Fully Parallel Window Decoder Architecture for Spatially-Coupled LDPC Codes
|
|
- Beverly Carson
- 5 years ago
- Views:
Transcription
1 Fully Parallel Widow Decoder Architecture for Spatially-Coupled LDPC Codes Najeeb Ul Hassa, Marti Schlüter, ad Gerhard P. Fettweis Vodafoe Chair Mobile Commuicatios Systems, Dresde Uiversity of Techology (TU Dresde), Dresde, Germay, ajeeb Abstract Spatially-coupled low-desity parity-check (SC- LDPC) codes have bee show to be superior i performace tha LDPC block codes. I order to comply with the practical costraits o latecy, SC-LDPC codes are decoded usig a slidig widow decoder that reduces the latecy ad complexity of decodig compared to traditioal block-wise decodig. However, so far the literature oly cosiders the structural decodig latecy of widow decoder, igorig the processig latecy. Note that the processig latecy directly impacts the decoder s throughput ad is a importat parameter i ay moder commuicatio system. The throughput of a iterative decoder is directly iflueced by the umber of iteratios ad hece i this paper we propose a fully parallel widow decoder architecture for SC-LDPC codes where the decodig iteratios are performed i parallel. This guaratees a high throughout while fulfillig the low latecy requiremets. The overall decodig latecy (structural ad processig latecy) of widow decoder architectures is also compared. I. INTRODUCTION Gallager itroduced a class of liear codes which are described by a sparse parity-check matrix [1] referred as low-desity parity-check (LDPC) codes. Sice these codes are costructed from sparse matrices, these ca be decoded usig a simple ad practical iterative decoder. Hece as a result, i geeral, the decodig complexity per decoded bit is idepedet of the legth of the code whe the umber of decodig iteratios is fixed. Thaks to this property of LDPC codes, various stadards that deals with high data rate, e.g., DVB, WiMAX, WiGig, propose LDPC codes which allow them to operate close to the Shao limit usig log block legths. Spatially-coupled LDPC (SC-LDPC) codes were first iveted by Jimeez Felström ad Zigagirov i [2]. Sice these are characterized by a semi-ifiite diagoal type paritycheck matrix, these were referred to as LDPC covolutioal codes. Like LDPC block codes they are defied by a sparse parity-check matrix, which allows to decode them with belief propagatio algorithms. The differece betwee SC-LDPC ad LDPC block codes is the memory. For LDPC block codes, codewords of differet time istats are ecoded ad decoded idepedetly of each other. A codeword (v [1,L] ) of a termiated SC-LDPC code cosists of L coupled code blocks v t, t = 1,..., L. The origial block-wise decodig approach waits util all L blocks are received ad the performs belief This work was i part supported by the DFG i the CRC 912 HAEC. The authors are grateful for the use of the high performace computig facilities of the ZIH at TU Dresde. propagatio. I [2] ad [3] a pipelied block-wise decoder is cosidered. For a large L, SC-LDPC codes are kow to achieve superior bit error rate (BER) performace compared to LDPC block codes. However, the drawback of havig a large L is the icrease i latecy ad decodig complexity [4] [5]. Hece, the pipelie decoders preseted i [2] [3] have large iitial delay, e.g., equal to the legth of the coupled code L. Aother approach is a slidig widow decoder of size W. The widow decoder operates o W L code blocks, ad the resultig decodig latecy ad decodig complexity becomes idepedet of L. The slidig widow decoder is detailed i Sectio III. It has bee show i [4] ad [6] that biary ad o-biary SC-LDPC codes decoded with the widow decoder outperform their couterpart LDPC block codes uder same latecy, respectively. However, the compariso was solely based o the structural latecy of the codes. The structural latecy of the code depeds o the structure of code ad reflects the fact that the mappig operatio at decoder ca be doe oce a certai umber of symbols (or bits) are available at the iput [7]. Hece decoder processig latecy for LDPC block codes ad SC-LDPC codes decoded usig widow decoder was assumed to be equal. This assumptio was based o the followig argumet; sice the umber of symbols ad the iterative message passig algorithm i two decoders is same, the processig latecy of the LDPC block decoder ad widow decoder is equal. Note that this argumet iheretly assume that the implemetatio of LDPC block decoder ad widow decoder ca be doe i same way. I a iterative decoder, processig latecy depeds o the umber of iteratios. I case of block codes, i.e, whe blocks are ecoded ad decoded idepedetly, the processig latecy ca be reduced by parallelizig the iteratios or also kow as iteratio urollig. I [8], a ultra high speed LDPC decoder architecture has bee preseted achievig a throughput up to 160 Gbit/s based o this priciple. Note that the pipelie decoder for SC-LDPC decoder proposed i [3], reduces to the oe proposed i [8] whe applied to block codes. However, due to the memory read access required i the widow decoder, these architectures are ot suitable ad up to ow, o such architecture has bee proposed for the slidig widow decoder. We propose a way to adapt the high throughput architecture from [8] ad desig a slidig widow decoder i Sectio IV that performs all iteratios i parallel ad approaches the performace of the classical widow decoder. We show the challeges i urollig the
2 iteratios of the widow decoder. The BER results are show i Sectio V. II. SPATIALLY-COUPLED LDPC CODES I order to describe spatial couplig, let us cosider a trasmissio of a sequece of LDPC code blocks v t, t = 1,..., L of legth c bits, i.e., code block v t = [v t (1),..., v t (c)] geerated from a ucoded iformatio block u t = [u t (1),..., u t (b)]. A essetial feature of SC- LDPC code is that the blocks at differet time istats are itercoected. Istead of ecodig all codewords idepedetly, the blocks v t are coupled by the ecoder to other time istats. The largest distace betwee a pair of coupled blocks defies the memory m cc of the coupled code. Cosiderig a SC-LDPC code C, the parity-check matrix of a termiated code is give as H [1,L] = H 0 (1).. H mcc (1)... H 0 (L).... H mcc (L) where the elemets of matrix H [1,L] are the sub-matrices of dimesio (c b) c defied as h (1,1) i (t) h (1,c) i (t) H i (t) =... (2) h (c b,1) i (t) h (c b,c) i (t) The correspodig sequece of coupled code blocks forms a codeword v [1,L] = [v 1,..., v t,..., v L ] of a termiated spatially-coupled code. We assume H i (t) = H i (t ) i = 0,..., m cc, t = t = 1,..., L, i.e., a time-ivariat code. I [9] ad [10], authors provide a way to geerate codes that provide a easy/fast ecodig. A alterate represetatio of a SC-LDPC code is by usig a bipartite graph or Taer graph. A Taer graph for a SC- LDPC code cosists of M = (L+m cc )(c b) check odes ad N = Lc variable odes. The check odes correspod to the set of parity-check costraits ad the variable odes correspod to the code bits. Referrig to the parity-check matrix i (1), check odes ad variable odes represet the rows ad colums of (1), respectively. Each 1 i H [1,L] represets a edge coectig the correspodig variable ad check ode i the Taer graph. III. DECODING OF SC-LDPC CODES We cosider a additive white Gaussia oise (AWGN) chael with received symbols havig the followig form, (1) y(i) = x(i) + (i), i = 1,..., N (3) where x(i) are BPSK symbols, obtaied from iput symbols v(i) as x(i) = 2v(i) 1 {+1, 1} ad (i) are idepedet ad idetically distributed Gaussia radom variables with zero mea ad variace σ 2 = N 0 /2, ad N 0 is the sigle sided power spectral desity of the oise. yt mcc m cc yt 1 yt W yt+w 1 y t+w L out(y [t mcc,t 1]) L out(y t) L ch (y [t,t+w 1] ) û t BP Decoder Variable Nodes VN2CN CN2VN Check Nodes Fig. 1. Widow Decoder of size W decodig the symbols i y t. A. Block-wise Decodig Oe of the beefits of havig low desity of oes i the parity-check matrix is that LDPC codes ca be decoded usig a iterative message passig decoder. The decodig complexity icreases with the desity of oes i H, hece a low desity is desirable. I case of AWGN chael, messages i the form of log-likelihood ratios (LLR) are exchaged betwee the coected check ad variable odes i every iteratio. Sice the absolute value of a LLR represets the stregth (belief) of the message, this message passig algorithm is kow as belief propagatio (BP). The decodig for a SC-LDPC code ca be performed by ruig BP algorithm over the complete chai of L coupled blocks v [1,L]. Sice the coupled code is treated i this case as a block code, we refer to such a decoder as a block-wise decoder. However, ruig BP algorithm over the complete chai of L coupled blocks v [1,L] is ot optimum i terms of decodig latecy ad complexity. Aother way of decodig the coupled code is by usig a slidig widow decoder [11]. It has bee show i [4] that SC-LDPC codes decoded usig a widow decoder outperforms LDPC block codes uder equal latecy. B. Widowed Decodig The covolutioal structure of coupled codes allows to defie a latecy costraied widow decoder of size W. Cosider the blocks v t ad v t i the chai of coupled code, where t t + m cc + 1 ad t, t [1 L]. Sice t t + m cc + 1, v t ad v t do ot share ay parity-check equatio (check ode). Widow decoder exploits this property of the covolutioal parity-check matrix of SC-LDPC code to defie a decoder cosistig of W received blocks such that W m cc + 1. I order to decode symbols i y t, the widow cosists of W received blocks, y [t,t+w 1] ad m cc previously decoded blocks i memory of decoder. This is show i Fig. 1 as a shift register of size W code blocks for widow that holds the chael values of y [t,t+w 1]. Similarly a shift register of size m cc code blocks holds the output LLRs correspodig to the decoded code blocks y [t mcc,t 1] i the memory.
3 I terms of parity-check matrix, the slidig widow decoder of size W operates o a sectio of W (c b) rows ad W c colums of the matrix H [1,L], correspodig to W coupled blocks. Hece, widow decoder cosists M W = W (c b) check ad N W = W c variable odes. The BP decoder cosists of M W check ad N W variable odes. The VN2CN ad CN2VN modules defie the coectios from N W variable to M W check odes ad vice versa, respectively. Remark 1: Note that it is because of the time-ivariace of the SC-LDPC code that the VN2CN ad CN2VN stays fixed for the decodig of complete coupled codeword v [1,L]. Hece for implemetatio cosideratios of the widow decoder, a time-ivariat code is suitable. The calculatio of LLR values i variable ad check odes ad the decodig algorithm is detailed below. C. Decodig Algorithm Let v k, k = 1,..., N W ad c j, j = 1,..., M W deote the N W variable ad M W check odes withi a widow. The L ch (v k ) deote the iput chael LLR for variable ode v k ad N (v k ) deotes the set of check odes coected to the variable ode v k. Similarly N (c j ) represets the set of variable odes coected to the check ode c j. The message from the variable ode v k to the check ode c j i th iteratio is deoted as L () v k,c j. 1) Iitializatio: I the iitializatio phase, all variable odes v k seds L ch (v k ) to all its coected check odes, L (0) v k,c j = L ch (v k ). (4) 2) Iterative Process: I the succeedig iteratios, the extrisic LLRs from the variable ode v k to the check ode c j are calculated as follows, L () v k,c j = L ch (v k ) + l N (v k )\c j L ( 1) c l,v k. (5) Here L () c l,v k deotes the message from the check ode c l to the variable ode v k. Ad N (v k )\c j represets the set of check odes coectig to v k excludig c j. The exclusio of c j here precludes the iformatio received by v k from c j to be reused to calculate the message L vk,c j. Similarly the extrisic LLRs from the check ode c j to the variable ode v k are calculated as follows, L () c j,v k = 2 tah 1 l N (c j)\v k tah ( ) L ( 1) v l,c j. (6) 2 Similar to (5), the calculatio of L () c j,v k excludes the variable ode v k. The widow at time t, as show i Fig. 1, decodes the symbols i the received block y t oly, ad hece they are termed target symbols. The miimum size of the widow decoder must be at least m cc + 1 code blocks, such that the parity check equatios icludig the target symbols are i the widow. The BP algorithm is applied to the odes withi the widow oly, however, due to the memory of the coupled code, a read access to the m cc previously decoded blocks is also required. 3) After I max Iteratios: The iterative process cotiues util the maximum umber of iteratios I max is reached. The output LLR L out (v k ) for variable ode v k is the computed as L out (v k ) = L ch (v k ) + l N (v k ) L (Imax) c l,v k. (7) The output LLRs correspodig to the target symbols (L out (y t )) are the fed back to the memory shift register, as show i the Fig. 1. Oce the target symbols are decoded, c ew chael values correspodig to y t+w, eter the widow decoder from right ad the estimates of the iformatio bits û t leaves the decoder from left. The decodig process cotiues util all the code blocks are decoded. Remark 2: It is importat to ote here that the architecture i Fig. 1 allows to keep the output messages of all the variable odes i y [t+1,t+w 1] i the registers to be used for the decodig of succeedig code blocks. This implies that the messages alog the edges calculated for decodig the symbols i y t are kept for the decodig of succeedig code blocks. The widow decoder provides a way to icrease the termiatio legth L arbitrarily large ad is suitable for cotiuous decodig of iput blocks. Furthermore, sice message passig algorithm is applied oly to W received blocks, the memory ad hardware requiremets for such a decoder are far less compared to block-wise decodig of SC-LDPC codes. I geeral, the storage requiremets for the decoder reduces by a factor of L/W compared to the block-wise decoder. IV. FULLY PARALLEL WINDOW DECODER I the decoder architecture preseted i Fig. 1, a ew code block eters from right oly after I max iteratios are performed. Assumig that T p secods are required to perform a sigle decodig iteratio (updatig all N W variable ad M W check odes i a widow). The the decoder geerates a output every T p I max secods. Note that the update of all N W variable ad M W check odes are doe i parallel. I terms of processig latecy, the critical path 1 of the decoder depeds o the umber of iteratios I max. Oe way to reduce the decodig processig latecy or cosequetly icreasig the decodig throughput is to parallelize these I max iteratios. This will reduce the critical path to 1 iteratio. Cosiderig block codes, i.e., each code block is ecoded ad decoded idepedetly, these I max iteratios ca be urolled (pipelied) to obtai a fully parallel decoder. Hece a code block eters ad leaves the BP decoder every T p secods 2. This icreases the decoder throughput by a factor of I max. Such a decoder architecture to decode LDPC block codes was proposed i [8]. The architecture, however, requires that all the code blocks are ecoded ad decoded idepedetly ad does ot require a read access to the memory. I the followig we propose a urolled fully parallel widow decoder architecture. 1 Critical path is the path i the etire desig with the maximum delay. 2 Note that, the iitial processig latecy to decode the first block is still T pi max secods. However, after this iitial latecy, decoded blocks leaves the decoder every T p secods.
4 Shift Reg. SI/PO I 1 Chael value,[1,...,m cc] I i VN2CN = I out 1 Memory I 2 Check Nodes CN2VN Stage I I max Variable Nodes chael values Decoded bits I out = I i +1 Fig. 2. Urolled architecture for widow decoder. Fig. 3. Detail descriptio of a pipelie stage. A. Urollig the Iteratios of Widow Decoder Now cosiderig the widow decoder preseted i Sectio III, we aim at proposig a urolled architecture for the widow decoder i order to parallelize the decodig iteratios. As a result, the decoder geerates a output every T p secods. A obvious hurdle i directly applyig the architecture from [8] is the memory of the SC-LDPC code. As described i Sectio III, widow decoder eeds the read access to the m cc already decoded code blocks ad decodig of symbols i y t+1 starts oly after fiishig I max iteratios for the decodig of symbols i y t. This meas that the urolled widow decoder ca oly utilize the ufiished (itermediate) output LLRs of the target symbols from the previous widows. Figure 2 shows a top level view of the urolled widow decoder architecture with I max pipelie stages. A detailed view of each stage is show i Fig. 3. We ote the similarities with the pipelie SC-LDPC decoder i [3], however, the major differece lies i the fact that we start with a widow decodig schedule. Whereas, the architecture i [3] rus the BP algorithm over the etire coupled codeword, resultig i a very large iitial latecy. 3 The chael values i Fig. 2 are stored i a serial-iput/parallel-output shift register. O receivig a ew code block, the iput register shifts oe to left, takes i c ew values correspodig to oe code block. Similar to Fig. 1, each stage cosists of N W variable odes, M W check odes, VN2CN ad CN2VN etworks. The iputs to each stage are the results from the previous stage I i = I 1, out ad the chael values of W received code blocks. The chael values has to be available for all iteratios ad thus are stored i the pipelie registers (). The output I out cotai the results of th iteratio for all the W code blocks i the widow. Memory Maagemet: I additio to this, the followig iput ad output operatios to the memory are also required at each stage; memory,,[1,...,m cc] : read LLRs of m cc code blocks from the 3 Here iitial latecy meas the latecy to decode symbols i y 1. I target : write the values of target symbols i the memory. Let us explai the memory read ad write operatio by usig a example. Cosider a SC-LDPC code with m cc = 2 decoded usig I max = 5 iteratios. The horizotal wires at the bottom ad upper part of Fig. 4 show the memory write ad read operatio for every pipelie stage, respectively. At time t, a th pipelie stage reads two memory iputs (m cc = 2), oe from itself but writte at time t T p ad oe from the (+1) th pipelie stage also writte at time t T p. This is because, the two precedig code blocks have bee target blocks T p secods before i th pipelie stage ad i ( + 1) th pipelie stage. As a example, for the first pipelie stage the two reads are, 1,[1] = 1 delay = T p 1,[2] = 2 delay = T p The memory read ad write operatio here for the last pipelie stage is differet. Sice, the last iteratio has o ext pipelie stage, which meas all m cc = 2 precedig code blocks are decoded. Hece, m cc memory reads, 5,[1] = 5 delay = T p 5,[2] = 5 delay = 2T p I geeral, whe m cc > 2, earlier pipelie stages also require the target values of already decoded code blocks. The memory read ad write operatio is accomplished by storig the target values from each pipelie stage ito its pipelie registers. I geeral for ay m cc ad I max, each stage requires to read m cc memories. At time t, the k th iput from memory for stage, I,[k] mem, is give as, { I target I,[k] mem = +k 1 (t T p), + k 1 < I max I max (t ( + k I max )T p ), + k 1 I max (8) where k = 1,..., m cc ad = 1,..., I max. Remark 3: It is importat to ote here that for the urolled widow decoder, every T p secods the N W variable odes i the first pipelie stage sed the chael values (see (4)) to all coected check odes. This is differet to the architecture
5 I 1 (t) : I 2 (t) : I 3 (t) : I 1 (t + T p ) : I 2 (t + T p ) : I 3 (t + T p ) : Fig. 5. Sapshot of the code blocks beig processed i I max = 3 pipelie stages at clock cycle t ad t + 1. The code blocks i gree ad red represet the memory ad target blocks at each stage, respectively. Memory for stage I I 5 I 4 I 3 I 2 I 1 delay=2t p 1,[1,2] 2,[1,2] 3,[1,2] 4,[1,2] 5,[1,2] Fig. 4. Memory read ad write operatio for the urolled widow decoder, m cc = 2 ad I max = 5. from Fig. 1, where the messages are kept alog the edges emaatig from variable odes i registers ad the iitializatio step is ot doe for all N W variable odes rather oly for the ew c variable odes eterig i the shift register. Remark 4: Also ote that i the urolled widow decoder, time-ivariace ature of code is a ecessity. Sice a pipelie stage performs the th iteratio o a widow, CN2VN ad VN2CN etworks must be same i all I max pipelie stages. Hece for a high throughout, low latecy widow decoder implemetatio, a time-ivariat SC-LDPC code must be desiged. B. Circular Pipelie Widow Decoder As explaied i Remark 3, the ewly computed results are ot cosumed i the followig widows whe the iteratios are urolled. To explai this further, let us take a example of a widow decoder of size W = 6 performig I max = 3 iteratios o a SC-LDPC code with m cc = 2. The Fig. 5 shows a sapshot of the code blocks beig processed withi all pipelie stages at time t ad t+t p. I the first pipelie stage I 1, symbols i y t ad y t+1 are the target symbols at time t ad t + T p, respectively. The symbols i y t are also the target symbols i the secod pipelie stage at time t + T p, which takes all the computed messages for the odes withi the widow at the begiig of time t+t p from the first stage, i.e., I2 i = I1 out. Now at time t, I max iteratios are processed o the code blocks y [t 2,t+3]. The output LLRs correspodig to y t 2 are stored i the memory ad the results computed for code blocks y [t 1,t+3] are discarded. However, i this example the results for code blocks y [t+1,t+3] ca be fed back to the first pipelie stage, makig it a circular pipelie widow decoder. As a result, the variable odes i code blocks y [t+1,t+3] i the first pipelie stage at time t + T p are ot iitialized with the chael values. Ad oly the variable odes i code blocks y [t+4,t+6] are iitialized with the chael values. C. Overall Latecy Compariso Fially, let us compare the overall latecy of the widow decoder architectures preseted i this paper. Let us deote T r as the time to receive oe code block y t of c bits ad T p deotes the time to perform oe decodig iteratio. i.e., updatig N W variable ad M W check odes. Assumig the trasmissio starts at t = 0, the first code block is received at the iput of the decoder at time t = T r. Now for the classical widow decoder i Fig. 1, the overall decodig latecy for the first code block iitial WD is give as, iitial WD = (W 1)T r + I max T p, (9) where (W 1)T r is the structural latecy ad I max T p is the processig latecy. For a received block y l, l = 2,..., L, the decodig starts after l 1 blocks are processed. Hece the overall decodig latecy is a fuctio of block umber l ad
6 is give as, WD (l) = (W l)t r + (l + 1) (I max T p ). (10) Now cosiderig the widow decoder architecture i Fig. 2, the iitial latecy is the same as i (9), iitial Pipe. WD = (W 1)T r + I max T p. (11) Cosiderig T p T r, the overall latecy for a received block y l, l = 2,..., L, is fixed ad is give as, Pipe. WD (l) = T p, (12) which is cosiderably less as compared to (10) ad also, importatly, idepedet of W. I the ext sectio, we demostrate usig simulatio the beefit i terms of BER whe feedig these computed results from the last stage to the first stage. V. SIMULATION RESULTS I this sectio, we compare the BER curves for the widow decoder from Sectio III ad the two pipelie widow decoder architectures preseted i Sectio IV. The time-ivariat SC- LDPC code has bee geerated followig the method from [10]. Note that i this work, we focus o the decoder architecture ad do ot aim to optimize the SC-LDPC code. A rate 1/2 SC-LDPC code with memory m cc = 23 is decoded with a widow size of W = 35. The widow decoder has N W = 840 variable ad M W = 420 check odes. The decoder performs I max = 10 iteratios. Figure 6 shows the BER curves for the three widow decoder architectures. It is evidet here that feedig back the calculated results from last pipelie stage to the first pipelie stage helps reduce the gap betwee the pipelie widow decoder ad classical widow decoder. The gap is reduced to 0.1 db at high SNR s but for low SNR values, there is o sigificat improvemet i performace for circular pipelie widow decoder compared to the pipelie widow decoder. This is because at low SNR, the code blocks further away from the target block show very little improvemet i terms of LLR values with iteratios. This has bee previously observed i [5]. Hece the last stage is ot able to provide much ew iformatio to the first stage at low SNR. VI. CONCLUSION We propose a fully parallel widow decoder architecture for widow decoder by pipeliig (urollig) the iteratios. Due to the memory read access required i the widow decoder, the already proposed fully parallel architectures are ot applicable. Compared to the classical widow decoder, egligible loss i performace was observed which is due to utilizig the ufiished (itermediate) values i the memory. The coectios betwee the pipelie stages (iput-output ad memory maagemet) are also detailed. To the best of authors kowledge, o such architecture for widow decoder has bee proposed i the literature. We further compare the overall decodig latecy of the widow decoder. With this architecture ow the assumptio regardig the decodig processig latecy, Bit Error Rate WD Pipe.-WD Circ-Pipe.-WD E b /N 0 [db] Fig. 6. BER compariso betwee the classical widow decoder (WD), pipelie widow decoder (Pipe.-WD) ad the circular pipelie widow decoder (Circ-Pipe.-WD). For all three decoders, I max = 10 iteratios are performed. detailed i Sectio I, is valid. Sice, for both block decoder ad widow decoder, iteratios ca be urolled to icrease the decodig throughput by a factor of I max. The results are also verified usig Verilog simulatio, with FPGA implemetatio left as a future work. REFERENCES [1] R. G. Gallager, Low desity parity check codes, Ph.D. dissertatio, Massachussetts Istitute of Techology (MIT), [2] A. Jimeez Felstrom ad K. Zigagirov, Time-varyig periodic covolutioal codes with low-desity parity-check matrix, IEEE Tras. If. Theory, vol. 45, o. 6, pp , Sep [3] A. Pusae, A. Feltstrom, A. Sridhara, M. Letmaier, K. Zigagirov, ad D. Costello, Implemetatio aspects of LDPC covolutioal codes, IEEE Tras. Commu., vol. 56, o. 7, pp , Jul [4] N. Ul Hassa, M. Letmaier, ad G. Fettweis, Compariso of LDPC block ad LDPC covolutioal codes based o their decodig latecy, i Proc. It. Symp. o Turbo Codes & Iterative If. Proc., Aug. 2012, pp [5] M. Letmaier, M. Preda, ad G. Fettweis, Efficiet message passig schedulig for termiated LDPC covolutioal codes, i Proc. IEEE It. Symp. Iform. Theory (ISIT), Aug. 2011, pp [6] K. Huag, D. G. M. Mitchell, L. Wei, M. Xiao, ad D. J. Costello Jr, Performace compariso of o-biary LDPC block ad spatially coupled codes, i Proc. IEEE It. Symp. Iform. Theory (ISIT), Ju. 2014, pp [7] T. Heh ad J. Huber, LDPC codes ad covolutioal codes with equal structural delay: A compariso, IEEE Tras. Commu., vol. 57, o. 6, pp , Ju [8] P. Schlafer, N. Weh, M. Alles, ad T. Lehigk-Emde, A ew dimesio of parallelism i ultra high throughput LDPC decodig, i IEEE Workshop o Sigal Processig Systems (SiPS), Oct 2013, pp [9] A. Pusae, K. Zigagirov, ad J. Costello, D.J., Costructio of irregular LDPC covolutioal codes with fast ecodig, i Proc. IEEE It. Cof. Commu. (ICC), vol. 3, Jue 2006, pp [10] I. Bocharova, B. Kudryashov, ad R. Johaesso, LDPC covolutioal codes versus QC LDPC block codes i commuicatio stadard scearios, i Proc. IEEE It. Symp. Iform. Theory (ISIT), Jue 2014, pp [11] M. Papaleo, A. Iyegar, P. Siegel, J. Wolf, ad G. Corazza, Widowed erasure decodig of LDPC covolutioal codes, i Proc. IEEE Iform. Theory Workshop (ITW), Ja. 2010, pp. 1 5.
Lecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationJoint Message-Passing Symbol-Decoding of LDPC Coded Signals over Partial-Response Channels
Joit Message-Passig Symbol-Decodig of LDPC Coded Sigals over Partial-Respose Chaels Rathakumar Radhakrisha ad ae Vasić Departmet of Electrical ad Computer Egieerig Uiversity of Arizoa, Tucso, AZ-8572 Email:
More informationImprovement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More informationElementary Educational Computer
Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified
More informationDESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO
DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO Sagwo Seo, Trevor Mudge Advaced Computer Architecture Laboratory Uiversity of Michiga at A Arbor {swseo, tm}@umich.edu Yumig Zhu, Chaitali
More informationBASED ON ITERATIVE ERROR-CORRECTION
A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms
More informationOnes Assignment Method for Solving Traveling Salesman Problem
Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More informationk (check node degree) and j (variable node degree)
A Parallel Turbo Decodig Message Passig Architecture for Array LDPC Codes Kira Guam, Pakaj Bhagawat, Weihuag Wag, Gwa Choi, Mark Yeary * Dept. of Electrical Egieerig, Texas A&M Uiversity, College Statio,
More informationA New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method
A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro
More informationPattern Recognition Systems Lab 1 Least Mean Squares
Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig
More informationChapter 3 Classification of FFT Processor Algorithms
Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As
More informationThroughput-Delay Scaling in Wireless Networks with Constant-Size Packets
Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,
More informationLecture 2: Spectra of Graphs
Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad
More information1. SWITCHING FUNDAMENTALS
. SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig
More informationNeural Networks A Model of Boolean Functions
Neural Networks A Model of Boolea Fuctios Berd Steibach, Roma Kohut Freiberg Uiversity of Miig ad Techology Istitute of Computer Sciece D-09596 Freiberg, Germay e-mails: steib@iformatik.tu-freiberg.de
More informationEE123 Digital Signal Processing
Last Time EE Digital Sigal Processig Lecture 7 Block Covolutio, Overlap ad Add, FFT Discrete Fourier Trasform Properties of the Liear covolutio through circular Today Liear covolutio with Overlap ad add
More informationA REDUCED-COMPLEXITY LDPC DECODING ALGORITHM WITH CHEBYSHEV POLYNOMIAL FITTING
Joural of Theoretical ad Applied Iformatio Techology st March. Vol. 49 No. 5 - JATIT & LLS. All rights reserved. ISSN: 99-8645 www.jatit.org E-ISSN: 87-95 A REDUCED-COMPLEXITY LDPC DECODING ALGORITHM WITH
More informationAppendix D. Controller Implementation
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);
More informationFundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le
Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical
More informationReliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1
Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable
More informationRandom Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach
Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de
More informationAlpha Individual Solutions MAΘ National Convention 2013
Alpha Idividual Solutios MAΘ Natioal Covetio 0 Aswers:. D. A. C 4. D 5. C 6. B 7. A 8. C 9. D 0. B. B. A. D 4. C 5. A 6. C 7. B 8. A 9. A 0. C. E. B. D 4. C 5. A 6. D 7. B 8. C 9. D 0. B TB. 570 TB. 5
More informationImproving Template Based Spike Detection
Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for
More informationExamples and Applications of Binary Search
Toy Gog ITEE Uiersity of Queeslad I the secod lecture last week we studied the biary search algorithm that soles the problem of determiig if a particular alue appears i a sorted list of iteger or ot. We
More informationLecture 1: Introduction and Strassen s Algorithm
5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access
More informationBig-O Analysis. Asymptotics
Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses
More informationCOMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad
More informationParallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware
Parallel Polygo Approximatio Algorithm Targeted at Recofigurable Multi-Rig Hardware M. Arif Wai* ad Hamid R. Arabia** *Califoria State Uiversity Bakersfield, Califoria, USA **Uiversity of Georgia, Georgia,
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13
CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis
More informationSorting in Linear Time. Data Structures and Algorithms Andrei Bulatov
Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio
More informationThe Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana
The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:
More informationChapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.
Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationImage Segmentation EEE 508
Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5
Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:
More informationLower Bounds for Sorting
Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig
More informationGPUMP: a Multiple-Precision Integer Library for GPUs
GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract
More informationHomework 1 Solutions MA 522 Fall 2017
Homework 1 Solutios MA 5 Fall 017 1. Cosider the searchig problem: Iput A sequece of umbers A = [a 1,..., a ] ad a value v. Output A idex i such that v = A[i] or the special value NIL if v does ot appear
More informationConsider the following population data for the state of California. Year Population
Assigmets for Bradie Fall 2016 for Chapter 5 Assigmet sheet for Sectios 5.1, 5.3, 5.5, 5.6, 5.7, 5.8 Read Pages 341-349 Exercises for Sectio 5.1 Lagrage Iterpolatio #1, #4, #7, #13, #14 For #1 use MATLAB
More informationAPPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS
APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful
More informationImproving Information Retrieval System Security via an Optimal Maximal Coding Scheme
Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk
More informationBayesian approach to reliability modelling for a probability of failure on demand parameter
Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee
More informationMATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting)
MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fittig) I this chapter, we will eamie some methods of aalysis ad data processig; data obtaied as a result of a give
More informationA General Framework for Accurate Statistical Timing Analysis Considering Correlations
A Geeral Framework for Accurate Statistical Timig Aalysis Cosiderig Correlatios 7.4 Vishal Khadelwal Departmet of ECE Uiversity of Marylad-College Park vishalk@glue.umd.edu Akur Srivastava Departmet of
More informationEvaluation scheme for Tracking in AMI
A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:
More informationSpeeding-up dynamic programming in sequence alignment
Departmet of Computer Sciece Aarhus Uiversity Demark Speedig-up dyamic programmig i sequece aligmet Master s Thesis Dug My Hoa - 443 December, Supervisor: Christia Nørgaard Storm Pederse Implemetatio code
More informationThe isoperimetric problem on the hypercube
The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose
More informationThe Magma Database file formats
The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,
More informationAn Efficient Algorithm for Graph Bisection of Triangularizations
A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu
More informationToward Realtime Side Information Decoding On Multi-Core Processors
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Toward Realtime Side Iformatio Decodig O Multi-Core Processors Svetislav Momcilovic, Yige Wag, Shatau Rae, Athoy Vetro TR21-1 December 21 Abstract
More informationEE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 )
EE26: Digital Desig, Sprig 28 3/6/8 EE 26: Itroductio to Digital Desig Combiatioal Datapath Yao Zheg Departmet of Electrical Egieerig Uiversity of Hawaiʻi at Māoa Combiatioal Logic Blocks Multiplexer Ecoders/Decoders
More informationBOOLEAN MATHEMATICS: GENERAL THEORY
CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to
More informationRecursive Procedures. How can you model the relationship between consecutive terms of a sequence?
6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.
More informationProtected points in ordered trees
Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic
More informationANN WHICH COVERS MLP AND RBF
ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi
More informationNumerical Methods Lecture 6 - Curve Fitting Techniques
Numerical Methods Lecture 6 - Curve Fittig Techiques Topics motivatio iterpolatio liear regressio higher order polyomial form expoetial form Curve fittig - motivatio For root fidig, we used a give fuctio
More informationFast Fourier Transform (FFT) Algorithms
Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform
More informationPerhaps the method will give that for every e > U f() > p - 3/+e There is o o-trivial upper boud for f() ad ot eve f() < Z - e. seems to be kow, where
ON MAXIMUM CHORDAL SUBGRAPH * Paul Erdos Mathematical Istitute of the Hugaria Academy of Scieces ad Reu Laskar Clemso Uiversity 1. