Construction of Irregular QC-LDPC Codes in Near-Earth Communications
|
|
- Richard Davis
- 6 years ago
- Views:
Transcription
1 Journal of Communications Vol. 9, No. 7, July 24 Construction of Irregular QC-LDPC Codes in Near-Earth Communications Hui Zhao, Xiaoxiao Bao, Liang Qin, Ruyan Wang, and Hong Zhang Chongqing University of Posts and elecommunication, School of Communication and Information Engineering, Chongqing 465, China Abstract High-seed, high-reliability requirements and strict ower limitation of near-earth communications yield that the channel coding must have high coding gain and lower error floor. In this aer, an irregular quasi-cyclic low-density aritycheck (QC-LDPC) code for secific use in near-earth communications is roosed. In order to eliminate the imact of short-cycles and further imrove the erformance of codes, a base matrix with girth at least 8 is emloyed. hen dualdiagonal structure is adoted in arity check matrix to reduce encoding comlexity. Besides, circulant ermutation matrices and zero matrices with different sizes are used to fill the nonzero ositions and zero ositions of the base matrix so as to remove the comlexity of the selection of cyclic shift coefficients. he adotion of circulant ermutation matrices with different sizes ensures that the arity check matrix is full rank, which makes the code rate controllable. Finally, simulation results are given to demonstrate the erformance of the constructed codes by comaring with several existing codes. Index erms Low-density arity-check codes, arity check matrix, circulant ermutation matrix, near-earth communications I. INRODUCION Due to high-seed, high-reliability requirements and strict ower limitation, excellent channel coding becomes one of the key technologies to ensure the reliability and validity of near-earth communications []. Low-density arity check (LDPC) codes [2] have received more and more attention in near-earth communications for their outstanding erformance, such as faster iterative convergence, larger throughut, lower error floor, etc. Among LDPC codes, the quasi-cyclic LDPC (QC-LDPC) codes are the most romising class of structured LDPC codes due to their ease of imlementation and excellent erformance over noisy channels when decoded with message-assing algorithms [3]. In general, the overall erformance of a LDPC code is described by two different regions, the waterfall region and the error-floor region [4], [5]. he erformance in the Manuscrit received Aril 8, 24; revised July 28, 24. his work was suorted by the National Natural Science Foundation of China (Grants , 625and 55392), and the National Natural Science Foundation of CQ (Grants Nos. CSC22jjA448, CSC 2BA24, and CSC 2jjA76). Corresonding author zhaohui@cqut.edu.cn doi:.272/jcm waterfall region is heavily affected both by the girth (he length of the smallest cycle in the arity check matrix) and by the variable and check nodes degree rofiles for irregular LDPC codes. Iteratively decoded LDPC codes demonstrate an abrut change in their error rate curves. An error floor in the erformance curve means that the decoding failure rate does not continue to decrease raidly as the signal to noise ratio (SNR) increases [6]. Eliminating or lowering error floors is articularly imortant for near-earth alications that have extreme reliability demands. he erformance in the error floor region is also affected by the girth. For examle, in erasure channels every stoing set contains cycles [7], so that increasing the girth turns out to increasing the smallest stoing set size [8] of the LDPC codes. Short cycles in the anner grah, which lead to inefficient decoding and limit the convergence rate of the sumroduct algorithm, affect the erformance of the LDPC codes. herefore, design of LDPC codes with large girth is of great interest [4]. here have been several aroaches, including direct construction aroaches [9]-[2] and cycle removal based aroaches [3], to remove short cycles in anner grah and construct LDPC codes with large girth. However, these aroaches are either not sufficiently flexible in the code arameter selection due to the constraint on girth [4], or unable to reserve the quasi-cyclic structure thereby increasing the encoding comlexity [5]. In order to reduce the comlexity of arity check matrix construction and to achieve an efficient encoding, we use the arity check matrix with systematic form, and design the check art and the information art indeendently. he check art of arity check matrix adots the dual-diagonal structure to achieve iterative encoding. he information art uses the quasi-cyclic structure whose nonzero ositions relaced by circulant ermutation matrices (CPMs) with different sizes and zero ositions relaced by corresonding-size zero matrices to reduce the comlexity of arity check matrix construction. he class of LDPC code derived from our construction ossesses large girth and much more flexibility in terms of code length and rate. What s more, the roosed codes also can achieve very good erformance while retaining the racticality of quasicyclic structured. 24 Engineering and echnology Publishing 54
2 Journal of Communications Vol. 9, No. 7, July 24 he organization of the rest of this aer is as follows. First, we resent the construction method of the check art and the information art of arity check matrix in Section II. hen, we show the erformance comarison between the roosed code and several existing codes over binary-inut Additive White Gaussian Noise (AWGN) channel in Section III. he aer is summarized in the last section. and then exand H into desired matrix Hk using CPMs or zero matrices with different sizes. ) Construction of sub-matrix B: Design a matrix B with dimension v v2, where B(,)=B(2,)=B(3,)= =B(v,)=, and other elements are. hen B is a v v2 matrix of the following form: II. CONSRUCION MEHOD In this section, we introduce the basic construction of the roosed irregular QC-LDPC codes. Suose the arity check matrix of QC-LDPC code is systematic form: H H H k () where H is an M M matrix corresonding to the check art of arity check matrix; Hk is an M (N-M) matrix that indicates the information art. he arity check matrix of irregular QC-LDPC code can be obtained through constructing H and Hk indeendently, where H is a dual-diagonal square matrix and Hk kees the quasi-cyclic form. M M (3) By cyclically shifting the elements of B one lace to right, we can obtain v2- new matrices, denoted by B, B2, B3,, B( v2 ). Combining B and the v2- new (4) B B B B2 B(v2 ) 2) Construction of sub-matrix B2: Design a matrix B2 with dimension v v2, where B2(,)=B2(2,2)=B2(3,3)= =B2(v,v)=, and other elements are. hen B2 is a v v2 matrix of the following form: B2 (2) v v 2 (5) Let B2 have the following form: B2 B2 Clearly, H is a non-singular matrix. It is well known that degree-2 variable nodes (VNs) make it ossible to achieve sarse and otimal irregular roerties and simlify the encoding rocess [6]. However, many works show that the VNs with low degree are bad for decoding erformance [8]. hus, in order to avoid the bad influence of degree-2 VNs, we make the number of VNs with degree-2 satisfy the following constraint. he maximum number of VNs with degree-2 should satisfy Nv,max (2) N K M, where M is the B2 B2 B2 (6) he total number of B2 is v. By cyclically shifting the elements of B2 v laces to right, we can get v- new matrices, denoted by B22, B23,,B2v. Combining B2 and the v- new matrices into a column, then we can get a v3 v2 matrix B2 of the following form: B2 B2 B22 B2v B23 (7) 3) Construction of sub-matrix B3: Design a matrix B3 also with dimension v v2, where B3(, )=B3(2, +v)=b3(3, +2v)= =B3(v, +v-v2)= and other elements are. hen we can obtain the following matrix: number of check nodes (CNs), N is the number of VNs and K is the number of information bits. B. Construction of Hk. In this subsection, we use the CPMs with different sizes to construct a class of irregular QC-LDPC codes. Comared with the direct construction methods [9]-[2], this method has a relatively simle structure, and there is no need to search the cyclic shift coefficients of base matrix. B3 v v C. Construction of Base Matrix We design three sub-matrices B, B2 and B3, combine them into a row and transose to obtain matrix H [7], 24 Engineering and echnology Publishing v v 2 matrices into a column, then we can obtain the following v3 v2 matrix B: A. Construction of H Dual-diagonal structure of H has the following form: H B v v v v 2 (8) Cyclically shifting the elements of B3 one lace to right, then we can get v- new matrices, denoted by B3, 542
3 Journal of Communications Vol. 9, No. 7, July 24 B3 B3( v ) B32 (9) By arranging v B3v into a column, we form the following v3 v2 matrix: B3 B3v B3v B3v B3v Coy Coy () B2 B3 3v2 v3 () B3 B2 Ga Ga2 hen we can get H as follows: H B Ga B3v B3 Ga2 B32,,B3(v-). Arranging B3 and the v- new matrices results in a column of v matrices: B Fig.. Princile of cyclic-coy. D. Exansion of the Base Matrix Following the above construction, we can construct three v3 v2 arrays B, B2 and B3. Relace the nonzero elements of the three sub-matrices with CPMs of different suitable sizes, and then relace the zero elements of the three sub-matrices with zero matrices of the corresonding sizes, we can obtain the desired matrix H k. ) Size selection of CPMs: Let P be the CPM defined by: P he null sace of H gives an irregular QC-LDPC code of length v3 3 whose check matrix with column and row weight at least 3 and v, resectively. he corresonding anner grah has girth at least 8. aking a sub-matrix as Hk of the arity check matrix, we can construct a class of irregular QC-LDPC codes. Based on the above analysis, the conditions that the sizes of the CPMs and the base matrix need to meet are as follows: a) he sizes of CPMs need to satisfy the condition: max{, 2, 3 } 2 min{, 2, 3} If max{, 2, 3 } 2 min{, 2, 3}, then Ga is larger than the row size of B. Similarly, Ga2 is larger than the row size of B2. he cyclic coy oeration will not be imlemented. b) he number of columns for a common quasi-cyclic matrix should be smaller than the least common multile (LCM) of any two of its CPMs sizes. hat is, the number of columns should satisfy the condition: (2) Since the three sub-matrices have the same dimension, using different-size CPMs and zero matrices added will lead them have different dimensions. So in order to make H kee the desired matrix form and avoid short cycles, the sizes of CPMs are needed to be selected carefully. Now, suose we use CPMs with size, 2 and 3 to relace the nonzero elements of B, B2 and B3, and exloit zero matrices with size, 2 and 3 to relace the zero elements of them. For simlicity and without loss of generality, we assume 2 3, then the sizes of the obtained sub-matrices are (v3 ) (v2 ), (v3 2) (v2 2) and (v3 3) (v2 3), resectively. Clearly, the size of row ga between B and B3 is v3(3-), and the row size difference between B2 and B3 is v3(3-2). Since H B B2 n min LCM{ i, j } (4) i, j 3{ i, j } Next we use an examle to illustrate the above roosition b. Let 2 and 3 be the sizes of CPMs. hen the LCM of 2 and 3 is 6. When the number of columns of the matrix is greater than 6, there will form cycles of length four. he four bold in matrix A form a 4-cycle. B3 3v2 v3, then we can negligent the column size difference among B, B2 and B3. he size of row ga originated from different size CPMs and zero matrices can be resolved through cyclic coy. he rincile of cyclic-coy is shown in Fig., where Ga indicates the row size difference between B and B3, and Ga2 indicates the row size difference between B2 and B3. If we coy a Ga from the head of B and lace it at the end of B, then it can make sure that B and B3 are with the same row size. In a similar manner, we can maintain B2 and B3 having the same row size. hen we will get the desired nearly quasi-cyclic form matrix H. 24 Engineering and echnology Publishing (3) (5) c), 2 and 3 are rime. Minimum distance is an imortant arameter of LDPC code, which determines the LDPC codes detecting and correcting random errors caacity. Gallager has demonstrated that when the degrees of the variable node are less than 3, the minimum distances of LDPC codes grow linearly with block length (for a fixed rate and fixed degree of variable node), and 543
4 Journal of Communications Vol. 9, No. 7, July 24 when the variable node degree is greater than 3, the minimum distance of LDPC codes increase linearly along with block length [2]. So we often choose, 2 and 3 are rime and also relatively rime to make sure that the code have large minimum distance, and further make it ossess owerful error detection and correction caability. 2) Girth of the roosed irregular QC-LDPC codes It is well-known that girth is one of the designing criteria to otimize the erformance of message-assing decoding algorithms for LDPC codes. he girths of QC- LDPC codes have some unique features, as show in Fig. 2. H Fig. 2 Cycles in arity check matrix of QC-LDPC code. A cycle is a ath through nodes in the anner grah of a code. It alternates between check and variable nodes, and starts and ends at the same node. In terms of the code s arity check matrix, each check node in the anner grah corresonds to a row in its arity check matrix, and each variable node corresonds to a column. However, the systematic form QC-LDPC codes also have some unique structures. Next, we will take advantage of the relationshi between anner grah and the arity check matrix to show the roosed code of girth 8. he roosed H matrix has irregular structure and the anner grah [7] of the code c is similar to those of (irregular) reeat-accumulate (RA) codes [9]. RA codes are tyically systematic. What s more, RA codes rovide two imortant advantages. First, they allow flexibility in the choice of the reetition rate for each information bit, so that high-rate codes may be designed. Second, their irregularity allows oeration closer to the caacity limit. In the anner grah of the code c, we call the nodes corresonding to the columns of H arity bit nodes, the nodes corresonding to the columns of H k information bit nodes, and the nodes corresonding to the rows of H check nodes [2], [2]. We also call information and arity bit nodes variable nodes. We now use a general examle to illustrate the relationshi between anner grah and the arity check matrix owning systematic form. Suose the arity check matrix of the basic construction is given by: k (6) As shown in Fig. 3, the columns of H and H k are numbered from to 5 from the left. he rows of H and H k are numbered from to 5 from the to. he bold lines in anner grah reresent a 4-cycle, and they corresond to the four bold in the arity check matrix Infor. nodes Fig. 3. anner grah of H in (6) Check nodes Parity. nodes Since there is no 4-cycle and 6-cycle in the base matrix, the girth of the QC-LDPC code designed by our base matrix is at least 8 [7]. Making the girth of the arity check matrix as large as ossible can imrove the erformance of the code. III. SIMULAIONS In this section, we resent some simulation results to demonstrate the erformance of the constructed code by comaring with several existing codes. Simulations are erformed on AWGN channel with binary hase-shift keying modulation. Let v=8, =, 2 =3 and 3 =7. Following the above construction, we can construct a array H. Relacing the nonzero elements of B, B 2 and B 3 with CPMs of sizes, 2 and 3 resectively, and then relacing the zero elements of B, B 2 and B 3 by zero matrices with corresonding sizes resectively, we can get a class of irregular QC-LDPC codes. o validate the advantage of different-size CPMs, the bit error rate (BER) erformance comarison between the codes with different-size CPMs and same-size CPMs are resented in Fig. 4. In Fig. 4, the bi-diagonal regular code reresents the code with same size CPMs and also 24 Engineering and echnology Publishing 544
