Introduction to Nanocomputing Information Theory John E Savage What is Information Theory Introduced by Claude Shannon. See Wikipedia Two foci: a) data compression and b) reliable communication

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

5. Density evolution. Density evolution 5-1

5. Density evolution. Density evolution 5-1 5. Density evolution Density evolution 5-1 Probabilistic analysis of message passing algorithms variable nodes factor nodes x1 a x i x2 a(x i ; x j ; x k ) x3 b x4 consider factor graph model G = (V ;

More information

Principal Secretary to Government Haryana, Town & Country Planning Department, Haryana, Chandigarh.

Principal Secretary to Government Haryana, Town & Country Planning Department, Haryana, Chandigarh. 1 From To Principal Secretary to Government Haryana, Town & Country Planning Department, Haryana, Chandigarh. The Director General, Town & Country Planning Department, Haryana, Chandigarh. Memo No. Misc-2339

More information

Low-density parity-check (LDPC) codes

Low-density parity-check (LDPC) codes Low-density parity-check (LDPC) codes Performance similar to turbo codes Do not require long interleaver to achieve good performance Better block error performance Error floor occurs at lower BER Decoding

More information

NAME... Soc. Sec. #... Remote Location... (if on campus write campus) FINAL EXAM EE568 KUMAR. Sp ' 00

NAME... Soc. Sec. #... Remote Location... (if on campus write campus) FINAL EXAM EE568 KUMAR. Sp ' 00 NAME... Soc. Sec. #... Remote Location... (if on campus write campus) FINAL EXAM EE568 KUMAR Sp ' 00 May 3 OPEN BOOK exam (students are permitted to bring in textbooks, handwritten notes, lecture notes

More information

Communications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved

Communications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Communications II Lecture 9: Error Correction Coding Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Outline Introduction Linear block codes Decoding Hamming

More information

Linear Codes and Syndrome Decoding

Linear Codes and Syndrome Decoding Linear Codes and Syndrome Decoding These notes are intended to be used as supplementary reading to Sections 6.7 9 of Grimaldi s Discrete and Combinatorial Mathematics. The proofs of the theorems are left

More information

Introduction to Convolutional Codes, Part 1

Introduction to Convolutional Codes, Part 1 Introduction to Convolutional Codes, Part 1 Frans M.J. Willems, Eindhoven University of Technology September 29, 2009 Elias, Father of Coding Theory Textbook Encoder Encoder Properties Systematic Codes

More information

Solutions to Homework Set #3 Channel and Source coding

Solutions to Homework Set #3 Channel and Source coding Solutions to Homework Set #3 Channel and Source coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits per channel use)

More information

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet

More information

Constructive Decision Theory

Constructive Decision Theory Constructive Decision Theory Joe Halpern Cornell University Joint work with Larry Blume and David Easley Economics Cornell Constructive Decision Theory p. 1/2 Savage s Approach Savage s approach to decision

More information

Bifurcations and Chaos in Turbo Decoding Algorithms

Bifurcations and Chaos in Turbo Decoding Algorithms Bifurcations and Chaos in Turbo Decoding Algorithms Z. Tasev 1, P. Popovski 2, G.M. Maggio 3, and L. Kocarev 1 1 Institute for Nonlinear Science, University of California, San Diego, 9500 Gilman Drive,

More information

Decoding the Tail-Biting Convolutional Codes with Pre-Decoding Circular Shift

Decoding the Tail-Biting Convolutional Codes with Pre-Decoding Circular Shift Decoding the Tail-Biting Convolutional Codes with Pre-Decoding Circular Shift Ching-Yao Su Directed by: Prof. Po-Ning Chen Department of Communications Engineering, National Chiao-Tung University July

More information

4.3 Laplace Transform in Linear System Analysis

4.3 Laplace Transform in Linear System Analysis 4.3 Laplace Transform in Linear System Analysis The main goal in analysis of any dynamic system is to find its response to a given input. The system response in general has two components: zero-state response

More information

Can Feedback Increase the Capacity of the Energy Harvesting Channel?

Can Feedback Increase the Capacity of the Energy Harvesting Channel? Can Feedback Increase the Capacity of the Energy Harvesting Channel? Dor Shaviv EE Dept., Stanford University shaviv@stanford.edu Ayfer Özgür EE Dept., Stanford University aozgur@stanford.edu Haim Permuter

More information

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved. Introduction to Wireless & Mobile Systems Chapter 4 Channel Coding and Error Control 1 Outline Introduction Block Codes Cyclic Codes CRC (Cyclic Redundancy Check) Convolutional Codes Interleaving Information

More information

Making Error Correcting Codes Work for Flash Memory

Making Error Correcting Codes Work for Flash Memory Making Error Correcting Codes Work for Flash Memory Part I: Primer on ECC, basics of BCH and LDPC codes Lara Dolecek Laboratory for Robust Information Systems (LORIS) Center on Development of Emerging

More information

Chapter 7: Channel coding:convolutional codes

Chapter 7: Channel coding:convolutional codes Chapter 7: : Convolutional codes University of Limoges meghdadi@ensil.unilim.fr Reference : Digital communications by John Proakis; Wireless communication by Andreas Goldsmith Encoder representation Communication

More information

Lecture 4: Proof of Shannon s theorem and an explicit code

Lecture 4: Proof of Shannon s theorem and an explicit code CSE 533: Error-Correcting Codes (Autumn 006 Lecture 4: Proof of Shannon s theorem and an explicit code October 11, 006 Lecturer: Venkatesan Guruswami Scribe: Atri Rudra 1 Overview Last lecture we stated

More information

Ma/CS 6b Class 25: Error Correcting Codes 2

Ma/CS 6b Class 25: Error Correcting Codes 2 Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets

More information

Bandwidth Efficient and Rate-Matched Low-Density Parity-Check Coded Modulation

Bandwidth Efficient and Rate-Matched Low-Density Parity-Check Coded Modulation Bandwidth Efficient and Rate-Matched Low-Density Parity-Check Coded Modulation Georg Böcherer, Patrick Schulte, Fabian Steiner Chair for Communications Engineering patrick.schulte@tum.de April 29, 2015

More information

1. Basics of Information

1. Basics of Information 1. Basics of Information 6.004x Computation Structures Part 1 Digital Circuits Copyright 2015 MIT EECS 6.004 Computation Structures L1: Basics of Information, Slide #1 What is Information? Information,

More information

Channel Coding I. Exercises SS 2017

Channel Coding I. Exercises SS 2017 Channel Coding I Exercises SS 2017 Lecturer: Dirk Wübben Tutor: Shayan Hassanpour NW1, Room N 2420, Tel.: 0421/218-62387 E-mail: {wuebben, hassanpour}@ant.uni-bremen.de Universität Bremen, FB1 Institut

More information

Capacity of a channel Shannon s second theorem. Information Theory 1/33

Capacity of a channel Shannon s second theorem. Information Theory 1/33 Capacity of a channel Shannon s second theorem Information Theory 1/33 Outline 1. Memoryless channels, examples ; 2. Capacity ; 3. Symmetric channels ; 4. Channel Coding ; 5. Shannon s second theorem,

More information