Construction of Irregular QC-LDPC Codes in Near-Earth Communications

Size: px
Start display at page:

Download "Construction of Irregular QC-LDPC Codes in Near-Earth Communications"

Transcription

1 Journal of Communications Vol. 9, No. 7, July 24 Construction of Irregular QC-LDPC Codes in Near-Earth Communications Hui Zhao, Xiaoxiao Bao, Liang Qin, Ruyan Wang, and Hong Zhang Chongqing University of Posts and elecommunication, School of Communication and Information Engineering, Chongqing 465, China Abstract High-seed, high-reliability requirements and strict ower limitation of near-earth communications yield that the channel coding must have high coding gain and lower error floor. In this aer, an irregular quasi-cyclic low-density aritycheck (QC-LDPC) code for secific use in near-earth communications is roosed. In order to eliminate the imact of short-cycles and further imrove the erformance of codes, a base matrix with girth at least 8 is emloyed. hen dualdiagonal structure is adoted in arity check matrix to reduce encoding comlexity. Besides, circulant ermutation matrices and zero matrices with different sizes are used to fill the nonzero ositions and zero ositions of the base matrix so as to remove the comlexity of the selection of cyclic shift coefficients. he adotion of circulant ermutation matrices with different sizes ensures that the arity check matrix is full rank, which makes the code rate controllable. Finally, simulation results are given to demonstrate the erformance of the constructed codes by comaring with several existing codes. Index erms Low-density arity-check codes, arity check matrix, circulant ermutation matrix, near-earth communications I. INRODUCION Due to high-seed, high-reliability requirements and strict ower limitation, excellent channel coding becomes one of the key technologies to ensure the reliability and validity of near-earth communications []. Low-density arity check (LDPC) codes [2] have received more and more attention in near-earth communications for their outstanding erformance, such as faster iterative convergence, larger throughut, lower error floor, etc. Among LDPC codes, the quasi-cyclic LDPC (QC-LDPC) codes are the most romising class of structured LDPC codes due to their ease of imlementation and excellent erformance over noisy channels when decoded with message-assing algorithms [3]. In general, the overall erformance of a LDPC code is described by two different regions, the waterfall region and the error-floor region [4], [5]. he erformance in the Manuscrit received Aril 8, 24; revised July 28, 24. his work was suorted by the National Natural Science Foundation of China (Grants , 625and 55392), and the National Natural Science Foundation of CQ (Grants Nos. CSC22jjA448, CSC 2BA24, and CSC 2jjA76). Corresonding author zhaohui@cqut.edu.cn doi:.272/jcm waterfall region is heavily affected both by the girth (he length of the smallest cycle in the arity check matrix) and by the variable and check nodes degree rofiles for irregular LDPC codes. Iteratively decoded LDPC codes demonstrate an abrut change in their error rate curves. An error floor in the erformance curve means that the decoding failure rate does not continue to decrease raidly as the signal to noise ratio (SNR) increases [6]. Eliminating or lowering error floors is articularly imortant for near-earth alications that have extreme reliability demands. he erformance in the error floor region is also affected by the girth. For examle, in erasure channels every stoing set contains cycles [7], so that increasing the girth turns out to increasing the smallest stoing set size [8] of the LDPC codes. Short cycles in the anner grah, which lead to inefficient decoding and limit the convergence rate of the sumroduct algorithm, affect the erformance of the LDPC codes. herefore, design of LDPC codes with large girth is of great interest [4]. here have been several aroaches, including direct construction aroaches [9]-[2] and cycle removal based aroaches [3], to remove short cycles in anner grah and construct LDPC codes with large girth. However, these aroaches are either not sufficiently flexible in the code arameter selection due to the constraint on girth [4], or unable to reserve the quasi-cyclic structure thereby increasing the encoding comlexity [5]. In order to reduce the comlexity of arity check matrix construction and to achieve an efficient encoding, we use the arity check matrix with systematic form, and design the check art and the information art indeendently. he check art of arity check matrix adots the dual-diagonal structure to achieve iterative encoding. he information art uses the quasi-cyclic structure whose nonzero ositions relaced by circulant ermutation matrices (CPMs) with different sizes and zero ositions relaced by corresonding-size zero matrices to reduce the comlexity of arity check matrix construction. he class of LDPC code derived from our construction ossesses large girth and much more flexibility in terms of code length and rate. What s more, the roosed codes also can achieve very good erformance while retaining the racticality of quasicyclic structured. 24 Engineering and echnology Publishing 54