5 Journal of Communications Vol. 9, No. 7, July 24 has systematic form, the regular code reresents the code with same-size CPMs and has non systematic form, the bi-diagonal irregular code means the code with different-size CPMs and has systematic form, and the irregular code means the code with different-size CPMs and has non systematic form. he different-size CPMs with sizes, 2 and 3, the same-size CPMs with size =7. Choosing a sub-matrix H qc with dimension , the null sace of H qc gives an irregular (5248, 2624) QC-LDPC code with rate.5. If we let H qc be H k, then H [ H H qc], thus we can construct a class of systematic QC-LDPC codes. As shown in Fig.4, for the systematic code, when the SNR is 3dB, the BER erformance of our roosed bi-diagonal irregular code is -5, while the code whose arity check matrix has the same size CPMs is -4. he two differ by an order of magnitude. he code whose arity check matrix is nonsystematic form has similar erformance. where bi-diagonal code indicates the code whose arity check matrix is systematic form and irregular code reresents the code whose arity check matrix is not systematic form. It can be seen that our roosed bidiagonal code outerforms the CCSDS standard (876, 756) QC-LDPC code. Secially, it can achieve.5db SNR imrovement at BER of -5. In addition, the designing of our base matrix without using another algorithm to select the cyclic shift coefficients simlifies the construction rocess of the arity check matrix. BER BER regular code irregular code bi-diagonal regular code our roosed bi-diagonal irregular code SNR(dB) Fig. 4. BER erformance of the codes based on same base matrix with various CPMs. BER (876, 756) LDPC code irregular LDPC code our roosed bi-diagonal code SNR(dB) Fig. 5. BER erformance of the roosed code and CCSDS standard (876, 756) QC-LDPC code. Choosing a sub-matrix H qc2 with size , the null sace of H qc2 gives an irregular (874, 766) QC- LDPC code with rate.87. he BER erformance comarison between the roosed bi-diagonal code and consultative committee for sace data systems (CCSDS) standard (876, 756) QC-LDPC code deicts Fig. 5, -5 quasi-cyclic code-[] algebric code-[9] irregular code -6 our roosed bi-diagonal LDPC code SNR(dB) Fig. 6. BER erformance of the roosed code and the code resented in [9] and []. o further illustrate the erformance of the code in this aer, the BER erformance of the code constructed by the null sace of H qc and the codes constructed by the methods given in [9] and [] is shown in Fig.6, where the roosed bi-diagonals LDPC code indicates the code whose arity check matrix is systematic form and irregular code reresents the code whose arity check matrix is not systematic form. he structure of arity check matrix in [9] is also systematic form. However, the information art of arity check matrix H k filled with the same dimension CPM, and need related algorithms to determine the cyclic shift coefficients of CPMs. Comared with the construction method in [9], using different sizes CPM filled the nonzero elements of H k, can ensure it is a full rank matrix. hat is, there is no redundant row in H k. When there are redundant rows in the arity check matrix, the actual code rate is greater than the theoretical design code rate, which make the code rate is not controlled. he construction of arity check matrix in [] is also emloying systematic form. And the notable feature is reflected on the structure of the base matrix, which is constructed by masking method. When the highly structured arrays are densely acked, the density of such an array can be reduced by relacing a set of CPMs by zero matrices. his relacement of CPMs by zero matrices is referred to as masking. Masking an array of CPMs can result in an array of CPMs and zero matrices whose anner grah have fewer edges and hence have fewer short cycles and ossibly larger girth. However, how to construct the masking matrix with large girth and minimum distance is a very challenging roblem. As seen in Fig. 6, comared with the code in [9], 24 Engineering and echnology Publishing 545
6 Journal of Communications Vol. 9, No. 7, July 24 the roosed bi-diagonal code can achieve.5db SNR erformance imrovement when BER is -5. Besides, when the SNR is 3.5dB, the BER erformance order of the roosed bi-diagonal code is -6, while the code in [] is -3, the ga between them is three orders of magnitude. What s more, the convergence of the code constructed in [] is slow. IV. CONCLUSION In summary, we have resented a new method to construct irregular QC-LDPC code based on CPMs of different sizes. he main advantages of the roosed QC- LDPC codes are with large girth and irregular structure. What s more, our arity check matrix is quasi-cyclic and comosed by zero matrix and CPMs of different sizes. Encoding rocess can be achieved in a recursive way with few calculations. Simulation results show that the roosed QC-LDPC codes outerform the CCSDS standard code and several existing codes with same size CPMs under AWGN channel. REFERENCES [] Exerimental Secifications, Low Density Parity Check codes for Use in Near-Earth and Dee Sace Alications, CCSDS 3.- O-2, 27. [2] R. G. Gallager, Low-density arity-check codes, IRE rans. Information heory., vol. I-8,. 2-28, Jan [3] L. Zhang, Q. Huang, S. Lin, K. Abdel-Ghaffar, and I. F. Blake, Quasi-cyclic LDPC codes: An algebraic construction, rank analysis, and codes on Latin squares, IEEE rans. Commun., vol. 58, , Nov. 2. [4]. Richardson, Error floors of LDPC codes, in Proc. 23 Allerton Conf. Commun., Control and Comuting, he University, 23, [5] G. Liva, W. E. Ryan, and M. Chiani, Quasi-cyclic generalized LDPC codes with low error floors, IEEE rans. Commun., vol. 56, , Jan 28. [6] Y. Wang, S. C. Draer, and J. S. Yedidia, Hierarchical and highgirth QC-LDPC codes, IEEE rans. Inf. heory, vol. 59, , July 23. [7]. ian, C. R. Jones, J. D. Villasenor, and R. D. Wesel, Selective avoidance of cycles in irregular LDPC code construction, IEEE rans. Commun., vol. 52, , Aug. 24. [8] J. Wang, L. Dolecek, and R. D. Wesel, he cycle consistency matrix aroach to absorbing sets in searable circulant-based LDPC codes, IEEE rans. Inf. heory, vol. 59, , Aril 23. [9] J. Chen, R. M. anner, J. Zhang, and M. P. Fossorier, Construction of irregular LDPC codes by quasi-cyclic extension, IEEE rans. Inf. heory, vol. 53, , Aril 27. [] S. J. Johnson and S. R. Weller, A family of irregular LDPC codes with low encoding comlexity, IEEE Commun. Lett., vol. 7,. 79-8, Feb. 23. [] L. Wang, X. Zhang, F. Yu, Y. Fu, and Y. Wang, QC-LDPC codes with girth eight based on indeendent row-column maing sequence, IEEE Commun. Lett., vol. 7, , Nov. 23. [2] S. Kim, J. No, H. Chung, and D. Shin, On the girth of tanner (3, 5) quasi-cyclic LDPC codes, IEEE rans. Inf. heory, vol. 52, , Aril 26. [3] P. Yang, X. Bao, and H. Zhao, Construction of quasi-cyclic LDPC codes with large girth based on circulant ermutation matirx, in Proc. 22nd Wireless and Otical Communication Conference (WOCC), Chong Qing, 23, [4] K. Liu, Z. Fei, J. Kuang, and X. Li, A novel algorithm for removing cycles in quasi-cyclic LDPC codes, in Proc. 2th International Symosium on Personal, Indoor and Mobile Radio Communications, Bei Jing, 29, [5] J. Zhang and G. Zhang, Deterministic girth-eight QC-LDPC codes with large column weight, IEEE Commun. Lett., vol. 8, , Aril 24. [6] M. Yang, W. E. Ryan, and Y. Li, Design of efficiently encodable moderate-length high-rate irregular LDPC codes, IEEE rans. Commun., vol. 52, , Aril 24. [7] J. Fan and Y. Xiao, A design of LDPC codes with large girth based on the sub-matrix shifting, in Proc. IE International Conference, Wireless, Mobile and Multimedia Networks, Hang Zhou, 26,. -4. [8] R. M. anner, A recursive aroach to low comlexity codes, IEEE rans. Inf. heory, vol. 27, , Se 98. [9] H. Jin and R. J. McEliece, Coding theorems for turbo code ensembles, IEEE rans. Inf. heory, vol. 48, , Jun 22. [2] Y. Zhang and W. E. Ryan, Structured IRA codes: erformance analysis and construction, IEEE rans. Commun., vol. 55, , May 27. [2] J. Wang, J. Lei, S. Ni, X. ang, and G. Ou, QC-IRA-d codes based on circulant ermutation matrices, IEEE Commun. Lett., vol. 5, , Nov. 2. Hui Zhao received the Ph.D. degree in Astronautics from Harbin Institute of echnology. She now is a rofessor and mainly engaged in the research direction for signal and information rocessing, digital communication, theory and technology of otical network. Xiaoxiao Bao is a master and mainly engaged in the research of channel code, esecially LDPC codes. In addition, she is articiating in roject study of the key technology research on dee sace laser reliable communication. Liang Qin is a master and mainly engaged in the research of LDPC codes in dee sace communications. In addition, he is articiating in roject study of the key technology research on dee sace laser reliable communications. 24 Engineering and echnology Publishing 546
7 Journal of Communications Vol. 9, No. 7, July 24 Ruyan Wang is a rofessor and mainly engaged in the research direction for wireless communication, sace otical communication, theory and technology of otical network, otical information rocessing, and communication network reliability fault management. Hong Zhang received the M.S. degree in Chongqing University of Posts and elecommunications in 23. He is currently a researcher in key laboratory of otical fiber communication. His research includes wireless communications, survivability technology and fault management of otical networks and next generation assive otical network. 24 Engineering and echnology Publishing 547
A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH
A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu
More informationLOW-DENSITY PARITY-CHECK (LDPC) codes [1] can
208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer
More informationAn Efficient Coding Method for Coding Region-of-Interest Locations in AVS2
An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China
More informationAn Efficient Video Program Delivery algorithm in Tree Networks*
3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,
More informationSwift Template Matching Based on Equivalent Histogram
Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:
More informationAn FPGA Implementation of ( )-Regular Low-Density. Parity-Check Code Decoder
An FPGA Imlementation of ( )-Regular Low-Density Parity-Check Code Decoder Tong Zhang ECSE Det., RPI Troy, NY tzhang@ecse.ri.edu Keshab K. Parhi ECE Det., Univ. of Minnesota Minneaolis, MN arhi@ece.umn.edu
More informationRandomized algorithms: Two examples and Yao s Minimax Principle
Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum
More informationA New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism
A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute
More informationA Novel Iris Segmentation Method for Hand-Held Capture Device
A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,
More informationLowering the Error Floors of Irregular High-Rate LDPC Codes by Graph Conditioning
Lowering the Error Floors of Irregular High- LDPC Codes by Graph Conditioning Wen-Yen Weng, Aditya Ramamoorthy and Richard D. Wesel Electrical Engineering Department, UCLA, Los Angeles, CA, 90095-594.
More informationFPGA Implementation of Binary Quasi Cyclic LDPC Code with Rate 2/5
FPGA Implementation of Binary Quasi Cyclic LDPC Code with Rate 2/5 Arulmozhi M. 1, Nandini G. Iyer 2, Anitha M. 3 Assistant Professor, Department of EEE, Rajalakshmi Engineering College, Chennai, India
More informationLearning Motion Patterns in Crowded Scenes Using Motion Flow Field
Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical
More informationAUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.
inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.
More informationIMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model
IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,
More informationEfficient Parallel Hierarchical Clustering
Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore
More informationA Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems
A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,
More informationDistributed Estimation from Relative Measurements in Sensor Networks
Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.
More informationNew Message-Passing Decoding Algorithm of LDPC Codes by Partitioning Check Nodes 1
New Message-Passing Decoding Algorithm of LDPC Codes by Partitioning Check Nodes 1 Sunghwan Kim* O, Min-Ho Jang*, Jong-Seon No*, Song-Nam Hong, and Dong-Joon Shin *School of Electrical Engineering and
More informationAn Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal
International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,
More informationInteractive Image Segmentation
Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).
More informationShuigeng Zhou. May 18, 2016 School of Computer Science Fudan University
Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions
More informationSensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network
1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann
More informationBounds on the Number of Iterations for Turbo-Like Ensembles over the Binary Erasure Channel
ACCEPTED TO THE IEEE TRANSACTIONS ON INFORMATION THEORY, REVISED FEBRUARY 29. Bounds on the Numer of Iterations for Turo-Like Ensemles over the Binary Erasure Channel Igal Sason, Memer, IEEE and Gil Wiechman,
More informationApplying the fuzzy preference relation to the software selection
Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN
More informationQuantized Iterative Message Passing Decoders with Low Error Floor for LDPC Codes
Quantized Iterative Message Passing Decoders with Low Error Floor for LDPC Codes Xiaojie Zhang and Paul H. Siegel University of California, San Diego 1. Introduction Low-density parity-check (LDPC) codes
More informationEE678 Application Presentation Content Based Image Retrieval Using Wavelets
EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective
More informationA Model-Adaptable MOSFET Parameter Extraction System
A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313
More informationDirected File Transfer Scheduling
Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was
More informationTHE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH. Haotian Zhang and José M. F. Moura
THE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH Haotian Zhang and José M. F. Moura Department of Electrical and Computer Engineering Carnegie Mellon University, Pittsburgh, PA 523 {haotian,
More informationThe Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks
The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University
More informationCooperative Diversity Combined with Beamforming
Cooerative Diversity Combined with Beamforming Hyunwoo Choi and Jae Hong Lee School of Electrical Engineering and INMC Seoul National University Seoul, Korea Email: {novo28, jhlee}@snu.ac.kr Abstract In
More informationPerformance Analysis of Gray Code based Structured Regular Column-Weight Two LDPC Codes
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 4, Ver. III (Jul.-Aug.2016), PP 06-10 www.iosrjournals.org Performance Analysis
More informationGradient Compared l p -LMS Algorithms for Sparse System Identification
Gradient Comared l -LMS Algorithms for Sarse System Identification Yong Feng,, Jiasong Wu, Rui Zeng, Limin Luo, Huazhong Shu. School of Biological Science and Medical Engineering, Southeast University,
More informationMulticast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1
Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and
More informationExtracting Optimal Paths from Roadmaps for Motion Planning
Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu
More informationImproved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties
Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal
More informationsplit split (a) (b) split split (c) (d)
International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering
More informationSpace-efficient Region Filling in Raster Graphics
"The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich
More informationImplementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching
Imlementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Ju Hui Li, eng Hiot Lim and Qi Cao School of EEE, Block S Nanyang Technological University Singaore 639798
More informationModeling Reliable Broadcast of Data Buffer over Wireless Networks
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 3, 799-810 (016) Short Paer Modeling Reliable Broadcast of Data Buffer over Wireless Networs Deartment of Comuter Engineering Yeditee University Kayışdağı,
More informationBlind Separation of Permuted Alias Image Base on Four-phase-difference and Differential Evolution
Sensors & Transducers, Vol. 63, Issue, January 204,. 90-95 Sensors & Transducers 204 by IFSA Publishing, S. L. htt://www.sensorsortal.com lind Searation of Permuted Alias Image ase on Four-hase-difference
More informationError Control Coding for MLC Flash Memories
Error Control Coding for MLC Flash Memories Ying Y. Tai, Ph.D. Cadence Design Systems, Inc. ytai@cadence.com August 19, 2010 Santa Clara, CA 1 Outline The Challenges on Error Control Coding (ECC) for MLC
More informationTOPP Probing of Network Links with Large Independent Latencies
TOPP Probing of Network Links with Large Indeendent Latencies M. Hosseinour, M. J. Tunnicliffe Faculty of Comuting, Information ystems and Mathematics, Kingston University, Kingston-on-Thames, urrey, KT1
More informationA Morphological LiDAR Points Cloud Filtering Method based on GPGPU
A Morhological LiDAR Points Cloud Filtering Method based on GPGPU Shuo Li 1, Hui Wang 1, Qiuhe Ma 1 and Xuan Zha 2 1 Zhengzhou Institute of Surveying & Maing, No.66, Longhai Middle Road, Zhengzhou, China
More informationFace Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern
Face Recognition Based on Wavelet Transform and Adative Local Binary Pattern Abdallah Mohamed 1,2, and Roman Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville, Louisville,
More informationSensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s
Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,
More informationLearning Robust Locality Preserving Projection via p-order Minimization
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical
More informationStereo Disparity Estimation in Moment Space
Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University
More informationAUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH
AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH A. Prokos 1, G. Karras 1, E. Petsa 2 1 Deartment of Surveying, National Technical University of Athens (NTUA),
More informationUse of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes
Use of Multivariate Statistical Analysis in the Modelling of Chromatograhic Processes Simon Edwards-Parton 1, Nigel itchener-hooker 1, Nina hornhill 2, Daniel Bracewell 1, John Lidell 3 Abstract his aer
More informationA Petri net-based Approach to QoS-aware Configuration for Web Services
A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration
More informationSingle character type identification
Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition
More informationEfficient Processing of Top-k Dominating Queries on Multi-Dimensional Data
Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of
More informationEquality-Based Translation Validator for LLVM
Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented
More informationPA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN
htt://dx.doi.org/10.5755/j01.eee.20.3.3951 ELEKRONIKA IR ELEKROENIKA, ISSN 1392-1215, VOL. 20, NO. 3, 2014 PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN Ke Xiong 1, Yu
More informationSource Coding and express these numbers in a binary system using M log
Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is
More informationAN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY
AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science
More informationSignature File Hierarchies and Signature Graphs: a New Index Method for Object-Oriented Databases
Signature File Hierarchies and Signature Grahs: a New Index Method for Object-Oriented Databases Yangjun Chen* and Yibin Chen Det. of Business Comuting University of Winnieg, Manitoba, Canada R3B 2E9 ABSTRACT
More informationRelations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.
Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may
More informationResearch on Inverse Dynamics and Trajectory Planning for the 3-PTT Parallel Machine Tool
06 International Conference on aterials, Information, echanical, Electronic and Comuter Engineering (IECE 06 ISBN: 978--60595-40- Research on Inverse Dynamics and rajectory Planning for the 3-P Parallel
More informationImproved Image Super-Resolution by Support Vector Regression
Proceedings of International Joint Conference on Neural Networks, San Jose, California, USA, July 3 August 5, 0 Imroved Image Suer-Resolution by Suort Vector Regression Le An and Bir Bhanu Abstract Suort
More information10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1
10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1
More informationPREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS
PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links
More informationWavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces
Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,
More informationEDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS
EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS Shuang Li, Alvin Lim, Santosh Kulkarni and Cong Liu Auburn University, Comuter Science and Software
More informationA GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island
A GPU Heterogeneous Cluster Scheduling Model for Preventing Temerature Heat Island Yun-Peng CAO 1,2,a and Hai-Feng WANG 1,2 1 School of Information Science and Engineering, Linyi University, Linyi Shandong,
More informationFigure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201
200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle
More informationImproved Gaussian Mixture Probability Hypothesis Density for Tracking Closely Spaced Targets
INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 7, VOL., NO., PP. 7-5 Manuscrit received October 7, 5; revised June, 7. DOI:.55/eletel-7- Imroved Gaussian Mixture Probability Hyothesis Density for
More informationCheck-hybrid GLDPC Codes Without Small Trapping Sets
Check-hybrid GLDPC Codes Without Small Trapping Sets Vida Ravanmehr Department of Electrical and Computer Engineering University of Arizona Tucson, AZ, 8572 Email: vravanmehr@ece.arizona.edu David Declercq
More informationWeighted Page Rank Algorithm based on In-Out Weight of Webpages
Indian Journal of Science and Technology, Vol 8(34), DOI: 10.17485/ijst/2015/v8i34/86120, December 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 eighted Page Rank Algorithm based on In-Out eight
More informationComplexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks
Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical
More informationAn empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs
An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science
More informationMatlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems
Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics
More informationRandomized Selection on the Hypercube 1
Randomized Selection on the Hyercube 1 Sanguthevar Rajasekaran Det. of Com. and Info. Science and Engg. University of Florida Gainesville, FL 32611 ABSTRACT In this aer we resent randomized algorithms
More informationOn the construction of Tanner graphs
On the construction of Tanner graphs Jesús Martínez Mateo Universidad Politécnica de Madrid Outline Introduction Low-density parity-check (LDPC) codes LDPC decoding Belief propagation based algorithms
More informationSource-to-Source Code Generation Based on Pattern Matching and Dynamic Programming
Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code
More informationSkip List Based Authenticated Data Structure in DAS Paradigm
009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge
More informationMATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT
MATHEMATICAL MODELING OF COMPLE MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT V.N. Nesterov JSC Samara Electromechanical Plant, Samara, Russia Abstract. The rovisions of the concet of a multi-comonent
More informationModified Bloom filter for high performance hybrid NoSQL systems
odified Bloom filter for high erformance hybrid NoSQL systems A.B.Vavrenyuk, N.P.Vasilyev, V.V.akarov, K.A.atyukhin,..Rovnyagin, A.A.Skitev National Research Nuclear University EPhI (oscow Engineering
More informationSPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin 2, Mohammad Ali Masnadi-Shirazi 1
SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin, Mohammad Ali Masnadi-Shirazi 1 1. Shiraz University, Shiraz, Iran,. Sabanci University, Istanbul, Turkey ssamadi@shirazu.ac.ir,
More informationThe Research on Curling Track Empty Value Fill Algorithm Based on Similar Forecast
Research Journal of Alied Sciences, Engineering and Technology 6(8): 1472-1478, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: October 31, 2012 Acceted: January
More informationA Fast Image Restoration Method Based on an Improved Criminisi Algorithm
A Fast Image Restoration Method Based on an Imroved Algorithm Yue Chi1, Ning He2*, Qi Zhang1 Beijing Key Laboratory of Information Services Engineering, Beijing Union University, Beijing 100101, China.
More informationLOW-density parity-check (LDPC) codes have attracted
2966 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004 LDPC Block and Convolutional Codes Based on Circulant Matrices R. Michael Tanner, Fellow, IEEE, Deepak Sridhara, Arvind Sridharan,
More informationHardware-Accelerated Formal Verification
Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.
More informationThe VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing
The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing Mikael Taveniku 2,3, Anders Åhlander 1,3, Magnus Jonsson 1 and Bertil Svensson 1,2
More informationBrief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION
IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO., APRIL 00 83 Brief Contributions A Geometric Theorem for Network Design Massimo Franceschetti, Member, IEEE, Matthew Cook, and Jehoshua Bruck, Fellow, IEEE
More informationContinuous Visible k Nearest Neighbor Query on Moving Objects
Continuous Visible k Nearest Neighbor Query on Moving Objects Yaniu Wang a, Rui Zhang b, Chuanfei Xu a, Jianzhong Qi b, Yu Gu a, Ge Yu a, a Deartment of Comuter Software and Theory, Northeastern University,
More informationFace Recognition Using Legendre Moments
Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,
More informationA DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans
Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment
More information10. Parallel Methods for Data Sorting
10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3
More informationTheoretical Analysis of Graphcut Textures
Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut
More information3D Surface Simplification Based on Extended Shape Operator
3D Surface Simlification Based on Extended Shae Oerator JUI-LIG TSEG, YU-HSUA LI Deartment of Comuter Science and Information Engineering, Deartment and Institute of Electrical Engineering Minghsin University
More informationDetection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine
Journal of Comuter Science 8 (7): 1184-1190, 2012 ISSN 1549-3636 2012 Science Publications Detection of Occluded Face Image using Mean Based Weight Matrix and Suort Vector Machine 1 G. Nirmala Priya and
More informationShort Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION
466 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE VOL 2 NO 5 MAY 999 Short Paers Symmetry Detection by Generalized Comlex (GC) Moments: A Close-Form Solution Dinggang Shen Horace HS I
More informationA Study of Protocols for Low-Latency Video Transport over the Internet
A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis
More informationQuasi-Cyclic Low-Density Parity-Check (QC-LDPC) Codes for Deep Space and High Data Rate Applications
Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) Codes for Deep Space and High Data Rate Applications Nikoleta Andreadou, Fotini-Niovi Pavlidou Dept. of Electrical & Computer Engineering Aristotle University
More informationFinding Small Stopping Sets in the Tanner Graphs of LDPC Codes
Finding Small Stopping Sets in the Tanner Graphs of LDPC Codes Gerd Richter University of Ulm, Department of TAIT Albert-Einstein-Allee 43, D-89081 Ulm, Germany gerd.richter@uni-ulm.de Abstract The performance
More informationVehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments
Proceedings of 0 4th International Conference on Machine Learning and Comuting IPCSIT vol. 5 (0) (0) IACSIT Press, Singaore Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments
More informationCapacity-Approaching Low-Density Parity- Check Codes: Recent Developments and Applications
Capacity-Approaching Low-Density Parity- Check Codes: Recent Developments and Applications Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, CA 95616, U.S.A.
More informationIntroduction to Parallel Algorithms
CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has
More information