A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

Size: px
Start display at page:

Download "A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH"

Transcription

1 A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA jinlu, ABSTRACT We introduce a class of structured LDPC codes turbostructured LDPC (TS-LDPC) codes comosed of two subtrees connected by an interleaver. TS-LDPC codes with good girth roerties are easy to design: careful design of the interleaver comonent revents short cycles in its Tanner grah. We resent a methodology to design TS-LDPC codes with arbitrary column weight j 2 and arbitrary girth. In addition, we describe a comlexity reduced decoding algorithm. Simulation results demonstrate the good erformance of TS-LDPC codes when comared to random LDPC codes of the similar size and rate. 1. INTRODUCTION Low-density arity-check (LDPC) codes [1], can be alied in numerous tasks, e.g., communication systems, magnetic recording channels. Their erformance is close to the Shannon limit using iterative decoding [2]. An LDPC code can be described by a biartite grah called Tanner grah [3]. The length of the shortest cycle in a Tanner grah is referred to as its girth g. Short cycles in Tanner grahs tax the comuting effort of the decoding algorithm and revent it from converging to the otimal decoding result. Furthermore, reference [3] derives a lower bound on the minimum distance d min. This lower bound increases exonentially with girth. Therefore, LDPC codes with good girth roerties are articularly desirable. Recently, cyclic and uasi-cyclic LDPC codes have drawn much attention in the sense that they facilitate low-comlexity encoder and decoder designs. However, they have limited girths. Tanner, [4], roved that the girth of such codes with column weight j 3 is less than or eual to 6. This revents the girth of (n, j, k) cyclic and uasi-cyclic LDPC codes of log n log[(j 1)(k 1)] growing as, [1], hence erforming oorly at very long code block length. We resent a new tye of structured LDPC codes with arbitrary girth that are stimulated from turbo designs, which This work was suorted by the Data Storage Systems Center (DSSC) at Carnegie Mellon University, and by NSF grant # ECS we refer to as turbo-structured LDPC codes (TS-LDPC). The Tanner grah of such codes is comosed of two subtrees that are connected in a turbo-like manner by an interleaver. This structure facilitates the systematic design of LDPC codes with large girth and flexible code rates. Our turbo-structured LDPC codes are distinct from the codes in [5] that are also insired by turbo codes in their design of concatenated tree codes. However, our TS-LDPC codes are turbo for the decoder side, while [5] is turbo for the encoder side. The resulting TS-LDPC codes and the concatenated tree codes are very different, see [6] for comments. 2. TS-LDPC CODES The Tanner grah of TS-LDPC codes is comosed of three comonents: two height-balanced trees, denoted as an uertree T U, and a lower-tree T L, and an interlaver that connect T U and T L. The leaf-nodes of T U are bit nodes whereas the leaf-nodes of T L are check nodes. Both trees T U and T L contain h tiers (or layers). The first tier of T U contains only one check node C the root, as shown in Figure 1. To match T U, we let the root of T L to be a bit node V and connect V to C. The two trees are couled in a turbolike manner such that many edges join the leaf-nodes of T U and T L together, see Figure 1. The structure formed by the edges connecting the leaf-nodes of T U and the leaf nodes of T L is named the interleaver I. Since we are interested in regular LDPC codes, we let all the bit nodes have uniform degree j and all the check nodes have uniform degree k. For examle, a TS-LDPC code with h =4, j =3, and k =4is deicted in Figure 1. Ignoring ossible deendency of a few rows in the arity-check matrix, the code rate is ρ =1 j k. We can easily choose the values of j and k to create a TS- LDPC code with the desired code rate. 3. INTERLEAVER DESIGN By construction, each leaf-node in T U is connected to = j 1 leaf-nodes in T L. This is a one-to- maing, while the standard interleaver is a one-to-one maing between elements of two sets with the same size. To get a standard IEEE Communications Society 425

2 interleaver, we introduce auxiliary nodes (solid triangles) as shown in Figure 2 to facilitate the code design. For each leaf-node in T U, we add j 1 auxiliary nodes as its children. Similarly, each leaf-node in T L has k 1 auxiliary nodes as its descendants. After introducing auxiliary nodes, we notice that cycles resent in the codes must contain at least four auxiliary nodes two auxiliary nodes of T U and two auxiliary nodes of T L. We classify cycles into two disjoint categories: Tye- I cycles contain four and only four auxiliary nodes; tye-ii cycles contain more than four auxiliary nodes. We will disose of them searately. --alternate-decimal form is: X = x 4 x 3 x 2 x 1 In euation (1), x i, i =1 4, reresents the i th digit. The corresonding value of X in decimals is X =(x x 3 + x 2 + x 1 ) Tye-I Cycles: Digit-wise Reversal We consider first how to avoid short tye-i cycles. We start with a simle interleaver design digit-wise reversal. For an index X in --alternate-decimal form with h digits, its digit-wise reversal interchanges the i th digit and the (h + 1 i) th digit. We reresent the digit-wise reversal oerator by π d ( ). For the index X in euation (1), its digit-wise reversal is: (1) π d (X ) = x 1 x 2 x 3 x 4 = (x x 2 + x 3 + x 4 ) 10 We state the advantage of the digit-wise reversal interleaver in the following theorem and omit the roof. For a detailed roof, lease refer to [7]. Fig. 1. TS-LDPC code: Tanner grah, h =4, j =3, k =4. Theorem 1 Connecting the auxiliary nodes indexed by X in T U to the auxiliary nodes indexed by π d (X ) in T L guarantees the resulting tye-i cycles is at least of length 2h (h denotes the number of tiers in T U ). Following theorem 1, we can enlarge the length of tye-i cycles by simly increasing tiers of sub-trees Tye-II 4-Cycles Fig. 2. Auxiliary nodes in the uer tree T U For T U with h tiers, there are [(k 1)(j 1)] h/2 auxiliary nodes in T U. We address the interleaver design roblem algebraically by indexing all the auxiliary nodes of T U, from 0 to [(k 1)(j 1)] h/2 1 in a format we exlain next that we refer to as --alternate-decimal, where = k 1 and = j 1. We need h digits in the --alternatedecimal indexing and number these h digits from 1 to h, starting from the rightmost one. The odd digits take values 0 to 1 and the even digits take values 0 to 1. Similarly, we index all the auxiliary nodes of T L from 0 to [(k 1)(j 1)] h/2 1 and reresent all these indices in --alternate-decimal format. We rovide an examle. With reference to the index in Figure 2, its index X in Theorem 1 revents short tye-i cycles, however, it may lead to many short tye-ii cycles, even tye-ii 4-cycles. To avoid short tye-ii cycles, we roose a method called grouing and shifting. The shift S is defined to be a constant in --alternate-decimal format that is added to the original index π d (X ) to form a new index. For examle, let π d (X )=x 1 x 2 x 3 x 4,shiftS = s 1 s 2 s 3 s 4, and + reresent the digit-wise addition, then π d (X ) +S = y 1 y 2 y 3 y 4 (2) In euation (2), y i = x i +s i =mod(x i + s i, div i ). where div i = if i is even and div i = if i is odd. Similarly, we reresent the digit-wise subtraction by. Next, we divide all the auxiliary nodes of T U into k 1 grous, grouing together those nodes with the same leftmost digit in their --alternate-decimated indices. The auxiliary nodes of T L can, likewise, be classified into j 1 different grous based also on the values of the leftmost digits IEEE Communications Society 426

3 in their --alternate-decimated indices. We further let the shift to be the same when we connect the auxiliary nodes of T U in the same grou to the auxiliary nodes of T L in the same grou. Denote by S y,z the shift introduced when we connect the auxiliary nodes of T L in the y th grou to the auxiliary nodes of T U in the z th grou. For different y and z, the shifts S y,z may be the same or different from each other. In addition, since S y,z is not to affect the assigning of the grous, its leftmost and rightmost digits are always set to 0. The following theorem roved elsewhere relates tye-i cycles to shifts: Theorem 2 (TYPE-I 2h-CYCLES) Connecting the auxiliary node indexed by X in the z th grou in T U to the auxiliary node indexed by π d (X ) +S y,z (S y,z can be any ossible value) in the y th grou in T L guarantees that any tye-i cycle formed is at least of length 2h (h denotes the number of tiers in T U ). Hence, when following theorem 2, we have (j 1)(k 1) free arameters S y,z to adjust to revent short tye-ii cycles while in the mean time all short tye-i cycles are avoided. Theorem 3 rovides a sufficient condition on the shifts S y,z that can be used to revent tye-ii 4-cycles. Theorem 3 (NO TYPE-II 4-CYCLES) Consider the m th and the n th grous of nodes in the uer-tree T U and the i th and the j th grous in the lower-tree T L. If the associated shifts satisfy S i,m +S j,n S i,n +S j,m, then NO tye-ii 4- cycles are formed between these four grous. shifts MUST satisfy S i,m +S j,n = S i,n +S j,m. Figure 3.(a) shows a tye-ii 4-cycle containing four vertices A, B, C, and D. It can also be viewed as a cycle containing eight auxiliary nodes a 1, a 2, c 1, c 2, b 1, b 2, d 2, and d 1. With reference to the lot in Figure 3.(a), and assuming that the index for the auxiliary node a 1 is X a1, then according to the connecting rule resented in theorem 2, the index for the auxiliary node b 1 is X b1 = π d (X a1 ) +S i,m.letδ b denote the difference between X b1 and X b2, i.e., δ b = X b2 X b1. Since the auxiliary nodes b 1 and b 2 are connected to the same check node B, only the rightmost digit of the -alternate-decimal form of δ b is non-zero, all its other digits are zero. The index for the auxiliary node c 1 is X c1 = π d (X b2 S i,n ).Again,letδ c = X c2 X c1. Then the - alternate-decimal form of δ c has only one non-zero digit, its rightmost digit. The index for the auxiliary node d 1 is X d1 = π d (X c2 ) +S j,n. Let X d2 = X d1 + δ d ; the index for the auxiliary node a 2 in terms of X d2 is X a2 = π d (X d2 S j,m ). The relationshi between X a1 and X a2 is X a1 = X a2 +δ a. Iterating in the definition of X a2,wehave π d [π d (π d (π d (X a1 ) +S i,m +δ b S i,n ) +δ c ) +S j,n +δ d S j,m ]+δ a = X a1. (3) As π d (π d (X)) = X, this leads to π d (S i,m S i,n +S j,n S j,m ) +[π d (δ b +δ d ) +δ c +δ a ]=0 (4) In the --alternate-decimal form of a shift, the leftmost and the rightmost digits are always zero. On the other hand, excet for the leftmost and rightmost digits, all the digits in δ c, δ a, π d (δ b ), and π d (δ d ) are zero. Therefore, euation (4) can be slit into two sub-euations: Fig. 3. (a) Fig. 3. (b) π d (S i,m S i,n +S j,n S j,m ) = 0 (5) π d (δ b +δ d ) +δ c +δ a = 0. (6) It follows then from euation (5) S i,m +S j,n = S i,n +S j,m. (7) This comletes the roof Exclude Tye-II Cycles of Arbitrary Length Fig. 3. (c) Fig. 3. Fig. 3. (d) Proof : We rove theorem 3 by roving an euivalent roosition: If a tye-ii 4-cycle is formed, then the associated We observe that there are many different classes of tye-ii cycles. For examle, all tye-ii cycles of length six can be divided into three classes, as shown in Figure 3.(b), 3.(c), and 3.(d). For convenience, we divide all tye-ii cycles u to length 2L into L 1 euivalence sets based on the number of edges N I contained in the interleaver comonent. For examle, all tye-ii cycles of length six belong to two euivalence sets: Cycles shown in Figure 3.(b) and 3.(c), with four edges in the interleaver, are in the same euivalence set. Another euivalence set contains the cycles shown in IEEE Communications Society 427

4 Figure 3.(d) that have six edges in the interleaver. The following theorem eliminates the cycles in each euivalence set. Each cycle in the euivalence set with N I =2k is associated with 2k shifts S y1,z 1 S y2,z 2... S y2k,z 2k whose subindices satisfy the following two conditions: (i) y 2t 1 = y 2t, t = 1, 2, 3,...,k and z 2t = z 2t+1, t =1, 2, 3,...,k 1 (ii) y 2t y 2t+1, t =1, 2, 3,...,k 1 and z 2t 1 z 2t, t =1, 2, 3,...,k Define the shift matrix S =[S y,z ] to be a matrix that collects all the shifts. From the oint of view of grah theory, S y1,z 1, S y2,z 2,...,S y2k,z 2k are adjacent vertices of a closed ath in the S matrix. For examle, as shown in Figure 4, S 1,1, S 1,2, S 2,2, and S 2,1 are vertices of a closed ath of length four (dashed line) in S and S 2,5, S 2,6, S 4,6, S 4,4, S 3,4, and S 3,5 are vertices of a closed ath of length six (solid line) in S. Theorem 4 For the euivalence set with N I =2k,let S = k u=1 S y 2u,z k 2u v=1 S y 2v 1,z 2v 1. Each S having h digits is free of any cycle having less than N T =2ledges in the trees (both T U and T L ) if it contains at most d = h l 2 consecutive digits 0 in its --alternate-decimal exansion. The roof is rather lengthy. We rove it elsewhere. By choosing suitable shifts S y,z according to theorems 2-4, we can avoid all short tye-i and tye-ii cycles u to the desired length g 2. Fig. 5. Parity-check matrix of a (6666, 3, 6) TS-LDPC code with girth PERFORMANCE EVALUATION We comare by simulation the bit error rate (BER) of the TS-LDPC codes with the BER of randomly constructed LDPC codes that are free of 4-cycles [2] in additive white Gauss noise (AWGN) channels. The codes are decoded with the sum-roduct algorithm [9], and we adot the signal to noise ratio (SNR) defined in [2]: SNR = 10 log 10 [ Eb / ( 2rσ 2)] where r denotes the code rate. Bit Error Rate (BER) TS LDPC code with g=10 Random LDPC code(4 cycles free) Fig. 6. BER erformance comarison between a column weight j =3TS-LDPC code with girth 10 and a randomly constructed LDPC code of the same size free of 4-cycles. Fig. 4. Two closed aths in the shift matrix S As an illustration, we alied the above methods to construct a (6666, 3, 6) regular LDPC code, rate.5, with girth g =10. Its structure is given by the matrix H shown in Figure 5. We can clearly identify T U, T L, and the interleaver comonent I from the constructed matrix, as labelled in Figure 5. In this matrix, along the solid lines, there is a single 1 in each row, while along the dashed thicker diagonals there are five 1 s in each row, so that er row there are six 1 s. The lot in Figure 6 shows the BER erformance for a column weight j =3TS-LDPC code with girth 10 (solid line). For comarison, we also show the BER erformance of a randomly constructed LDPC code (no 4-cycles) with column weight j =3(dashed line). Both codes have the same block length 6666 and the same code rate 1/2. From Figure 6, it can be seen that the BER erformance of the TS-LDPC code is 0.12dB better than that of the random LDPC code at BER= 10 5 while at low SNR both codes have similar error-correcting erformance. According to [3], the (6666, 3, 6) TS-LDPC code has minimum distance d min 10. Since the lower bound of d min derived in [3] is not tight, the actual d min of the (6666, 3, 6) TS-LDPC code may be much larger than 10. In the high SNR region, d min is a dominant factor in determining the code BER erformance. This exlains why the TS-LDPC IEEE Communications Society 428

5 code with girth 10 has good BER erformance in the high SNR region. 5. FAST DECODING The TS-LDPC codes can be effectively decoded by what we refer to as the turbo like decoding algorithm (TLDA) [8]. The TLDA is as follows: Ste 1: Initialization. Ste 2: Decode T U, using the udated information rovided by I, and, after decoding, transmit the new robabilistic information to T L through I. Ste 3: Decode T L, using the udated information from I and then transmit the new robabilistic information back to T U through I. Ste 4: Comute the temorary decoding oututs. If decoding success is achieved, go to ste 5. Otherwise, go back to ste 2. Ste 5: End. The message udatings of the TLDA are the same as those for the sum-roduct decoding algorithm [1]. We comment briefly on the advantages of TLDA. It is well known, [9], that with a cycle-free Tanner grah, the sum-roduct algorithm terminates in a finite number of stes and yields minimum symbol error robability. Therefore, in isolation, the local decoding for each cycle-free comonent is otimal. The TLDA is still iterative: each comonent transmits its a osteriori robability (APP) information to the others through the interleaver and, in turn, these comonents use these APPs as a riori information to start their own decoding rocess. We resent a simulation study by Monte Carlo simulations comaring the erformance of the code using TLDA and the standard sum-roduct decoding. This is a (6666, 3, 6) TS-LDPC code with uniform column weight j =3and code rate 0.5. Figure 7.(a) shows the BER erformance of the code. The lots in Figure 7.(b) show that TLDA converges faster by about 50% (smaller number of iteration stes) than the sum-roduct decoding algorithm. 6. CONCLUSION In this aer, we roose a new class of well-structured LDPC codes TS-LDPC codes. We resented designs of flexible code rate with arbitray column weight and arbitrary girth. TS-LDPC codes can be decoded efficiently, characteristics that make them attractive in alications, e.g., communication systems and data storage systems. 7. REFERENCES [1] R. G. Gallager, Low-Density Parity Check Codes, MIT Press, Cambridge, MA, [2] D. J. C. Mackay, Good error-correcting codes based on very sarse matrices, IEEE Trans. on Information Theory, vol. 45, no. 2, March 1999, [3] R. Michael Tanner, A recursive aroach to low comlexity codes, IEEE Trans. on Information Theory, vol. IT-27, no. 5, Se. 1981, [4] R. Michael Tanner, Sectral grahs for uasi-cyclic LDPC codes, in Proceedings of International Symosium on Information Theory, Washington, DC, June [5] Li Ping and Keying Y. Wu, Concatenated tree codes: A low-comlexity, high-erformance aroac, in IEEE Trans. Inform. Theory, vol. 47, no.2, Feb. 2001, [6] Jos M. F. Moura, J. Lu, H. Zhang, Structured LDPC codes with large girth,, in IEEE singal rocessing magazine, vol. 21, no.1, Jan. 2004, [7] J. Lu and José M. F. Moura, Turbo design for LDPC codes with large girth, in IEEE Signal Processing and Wireless Communications (SPAWC) Worksho, Rome, Italy, June Bit Error Rate (BER) 10 1 Sum roduct decoding TLDA decoding Fig. 7. (a) The average number of iteration stes Sum roudct decoding TLDA decoding Fig. 7. (b) [8] Jin Lu and José M. F. Moura, Turbo Like Decoding of LDPC Codes, in IEEE INTERMAG 2003, Ar. 2003, Boston, MA. [9] F. R. Kschischang, B. J. Frey, H. A. Loeliger, Factor grahs and the sum-roduct algorithm, IEEE Transactions on Information Theory, vol. 47, no.2, , Feb Fig. 7. IEEE Communications Society 429