2 Journal of Communications Vol. 9, No. 7, July 24 he organization of the rest of this aer is as follows. First, we resent the construction method of the check art and the information art of arity check matrix in Section II. hen, we show the erformance comarison between the roosed code and several existing codes over binary-inut Additive White Gaussian Noise (AWGN) channel in Section III. he aer is summarized in the last section. and then exand H into desired matrix Hk using CPMs or zero matrices with different sizes. ) Construction of sub-matrix B: Design a matrix B with dimension v v2, where B(,)=B(2,)=B(3,)= =B(v,)=, and other elements are. hen B is a v v2 matrix of the following form: II. CONSRUCION MEHOD In this section, we introduce the basic construction of the roosed irregular QC-LDPC codes. Suose the arity check matrix of QC-LDPC code is systematic form: H H H k () where H is an M M matrix corresonding to the check art of arity check matrix; Hk is an M (N-M) matrix that indicates the information art. he arity check matrix of irregular QC-LDPC code can be obtained through constructing H and Hk indeendently, where H is a dual-diagonal square matrix and Hk kees the quasi-cyclic form. M M (3) By cyclically shifting the elements of B one lace to right, we can obtain v2- new matrices, denoted by B, B2, B3,, B( v2 ). Combining B and the v2- new (4) B B B B2 B(v2 ) 2) Construction of sub-matrix B2: Design a matrix B2 with dimension v v2, where B2(,)=B2(2,2)=B2(3,3)= =B2(v,v)=, and other elements are. hen B2 is a v v2 matrix of the following form: B2 (2) v v 2 (5) Let B2 have the following form: B2 B2 Clearly, H is a non-singular matrix. It is well known that degree-2 variable nodes (VNs) make it ossible to achieve sarse and otimal irregular roerties and simlify the encoding rocess [6]. However, many works show that the VNs with low degree are bad for decoding erformance [8]. hus, in order to avoid the bad influence of degree-2 VNs, we make the number of VNs with degree-2 satisfy the following constraint. he maximum number of VNs with degree-2 should satisfy Nv,max (2) N K M, where M is the B2 B2 B2 (6) he total number of B2 is v. By cyclically shifting the elements of B2 v laces to right, we can get v- new matrices, denoted by B22, B23,,B2v. Combining B2 and the v- new matrices into a column, then we can get a v3 v2 matrix B2 of the following form: B2 B2 B22 B2v B23 (7) 3) Construction of sub-matrix B3: Design a matrix B3 also with dimension v v2, where B3(, )=B3(2, +v)=b3(3, +2v)= =B3(v, +v-v2)= and other elements are. hen we can obtain the following matrix: number of check nodes (CNs), N is the number of VNs and K is the number of information bits. B. Construction of Hk. In this subsection, we use the CPMs with different sizes to construct a class of irregular QC-LDPC codes. Comared with the direct construction methods [9]-[2], this method has a relatively simle structure, and there is no need to search the cyclic shift coefficients of base matrix. B3 v v C. Construction of Base Matrix We design three sub-matrices B, B2 and B3, combine them into a row and transose to obtain matrix H [7], 24 Engineering and echnology Publishing v v 2 matrices into a column, then we can obtain the following v3 v2 matrix B: A. Construction of H Dual-diagonal structure of H has the following form: H B v v v v 2 (8) Cyclically shifting the elements of B3 one lace to right, then we can get v- new matrices, denoted by B3, 542

3 Journal of Communications Vol. 9, No. 7, July 24 B3 B3( v ) B32 (9) By arranging v B3v into a column, we form the following v3 v2 matrix: B3 B3v B3v B3v B3v Coy Coy () B2 B3 3v2 v3 () B3 B2 Ga Ga2 hen we can get H as follows: H B Ga B3v B3 Ga2 B32,,B3(v-). Arranging B3 and the v- new matrices results in a column of v matrices: B Fig.. Princile of cyclic-coy. D. Exansion of the Base Matrix Following the above construction, we can construct three v3 v2 arrays B, B2 and B3. Relace the nonzero elements of the three sub-matrices with CPMs of different suitable sizes, and then relace the zero elements of the three sub-matrices with zero matrices of the corresonding sizes, we can obtain the desired matrix H k. ) Size selection of CPMs: Let P be the CPM defined by: P he null sace of H gives an irregular QC-LDPC code of length v3 3 whose check matrix with column and row weight at least 3 and v, resectively. he corresonding anner grah has girth at least 8. aking a sub-matrix as Hk of the arity check matrix, we can construct a class of irregular QC-LDPC codes. Based on the above analysis, the conditions that the sizes of the CPMs and the base matrix need to meet are as follows: a) he sizes of CPMs need to satisfy the condition: max{, 2, 3 } 2 min{, 2, 3} If max{, 2, 3 } 2 min{, 2, 3}, then Ga is larger than the row size of B. Similarly, Ga2 is larger than the row size of B2. he cyclic coy oeration will not be imlemented. b) he number of columns for a common quasi-cyclic matrix should be smaller than the least common multile (LCM) of any two of its CPMs sizes. hat is, the number of columns should satisfy the condition: (2) Since the three sub-matrices have the same dimension, using different-size CPMs and zero matrices added will lead them have different dimensions. So in order to make H kee the desired matrix form and avoid short cycles, the sizes of CPMs are needed to be selected carefully. Now, suose we use CPMs with size, 2 and 3 to relace the nonzero elements of B, B2 and B3, and exloit zero matrices with size, 2 and 3 to relace the zero elements of them. For simlicity and without loss of generality, we assume 2 3, then the sizes of the obtained sub-matrices are (v3 ) (v2 ), (v3 2) (v2 2) and (v3 3) (v2 3), resectively. Clearly, the size of row ga between B and B3 is v3(3-), and the row size difference between B2 and B3 is v3(3-2). Since H B B2 n min LCM{ i, j } (4) i, j 3{ i, j } Next we use an examle to illustrate the above roosition b. Let 2 and 3 be the sizes of CPMs. hen the LCM of 2 and 3 is 6. When the number of columns of the matrix is greater than 6, there will form cycles of length four. he four bold in matrix A form a 4-cycle. B3 3v2 v3, then we can negligent the column size difference among B, B2 and B3. he size of row ga originated from different size CPMs and zero matrices can be resolved through cyclic coy. he rincile of cyclic-coy is shown in Fig., where Ga indicates the row size difference between B and B3, and Ga2 indicates the row size difference between B2 and B3. If we coy a Ga from the head of B and lace it at the end of B, then it can make sure that B and B3 are with the same row size. In a similar manner, we can maintain B2 and B3 having the same row size. hen we will get the desired nearly quasi-cyclic form matrix H. 24 Engineering and echnology Publishing (3) (5) c), 2 and 3 are rime. Minimum distance is an imortant arameter of LDPC code, which determines the LDPC codes detecting and correcting random errors caacity. Gallager has demonstrated that when the degrees of the variable node are less than 3, the minimum distances of LDPC codes grow linearly with block length (for a fixed rate and fixed degree of variable node), and 543

4 Journal of Communications Vol. 9, No. 7, July 24 when the variable node degree is greater than 3, the minimum distance of LDPC codes increase linearly along with block length [2]. So we often choose, 2 and 3 are rime and also relatively rime to make sure that the code have large minimum distance, and further make it ossess owerful error detection and correction caability. 2) Girth of the roosed irregular QC-LDPC codes It is well-known that girth is one of the designing criteria to otimize the erformance of message-assing decoding algorithms for LDPC codes. he girths of QC- LDPC codes have some unique features, as show in Fig. 2. H Fig. 2 Cycles in arity check matrix of QC-LDPC code. A cycle is a ath through nodes in the anner grah of a code. It alternates between check and variable nodes, and starts and ends at the same node. In terms of the code s arity check matrix, each check node in the anner grah corresonds to a row in its arity check matrix, and each variable node corresonds to a column. However, the systematic form QC-LDPC codes also have some unique structures. Next, we will take advantage of the relationshi between anner grah and the arity check matrix to show the roosed code of girth 8. he roosed H matrix has irregular structure and the anner grah [7] of the code c is similar to those of (irregular) reeat-accumulate (RA) codes [9]. RA codes are tyically systematic. What s more, RA codes rovide two imortant advantages. First, they allow flexibility in the choice of the reetition rate for each information bit, so that high-rate codes may be designed. Second, their irregularity allows oeration closer to the caacity limit. In the anner grah of the code c, we call the nodes corresonding to the columns of H arity bit nodes, the nodes corresonding to the columns of H k information bit nodes, and the nodes corresonding to the rows of H check nodes [2], [2]. We also call information and arity bit nodes variable nodes. We now use a general examle to illustrate the relationshi between anner grah and the arity check matrix owning systematic form. Suose the arity check matrix of the basic construction is given by: k (6) As shown in Fig. 3, the columns of H and H k are numbered from to 5 from the left. he rows of H and H k are numbered from to 5 from the to. he bold lines in anner grah reresent a 4-cycle, and they corresond to the four bold in the arity check matrix Infor. nodes Fig. 3. anner grah of H in (6) Check nodes Parity. nodes Since there is no 4-cycle and 6-cycle in the base matrix, the girth of the QC-LDPC code designed by our base matrix is at least 8 [7]. Making the girth of the arity check matrix as large as ossible can imrove the erformance of the code. III. SIMULAIONS In this section, we resent some simulation results to demonstrate the erformance of the constructed code by comaring with several existing codes. Simulations are erformed on AWGN channel with binary hase-shift keying modulation. Let v=8, =, 2 =3 and 3 =7. Following the above construction, we can construct a array H. Relacing the nonzero elements of B, B 2 and B 3 with CPMs of sizes, 2 and 3 resectively, and then relacing the zero elements of B, B 2 and B 3 by zero matrices with corresonding sizes resectively, we can get a class of irregular QC-LDPC codes. o validate the advantage of different-size CPMs, the bit error rate (BER) erformance comarison between the codes with different-size CPMs and same-size CPMs are resented in Fig. 4. In Fig. 4, the bi-diagonal regular code reresents the code with same size CPMs and also 24 Engineering and echnology Publishing 544

5 Journal of Communications Vol. 9, No. 7, July 24 has systematic form, the regular code reresents the code with same-size CPMs and has non systematic form, the bi-diagonal irregular code means the code with different-size CPMs and has systematic form, and the irregular code means the code with different-size CPMs and has non systematic form. he different-size CPMs with sizes, 2 and 3, the same-size CPMs with size =7. Choosing a sub-matrix H qc with dimension , the null sace of H qc gives an irregular (5248, 2624) QC-LDPC code with rate.5. If we let H qc be H k, then H [ H H qc], thus we can construct a class of systematic QC-LDPC codes. As shown in Fig.4, for the systematic code, when the SNR is 3dB, the BER erformance of our roosed bi-diagonal irregular code is -5, while the code whose arity check matrix has the same size CPMs is -4. he two differ by an order of magnitude. he code whose arity check matrix is nonsystematic form has similar erformance. where bi-diagonal code indicates the code whose arity check matrix is systematic form and irregular code reresents the code whose arity check matrix is not systematic form. It can be seen that our roosed bidiagonal code outerforms the CCSDS standard (876, 756) QC-LDPC code. Secially, it can achieve.5db SNR imrovement at BER of -5. In addition, the designing of our base matrix without using another algorithm to select the cyclic shift coefficients simlifies the construction rocess of the arity check matrix. BER BER regular code irregular code bi-diagonal regular code our roosed bi-diagonal irregular code SNR(dB) Fig. 4. BER erformance of the codes based on same base matrix with various CPMs. BER (876, 756) LDPC code irregular LDPC code our roosed bi-diagonal code SNR(dB) Fig. 5. BER erformance of the roosed code and CCSDS standard (876, 756) QC-LDPC code. Choosing a sub-matrix H qc2 with size , the null sace of H qc2 gives an irregular (874, 766) QC- LDPC code with rate.87. he BER erformance comarison between the roosed bi-diagonal code and consultative committee for sace data systems (CCSDS) standard (876, 756) QC-LDPC code deicts Fig. 5, -5 quasi-cyclic code-[] algebric code-[9] irregular code -6 our roosed bi-diagonal LDPC code SNR(dB) Fig. 6. BER erformance of the roosed code and the code resented in [9] and []. o further illustrate the erformance of the code in this aer, the BER erformance of the code constructed by the null sace of H qc and the codes constructed by the methods given in [9] and [] is shown in Fig.6, where the roosed bi-diagonals LDPC code indicates the code whose arity check matrix is systematic form and irregular code reresents the code whose arity check matrix is not systematic form. he structure of arity check matrix in [9] is also systematic form. However, the information art of arity check matrix H k filled with the same dimension CPM, and need related algorithms to determine the cyclic shift coefficients of CPMs. Comared with the construction method in [9], using different sizes CPM filled the nonzero elements of H k, can ensure it is a full rank matrix. hat is, there is no redundant row in H k. When there are redundant rows in the arity check matrix, the actual code rate is greater than the theoretical design code rate, which make the code rate is not controlled. he construction of arity check matrix in [] is also emloying systematic form. And the notable feature is reflected on the structure of the base matrix, which is constructed by masking method. When the highly structured arrays are densely acked, the density of such an array can be reduced by relacing a set of CPMs by zero matrices. his relacement of CPMs by zero matrices is referred to as masking. Masking an array of CPMs can result in an array of CPMs and zero matrices whose anner grah have fewer edges and hence have fewer short cycles and ossibly larger girth. However, how to construct the masking matrix with large girth and minimum distance is a very challenging roblem. As seen in Fig. 6, comared with the code in [9], 24 Engineering and echnology Publishing 545

6 Journal of Communications Vol. 9, No. 7, July 24 the roosed bi-diagonal code can achieve.5db SNR erformance imrovement when BER is -5. Besides, when the SNR is 3.5dB, the BER erformance order of the roosed bi-diagonal code is -6, while the code in [] is -3, the ga between them is three orders of magnitude. What s more, the convergence of the code constructed in [] is slow. IV. CONCLUSION In summary, we have resented a new method to construct irregular QC-LDPC code based on CPMs of different sizes. he main advantages of the roosed QC- LDPC codes are with large girth and irregular structure. What s more, our arity check matrix is quasi-cyclic and comosed by zero matrix and CPMs of different sizes. Encoding rocess can be achieved in a recursive way with few calculations. Simulation results show that the roosed QC-LDPC codes outerform the CCSDS standard code and several existing codes with same size CPMs under AWGN channel. REFERENCES [] Exerimental Secifications, Low Density Parity Check codes for Use in Near-Earth and Dee Sace Alications, CCSDS 3.- O-2, 27. [2] R. G. Gallager, Low-density arity-check codes, IRE rans. Information heory., vol. I-8,. 2-28, Jan [3] L. Zhang, Q. Huang, S. Lin, K. Abdel-Ghaffar, and I. F. Blake, Quasi-cyclic LDPC codes: An algebraic construction, rank analysis, and codes on Latin squares, IEEE rans. Commun., vol. 58, , Nov. 2. [4]. Richardson, Error floors of LDPC codes, in Proc. 23 Allerton Conf. Commun., Control and Comuting, he University, 23, [5] G. Liva, W. E. Ryan, and M. Chiani, Quasi-cyclic generalized LDPC codes with low error floors, IEEE rans. Commun., vol. 56, , Jan 28. [6] Y. Wang, S. C. Draer, and J. S. Yedidia, Hierarchical and highgirth QC-LDPC codes, IEEE rans. Inf. heory, vol. 59, , July 23. [7]. ian, C. R. Jones, J. D. Villasenor, and R. D. Wesel, Selective avoidance of cycles in irregular LDPC code construction, IEEE rans. Commun., vol. 52, , Aug. 24. [8] J. Wang, L. Dolecek, and R. D. Wesel, he cycle consistency matrix aroach to absorbing sets in searable circulant-based LDPC codes, IEEE rans. Inf. heory, vol. 59, , Aril 23. [9] J. Chen, R. M. anner, J. Zhang, and M. P. Fossorier, Construction of irregular LDPC codes by quasi-cyclic extension, IEEE rans. Inf. heory, vol. 53, , Aril 27. [] S. J. Johnson and S. R. Weller, A family of irregular LDPC codes with low encoding comlexity, IEEE Commun. Lett., vol. 7,. 79-8, Feb. 23. [] L. Wang, X. Zhang, F. Yu, Y. Fu, and Y. Wang, QC-LDPC codes with girth eight based on indeendent row-column maing sequence, IEEE Commun. Lett., vol. 7, , Nov. 23. [2] S. Kim, J. No, H. Chung, and D. Shin, On the girth of tanner (3, 5) quasi-cyclic LDPC codes, IEEE rans. Inf. heory, vol. 52, , Aril 26. [3] P. Yang, X. Bao, and H. Zhao, Construction of quasi-cyclic LDPC codes with large girth based on circulant ermutation matirx, in Proc. 22nd Wireless and Otical Communication Conference (WOCC), Chong Qing, 23, [4] K. Liu, Z. Fei, J. Kuang, and X. Li, A novel algorithm for removing cycles in quasi-cyclic LDPC codes, in Proc. 2th International Symosium on Personal, Indoor and Mobile Radio Communications, Bei Jing, 29, [5] J. Zhang and G. Zhang, Deterministic girth-eight QC-LDPC codes with large column weight, IEEE Commun. Lett., vol. 8, , Aril 24. [6] M. Yang, W. E. Ryan, and Y. Li, Design of efficiently encodable moderate-length high-rate irregular LDPC codes, IEEE rans. Commun., vol. 52, , Aril 24. [7] J. Fan and Y. Xiao, A design of LDPC codes with large girth based on the sub-matrix shifting, in Proc. IE International Conference, Wireless, Mobile and Multimedia Networks, Hang Zhou, 26,. -4. [8] R. M. anner, A recursive aroach to low comlexity codes, IEEE rans. Inf. heory, vol. 27, , Se 98. [9] H. Jin and R. J. McEliece, Coding theorems for turbo code ensembles, IEEE rans. Inf. heory, vol. 48, , Jun 22. [2] Y. Zhang and W. E. Ryan, Structured IRA codes: erformance analysis and construction, IEEE rans. Commun., vol. 55, , May 27. [2] J. Wang, J. Lei, S. Ni, X. ang, and G. Ou, QC-IRA-d codes based on circulant ermutation matrices, IEEE Commun. Lett., vol. 5, , Nov. 2. Hui Zhao received the Ph.D. degree in Astronautics from Harbin Institute of echnology. She now is a rofessor and mainly engaged in the research direction for signal and information rocessing, digital communication, theory and technology of otical network. Xiaoxiao Bao is a master and mainly engaged in the research of channel code, esecially LDPC codes. In addition, she is articiating in roject study of the key technology research on dee sace laser reliable communication. Liang Qin is a master and mainly engaged in the research of LDPC codes in dee sace communications. In addition, he is articiating in roject study of the key technology research on dee sace laser reliable communications. 24 Engineering and echnology Publishing 546

7 Journal of Communications Vol. 9, No. 7, July 24 Ruyan Wang is a rofessor and mainly engaged in the research direction for wireless communication, sace otical communication, theory and technology of otical network, otical information rocessing, and communication network reliability fault management. Hong Zhang received the M.S. degree in Chongqing University of Posts and elecommunications in 23. He is currently a researcher in key laboratory of otical fiber communication. His research includes wireless communications, survivability technology and fault management of otical networks and next generation assive otical network. 24 Engineering and echnology Publishing 547

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can 208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

Swift Template Matching Based on Equivalent Histogram

Swift Template Matching Based on Equivalent Histogram Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:

More information

An FPGA Implementation of ( )-Regular Low-Density. Parity-Check Code Decoder

An FPGA Implementation of ( )-Regular Low-Density. Parity-Check Code Decoder An FPGA Imlementation of ( )-Regular Low-Density Parity-Check Code Decoder Tong Zhang ECSE Det., RPI Troy, NY tzhang@ecse.ri.edu Keshab K. Parhi ECE Det., Univ. of Minnesota Minneaolis, MN arhi@ece.umn.edu

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

Lowering the Error Floors of Irregular High-Rate LDPC Codes by Graph Conditioning

Lowering the Error Floors of Irregular High-Rate LDPC Codes by Graph Conditioning Lowering the Error Floors of Irregular High- LDPC Codes by Graph Conditioning Wen-Yen Weng, Aditya Ramamoorthy and Richard D. Wesel Electrical Engineering Department, UCLA, Los Angeles, CA, 90095-594.

More information

FPGA Implementation of Binary Quasi Cyclic LDPC Code with Rate 2/5

FPGA Implementation of Binary Quasi Cyclic LDPC Code with Rate 2/5 FPGA Implementation of Binary Quasi Cyclic LDPC Code with Rate 2/5 Arulmozhi M. 1, Nandini G. Iyer 2, Anitha M. 3 Assistant Professor, Department of EEE, Rajalakshmi Engineering College, Chennai, India

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

New Message-Passing Decoding Algorithm of LDPC Codes by Partitioning Check Nodes 1

New Message-Passing Decoding Algorithm of LDPC Codes by Partitioning Check Nodes 1 New Message-Passing Decoding Algorithm of LDPC Codes by Partitioning Check Nodes 1 Sunghwan Kim* O, Min-Ho Jang*, Jong-Seon No*, Song-Nam Hong, and Dong-Joon Shin *School of Electrical Engineering and

More information

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Bounds on the Number of Iterations for Turbo-Like Ensembles over the Binary Erasure Channel

Bounds on the Number of Iterations for Turbo-Like Ensembles over the Binary Erasure Channel ACCEPTED TO THE IEEE TRANSACTIONS ON INFORMATION THEORY, REVISED FEBRUARY 29. Bounds on the Numer of Iterations for Turo-Like Ensemles over the Binary Erasure Channel Igal Sason, Memer, IEEE and Gil Wiechman,

More information

Applying the fuzzy preference relation to the software selection

Applying the fuzzy preference relation to the software selection Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN

More information

Quantized Iterative Message Passing Decoders with Low Error Floor for LDPC Codes

Quantized Iterative Message Passing Decoders with Low Error Floor for LDPC Codes Quantized Iterative Message Passing Decoders with Low Error Floor for LDPC Codes Xiaojie Zhang and Paul H. Siegel University of California, San Diego 1. Introduction Low-density parity-check (LDPC) codes

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

THE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH. Haotian Zhang and José M. F. Moura

THE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH. Haotian Zhang and José M. F. Moura THE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH Haotian Zhang and José M. F. Moura Department of Electrical and Computer Engineering Carnegie Mellon University, Pittsburgh, PA 523 {haotian,

More information

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University

More information

Cooperative Diversity Combined with Beamforming

Cooperative Diversity Combined with Beamforming Cooerative Diversity Combined with Beamforming Hyunwoo Choi and Jae Hong Lee School of Electrical Engineering and INMC Seoul National University Seoul, Korea Email: {novo28, jhlee}@snu.ac.kr Abstract In

More information

Performance Analysis of Gray Code based Structured Regular Column-Weight Two LDPC Codes

Performance Analysis of Gray Code based Structured Regular Column-Weight Two LDPC Codes IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 4, Ver. III (Jul.-Aug.2016), PP 06-10 www.iosrjournals.org Performance Analysis

More information

Gradient Compared l p -LMS Algorithms for Sparse System Identification

Gradient Compared l p -LMS Algorithms for Sparse System Identification Gradient Comared l -LMS Algorithms for Sarse System Identification Yong Feng,, Jiasong Wu, Rui Zeng, Limin Luo, Huazhong Shu. School of Biological Science and Medical Engineering, Southeast University,

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

split split (a) (b) split split (c) (d)

split split (a) (b) split split (c) (d) International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Imlementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Ju Hui Li, eng Hiot Lim and Qi Cao School of EEE, Block S Nanyang Technological University Singaore 639798

More information

Modeling Reliable Broadcast of Data Buffer over Wireless Networks

Modeling Reliable Broadcast of Data Buffer over Wireless Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 3, 799-810 (016) Short Paer Modeling Reliable Broadcast of Data Buffer over Wireless Networs Deartment of Comuter Engineering Yeditee University Kayışdağı,

More information

Blind Separation of Permuted Alias Image Base on Four-phase-difference and Differential Evolution

Blind Separation of Permuted Alias Image Base on Four-phase-difference and Differential Evolution Sensors & Transducers, Vol. 63, Issue, January 204,. 90-95 Sensors & Transducers 204 by IFSA Publishing, S. L. htt://www.sensorsortal.com lind Searation of Permuted Alias Image ase on Four-hase-difference

More information

Error Control Coding for MLC Flash Memories

Error Control Coding for MLC Flash Memories Error Control Coding for MLC Flash Memories Ying Y. Tai, Ph.D. Cadence Design Systems, Inc. ytai@cadence.com August 19, 2010 Santa Clara, CA 1 Outline The Challenges on Error Control Coding (ECC) for MLC

More information

TOPP Probing of Network Links with Large Independent Latencies

TOPP Probing of Network Links with Large Independent Latencies TOPP Probing of Network Links with Large Indeendent Latencies M. Hosseinour, M. J. Tunnicliffe Faculty of Comuting, Information ystems and Mathematics, Kingston University, Kingston-on-Thames, urrey, KT1

More information

A Morphological LiDAR Points Cloud Filtering Method based on GPGPU

A Morphological LiDAR Points Cloud Filtering Method based on GPGPU A Morhological LiDAR Points Cloud Filtering Method based on GPGPU Shuo Li 1, Hui Wang 1, Qiuhe Ma 1 and Xuan Zha 2 1 Zhengzhou Institute of Surveying & Maing, No.66, Longhai Middle Road, Zhengzhou, China

More information

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern Face Recognition Based on Wavelet Transform and Adative Local Binary Pattern Abdallah Mohamed 1,2, and Roman Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville, Louisville,

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

Learning Robust Locality Preserving Projection via p-order Minimization

Learning Robust Locality Preserving Projection via p-order Minimization Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH A. Prokos 1, G. Karras 1, E. Petsa 2 1 Deartment of Surveying, National Technical University of Athens (NTUA),

More information

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes Use of Multivariate Statistical Analysis in the Modelling of Chromatograhic Processes Simon Edwards-Parton 1, Nigel itchener-hooker 1, Nina hornhill 2, Daniel Bracewell 1, John Lidell 3 Abstract his aer

More information

A Petri net-based Approach to QoS-aware Configuration for Web Services

A Petri net-based Approach to QoS-aware Configuration for Web Services A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration

More information

Single character type identification

Single character type identification Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN

PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN htt://dx.doi.org/10.5755/j01.eee.20.3.3951 ELEKRONIKA IR ELEKROENIKA, ISSN 1392-1215, VOL. 20, NO. 3, 2014 PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN Ke Xiong 1, Yu

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science

More information

Signature File Hierarchies and Signature Graphs: a New Index Method for Object-Oriented Databases

Signature File Hierarchies and Signature Graphs: a New Index Method for Object-Oriented Databases Signature File Hierarchies and Signature Grahs: a New Index Method for Object-Oriented Databases Yangjun Chen* and Yibin Chen Det. of Business Comuting University of Winnieg, Manitoba, Canada R3B 2E9 ABSTRACT

More information

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University. Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may

More information

Research on Inverse Dynamics and Trajectory Planning for the 3-PTT Parallel Machine Tool

Research on Inverse Dynamics and Trajectory Planning for the 3-PTT Parallel Machine Tool 06 International Conference on aterials, Information, echanical, Electronic and Comuter Engineering (IECE 06 ISBN: 978--60595-40- Research on Inverse Dynamics and rajectory Planning for the 3-P Parallel

More information

Improved Image Super-Resolution by Support Vector Regression

Improved Image Super-Resolution by Support Vector Regression Proceedings of International Joint Conference on Neural Networks, San Jose, California, USA, July 3 August 5, 0 Imroved Image Suer-Resolution by Suort Vector Regression Le An and Bir Bhanu Abstract Suort

More information

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1 10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS

EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS Shuang Li, Alvin Lim, Santosh Kulkarni and Cong Liu Auburn University, Comuter Science and Software

More information

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island A GPU Heterogeneous Cluster Scheduling Model for Preventing Temerature Heat Island Yun-Peng CAO 1,2,a and Hai-Feng WANG 1,2 1 School of Information Science and Engineering, Linyi University, Linyi Shandong,

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

Improved Gaussian Mixture Probability Hypothesis Density for Tracking Closely Spaced Targets

Improved Gaussian Mixture Probability Hypothesis Density for Tracking Closely Spaced Targets INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 7, VOL., NO., PP. 7-5 Manuscrit received October 7, 5; revised June, 7. DOI:.55/eletel-7- Imroved Gaussian Mixture Probability Hyothesis Density for

More information

Check-hybrid GLDPC Codes Without Small Trapping Sets

Check-hybrid GLDPC Codes Without Small Trapping Sets Check-hybrid GLDPC Codes Without Small Trapping Sets Vida Ravanmehr Department of Electrical and Computer Engineering University of Arizona Tucson, AZ, 8572 Email: vravanmehr@ece.arizona.edu David Declercq

More information

Weighted Page Rank Algorithm based on In-Out Weight of Webpages

Weighted Page Rank Algorithm based on In-Out Weight of Webpages Indian Journal of Science and Technology, Vol 8(34), DOI: 10.17485/ijst/2015/v8i34/86120, December 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 eighted Page Rank Algorithm based on In-Out eight

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

Randomized Selection on the Hypercube 1

Randomized Selection on the Hypercube 1 Randomized Selection on the Hyercube 1 Sanguthevar Rajasekaran Det. of Com. and Info. Science and Engg. University of Florida Gainesville, FL 32611 ABSTRACT In this aer we resent randomized algorithms

More information

On the construction of Tanner graphs

On the construction of Tanner graphs On the construction of Tanner graphs Jesús Martínez Mateo Universidad Politécnica de Madrid Outline Introduction Low-density parity-check (LDPC) codes LDPC decoding Belief propagation based algorithms

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

Skip List Based Authenticated Data Structure in DAS Paradigm

Skip List Based Authenticated Data Structure in DAS Paradigm 009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge

More information

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT MATHEMATICAL MODELING OF COMPLE MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT V.N. Nesterov JSC Samara Electromechanical Plant, Samara, Russia Abstract. The rovisions of the concet of a multi-comonent

More information

Modified Bloom filter for high performance hybrid NoSQL systems

Modified Bloom filter for high performance hybrid NoSQL systems odified Bloom filter for high erformance hybrid NoSQL systems A.B.Vavrenyuk, N.P.Vasilyev, V.V.akarov, K.A.atyukhin,..Rovnyagin, A.A.Skitev National Research Nuclear University EPhI (oscow Engineering

More information

SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin 2, Mohammad Ali Masnadi-Shirazi 1

SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin 2, Mohammad Ali Masnadi-Shirazi 1 SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin, Mohammad Ali Masnadi-Shirazi 1 1. Shiraz University, Shiraz, Iran,. Sabanci University, Istanbul, Turkey ssamadi@shirazu.ac.ir,

More information

The Research on Curling Track Empty Value Fill Algorithm Based on Similar Forecast

The Research on Curling Track Empty Value Fill Algorithm Based on Similar Forecast Research Journal of Alied Sciences, Engineering and Technology 6(8): 1472-1478, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: October 31, 2012 Acceted: January

More information

A Fast Image Restoration Method Based on an Improved Criminisi Algorithm

A Fast Image Restoration Method Based on an Improved Criminisi Algorithm A Fast Image Restoration Method Based on an Imroved Algorithm Yue Chi1, Ning He2*, Qi Zhang1 Beijing Key Laboratory of Information Services Engineering, Beijing Union University, Beijing 100101, China.

More information

LOW-density parity-check (LDPC) codes have attracted

LOW-density parity-check (LDPC) codes have attracted 2966 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004 LDPC Block and Convolutional Codes Based on Circulant Matrices R. Michael Tanner, Fellow, IEEE, Deepak Sridhara, Arvind Sridharan,

More information

Hardware-Accelerated Formal Verification

Hardware-Accelerated Formal Verification Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.

More information

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing Mikael Taveniku 2,3, Anders Åhlander 1,3, Magnus Jonsson 1 and Bertil Svensson 1,2

More information

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO., APRIL 00 83 Brief Contributions A Geometric Theorem for Network Design Massimo Franceschetti, Member, IEEE, Matthew Cook, and Jehoshua Bruck, Fellow, IEEE

More information

Continuous Visible k Nearest Neighbor Query on Moving Objects

Continuous Visible k Nearest Neighbor Query on Moving Objects Continuous Visible k Nearest Neighbor Query on Moving Objects Yaniu Wang a, Rui Zhang b, Chuanfei Xu a, Jianzhong Qi b, Yu Gu a, Ge Yu a, a Deartment of Comuter Software and Theory, Northeastern University,

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

Theoretical Analysis of Graphcut Textures

Theoretical Analysis of Graphcut Textures Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut

More information

3D Surface Simplification Based on Extended Shape Operator

3D Surface Simplification Based on Extended Shape Operator 3D Surface Simlification Based on Extended Shae Oerator JUI-LIG TSEG, YU-HSUA LI Deartment of Comuter Science and Information Engineering, Deartment and Institute of Electrical Engineering Minghsin University

More information

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine Journal of Comuter Science 8 (7): 1184-1190, 2012 ISSN 1549-3636 2012 Science Publications Detection of Occluded Face Image using Mean Based Weight Matrix and Suort Vector Machine 1 G. Nirmala Priya and

More information

Short Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION

Short Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION 466 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE VOL 2 NO 5 MAY 999 Short Paers Symmetry Detection by Generalized Comlex (GC) Moments: A Close-Form Solution Dinggang Shen Horace HS I

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) Codes for Deep Space and High Data Rate Applications

Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) Codes for Deep Space and High Data Rate Applications Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) Codes for Deep Space and High Data Rate Applications Nikoleta Andreadou, Fotini-Niovi Pavlidou Dept. of Electrical & Computer Engineering Aristotle University

More information

Finding Small Stopping Sets in the Tanner Graphs of LDPC Codes

Finding Small Stopping Sets in the Tanner Graphs of LDPC Codes Finding Small Stopping Sets in the Tanner Graphs of LDPC Codes Gerd Richter University of Ulm, Department of TAIT Albert-Einstein-Allee 43, D-89081 Ulm, Germany gerd.richter@uni-ulm.de Abstract The performance

More information

Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments

Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments Proceedings of 0 4th International Conference on Machine Learning and Comuting IPCSIT vol. 5 (0) (0) IACSIT Press, Singaore Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments

More information

Capacity-Approaching Low-Density Parity- Check Codes: Recent Developments and Applications

Capacity-Approaching Low-Density Parity- Check Codes: Recent Developments and Applications Capacity-Approaching Low-Density Parity- Check Codes: Recent Developments and Applications Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, CA 95616, U.S.A.

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information