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can 208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer

More information

THE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH. Haotian Zhang and José M. F. Moura

THE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH. Haotian Zhang and José M. F. Moura THE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH Haotian Zhang and José M. F. Moura Department of Electrical and Computer Engineering Carnegie Mellon University, Pittsburgh, PA 523 {haotian,

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Performance Analysis of Gray Code based Structured Regular Column-Weight Two LDPC Codes

Performance Analysis of Gray Code based Structured Regular Column-Weight Two LDPC Codes IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 4, Ver. III (Jul.-Aug.2016), PP 06-10 www.iosrjournals.org Performance Analysis

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

split split (a) (b) split split (c) (d)

split split (a) (b) split split (c) (d) International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Construction of Irregular QC-LDPC Codes in Near-Earth Communications

Construction of Irregular QC-LDPC Codes in Near-Earth Communications Journal of Communications Vol. 9, No. 7, July 24 Construction of Irregular QC-LDPC Codes in Near-Earth Communications Hui Zhao, Xiaoxiao Bao, Liang Qin, Ruyan Wang, and Hong Zhang Chongqing University

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

Weighted Page Rank Algorithm based on In-Out Weight of Webpages

Weighted Page Rank Algorithm based on In-Out Weight of Webpages Indian Journal of Science and Technology, Vol 8(34), DOI: 10.17485/ijst/2015/v8i34/86120, December 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 eighted Page Rank Algorithm based on In-Out eight

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

arxiv: v1 [math.gt] 1 May 2018

arxiv: v1 [math.gt] 1 May 2018 CIRCUIT PRESENTATION AND LATTICE STICK NUMBER WITH EXACTLY 4 z-sticks HYOUNGJUN KIM AND SUNGJONG NO arxiv:805.0023v [math.gt] May 208 Abstract. The lattice stick number s L(L) of a link L is defined to

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

New Message-Passing Decoding Algorithm of LDPC Codes by Partitioning Check Nodes 1

New Message-Passing Decoding Algorithm of LDPC Codes by Partitioning Check Nodes 1 New Message-Passing Decoding Algorithm of LDPC Codes by Partitioning Check Nodes 1 Sunghwan Kim* O, Min-Ho Jang*, Jong-Seon No*, Song-Nam Hong, and Dong-Joon Shin *School of Electrical Engineering and

More information

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.) Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Capacity-approaching Codes for Solid State Storages

Capacity-approaching Codes for Solid State Storages Capacity-approaching Codes for Solid State Storages Jeongseok Ha, Department of Electrical Engineering Korea Advanced Institute of Science and Technology (KAIST) Contents Capacity-Approach Codes Turbo

More information

Convex Hulls. Helen Cameron. Helen Cameron Convex Hulls 1/101

Convex Hulls. Helen Cameron. Helen Cameron Convex Hulls 1/101 Convex Hulls Helen Cameron Helen Cameron Convex Hulls 1/101 What Is a Convex Hull? Starting Point: Points in 2D y x Helen Cameron Convex Hulls 3/101 Convex Hull: Informally Imagine that the x, y-lane is

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

Single character type identification

Single character type identification Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

TURBO codes, [1], [2], have attracted much interest due

TURBO codes, [1], [2], have attracted much interest due 800 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 2, FEBRUARY 2001 Zigzag Codes and Concatenated Zigzag Codes Li Ping, Member, IEEE, Xiaoling Huang, and Nam Phamdo, Senior Member, IEEE Abstract

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Bayesian Oil Spill Segmentation of SAR Images via Graph Cuts 1

Bayesian Oil Spill Segmentation of SAR Images via Graph Cuts 1 Bayesian Oil Sill Segmentation of SAR Images via Grah Cuts 1 Sónia Pelizzari and José M. Bioucas-Dias Instituto de Telecomunicações, I.S.T., TULisbon,Lisboa, Portugal sonia@lx.it.t, bioucas@lx.it.t Abstract.

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

Theoretical Analysis of Graphcut Textures

Theoretical Analysis of Graphcut Textures Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut

More information

CS649 Sensor Networks IP Track Lecture 6: Graphical Models

CS649 Sensor Networks IP Track Lecture 6: Graphical Models CS649 Sensor Networks IP Track Lecture 6: Grahical Models I-Jeng Wang htt://hinrg.cs.jhu.edu/wsn06/ Sring 2006 CS 649 1 Sring 2006 CS 649 2 Grahical Models Grahical Model: grahical reresentation of joint

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

Improving Trust Estimates in Planning Domains with Rare Failure Events

Improving Trust Estimates in Planning Domains with Rare Failure Events Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,

More information

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY Yandong Wang EagleView Technology Cor. 5 Methodist Hill Dr., Rochester, NY 1463, the United States yandong.wang@ictometry.com

More information

A Petri net-based Approach to QoS-aware Configuration for Web Services

A Petri net-based Approach to QoS-aware Configuration for Web Services A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration

More information

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO., APRIL 00 83 Brief Contributions A Geometric Theorem for Network Design Massimo Franceschetti, Member, IEEE, Matthew Cook, and Jehoshua Bruck, Fellow, IEEE

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

Skip List Based Authenticated Data Structure in DAS Paradigm

Skip List Based Authenticated Data Structure in DAS Paradigm 009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge

More information

Lowering the Error Floors of Irregular High-Rate LDPC Codes by Graph Conditioning

Lowering the Error Floors of Irregular High-Rate LDPC Codes by Graph Conditioning Lowering the Error Floors of Irregular High- LDPC Codes by Graph Conditioning Wen-Yen Weng, Aditya Ramamoorthy and Richard D. Wesel Electrical Engineering Department, UCLA, Los Angeles, CA, 90095-594.

More information

Chapter 7b - Point Estimation and Sampling Distributions

Chapter 7b - Point Estimation and Sampling Distributions Chater 7b - Point Estimation and Samling Distributions Chater 7 (b) Point Estimation and Samling Distributions Point estimation is a form of statistical inference. In oint estimation we use the data from

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

An FPGA Implementation of ( )-Regular Low-Density. Parity-Check Code Decoder

An FPGA Implementation of ( )-Regular Low-Density. Parity-Check Code Decoder An FPGA Imlementation of ( )-Regular Low-Density Parity-Check Code Decoder Tong Zhang ECSE Det., RPI Troy, NY tzhang@ecse.ri.edu Keshab K. Parhi ECE Det., Univ. of Minnesota Minneaolis, MN arhi@ece.umn.edu

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Constrained Empty-Rectangle Delaunay Graphs

Constrained Empty-Rectangle Delaunay Graphs CCCG 2015, Kingston, Ontario, August 10 12, 2015 Constrained Emty-Rectangle Delaunay Grahs Prosenjit Bose Jean-Lou De Carufel André van Renssen Abstract Given an arbitrary convex shae C, a set P of oints

More information

Applying the fuzzy preference relation to the software selection

Applying the fuzzy preference relation to the software selection Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN

More information

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

The Edge-flipping Distance of Triangulations

The Edge-flipping Distance of Triangulations The Edge-fliing Distance of Triangulations Sabine Hanke (Institut für Informatik, Universität Freiburg, Germany hanke@informatik.uni-freiburg.de) Thomas Ottmann (Institut für Informatik, Universität Freiburg,

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction A D Random Walk Mobility Model for Location Management Studies in Wireless Networks Kuo Hsing Chiang, RMIT University, Melbourne, Australia Nirmala Shenoy, Information Technology Deartment, RIT, Rochester,

More information

A Class of Group-Structured LDPC Codes

A Class of Group-Structured LDPC Codes A Class of Group-Structured LDPC Codes R. Michael Tanner Deepak Sridhara and Tom Fuja 1 Computer Science Department Dept. of Electrical Engineering University of California, Santa Cruz, CA 95064 Univ.

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

Computing the Convex Hull of. W. Hochstattler, S. Kromberg, C. Moll

Computing the Convex Hull of. W. Hochstattler, S. Kromberg, C. Moll Reort No. 94.60 A new Linear Time Algorithm for Comuting the Convex Hull of a Simle Polygon in the Plane by W. Hochstattler, S. Kromberg, C. Moll 994 W. Hochstattler, S. Kromberg, C. Moll Universitat zu

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

Chapter 7, Part B Sampling and Sampling Distributions

Chapter 7, Part B Sampling and Sampling Distributions Slides Preared by JOHN S. LOUCKS St. Edward s University Slide 1 Chater 7, Part B Samling and Samling Distributions Samling Distribution of Proerties of Point Estimators Other Samling Methods Slide 2 Samling

More information

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS Philie LACOMME, Christian PRINS, Wahiba RAMDANE-CHERIF Université de Technologie de Troyes, Laboratoire d Otimisation des Systèmes Industriels (LOSI)

More information

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University

More information

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks

More information

Depth Estimation for 2D to 3D Football Video Conversion

Depth Estimation for 2D to 3D Football Video Conversion International Research Journal of Alied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 6 (4): 475-480 Science Exlorer ublications Deth Estimation for 2D to 3D Football

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22 Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance

More information

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University. Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may

More information

REAL NUMBERS. 1.1 Introduction

REAL NUMBERS. 1.1 Introduction REAL NUMBERS 1 REAL NUMBERS 1 1.1 Introduction In Class IX, you began your exloration of the world of real numbers and encountered irrational numbers. We continue our discussion on real numbers in this

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

Continuous Visible k Nearest Neighbor Query on Moving Objects

Continuous Visible k Nearest Neighbor Query on Moving Objects Continuous Visible k Nearest Neighbor Query on Moving Objects Yaniu Wang a, Rui Zhang b, Chuanfei Xu a, Jianzhong Qi b, Yu Gu a, Ge Yu a, a Deartment of Comuter Software and Theory, Northeastern University,

More information

Collective communication: theory, practice, and experience

Collective communication: theory, practice, and experience CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective

More information

Lecture 8: Orthogonal Range Searching

Lecture 8: Orthogonal Range Searching CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is

More information

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1,

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1, CHAPTER 33 Comutational Geometry Is the branch of comuter science that studies algorithms for solving geometric roblems. Has alications in many fields, including comuter grahics robotics, VLSI design comuter

More information

Truth Trees. Truth Tree Fundamentals

Truth Trees. Truth Tree Fundamentals Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth

More information

Classes of K-Regular Semi ring

Classes of K-Regular Semi ring Secial Issue on Comutational Science, Mathematics and Biology Classes of K-Regular Semi ring M.Amala 1, T.Vasanthi 2 ABSTRACT: In this aer, it was roved that, If S is a K-regular semi ring and (S, +) is

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

search(i): Returns an element in the data structure associated with key i

search(i): Returns an element in the data structure associated with key i CS161 Lecture 7 inary Search Trees Scribes: Ilan Goodman, Vishnu Sundaresan (2015), Date: October 17, 2017 Virginia Williams (2016), and Wilbur Yang (2016), G. Valiant Adated From Virginia Williams lecture

More information

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model. U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture

More information

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique Parametric Otimization in WEDM of WC-Co Comosite by Neuro-Genetic Technique P. Saha*, P. Saha, and S. K. Pal Abstract The resent work does a multi-objective otimization in wire electro-discharge machining

More information

Value-Update Rules for Real-Time Search

Value-Update Rules for Real-Time Search From: AAAI-99 Proceedings. Coyright 999, AAAI (www.aaai.org). All rights reserved. Value-Udate Rules for Real-Time Search Sven Koenig College of Comuting Georgia Institute of Technology skoenig@cc.gatech.edu

More information

I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ).

I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ). 1 I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ). Data structures Sorting Binary heas are imlemented using a hea-ordered balanced binary tree. Binomial heas use a collection

More information

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie

More information

Synthesis of FSMs on the Basis of Reusable Hardware Templates

Synthesis of FSMs on the Basis of Reusable Hardware Templates Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Comutation, Elounda, Greece, August -3, 006 (09-4) Synthesis of FSMs on the Basis of Reusable Hardware Temlates VALERY SKLYAROV, IOULIIA

More information

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

Near-Optimal Routing Lookups with Bounded Worst Case Performance

Near-Optimal Routing Lookups with Bounded Worst Case Performance Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu

More information

Taut ideal triangulations of 3-manifolds

Taut ideal triangulations of 3-manifolds Abstract Taut ideal triangulations of 3-manifolds Marc Lackenby Mathematical Institute, Oxford University, 24-29 St Giles, Oxford OX1 3LB, UK Email: lackenby@maths.ox.ac.uk A taut ideal triangulation of

More information

An Algorithm for Counting Short Cycles in Bipartite Graphs

An Algorithm for Counting Short Cycles in Bipartite Graphs IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 287 An Algorithm for Counting Short Cycles in Bipartite Graphs Thomas R. Halford, Student Member, IEEE, and Keith M. Chugg, Member,

More information

STRONG / WEAK EDGE VERTEX MIXED DOMINATION NUMBER OF A GRAPH

STRONG / WEAK EDGE VERTEX MIXED DOMINATION NUMBER OF A GRAPH IJMS, Vol. 11, No. 3-4, (July-December 2012),. 433-444 Serials Publications ISSN: 0972-754X STRONG / WEAK EDGE VERTEX MIXED DOMINATION NUMBER OF A GRAPH R. S. Bhat, S. S. Kamath & Surekha R. Bhat Abstract:

More information

SIMULATION SYSTEM MODELING FOR MASS CUSTOMIZATION MANUFACTURING

SIMULATION SYSTEM MODELING FOR MASS CUSTOMIZATION MANUFACTURING Proceedings of the 2002 Winter Simulation Conference E. Yücesan, C.-H. Chen, J. L. Snowdon, and J. M. Charnes, eds.. SIMULATION SYSTEM MODELING FOR MASS CUSTOMIATION MANUFACTURING Guixiu Qiao Charles McLean

More information

Improved Gaussian Mixture Probability Hypothesis Density for Tracking Closely Spaced Targets

Improved Gaussian Mixture Probability Hypothesis Density for Tracking Closely Spaced Targets INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 7, VOL., NO., PP. 7-5 Manuscrit received October 7, 5; revised June, 7. DOI:.55/eletel-7- Imroved Gaussian Mixture Probability Hyothesis Density for

More information

Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR

Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Megha Agarwal, 2R.P. Maheshwari Indian Institute of Technology Roorkee 247667, Uttarakhand, India meghagarwal29@gmail.com, 2rmaheshwari@gmail.com

More information

Selecting Discriminative Binary Patterns for a Local Feature

Selecting Discriminative Binary Patterns for a Local Feature BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 3 Sofia 015 rint ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-015-0044 Selecting Discriminative Binary atterns

More information

Swift Template Matching Based on Equivalent Histogram

Swift Template Matching Based on Equivalent Histogram Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:

More information

FPGA Implementation of Binary Quasi Cyclic LDPC Code with Rate 2/5

FPGA Implementation of Binary Quasi Cyclic LDPC Code with Rate 2/5 FPGA Implementation of Binary Quasi Cyclic LDPC Code with Rate 2/5 Arulmozhi M. 1, Nandini G. Iyer 2, Anitha M. 3 Assistant Professor, Department of EEE, Rajalakshmi Engineering College, Chennai, India

More information

Bounds on the Number of Iterations for Turbo-Like Ensembles over the Binary Erasure Channel

Bounds on the Number of Iterations for Turbo-Like Ensembles over the Binary Erasure Channel ACCEPTED TO THE IEEE TRANSACTIONS ON INFORMATION THEORY, REVISED FEBRUARY 29. Bounds on the Numer of Iterations for Turo-Like Ensemles over the Binary Erasure Channel Igal Sason, Memer, IEEE and Gil Wiechman,

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

Image Segmentation Using Topological Persistence

Image Segmentation Using Topological Persistence Image Segmentation Using Toological Persistence David Letscher and Jason Fritts Saint Louis University Deartment of Mathematics and Comuter Science {letscher, jfritts}@slu.edu Abstract. This aer resents

More information

Semi-Markov Process based Model for Performance Analysis of Wireless LANs

Semi-Markov Process based Model for Performance Analysis of Wireless LANs Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita

More information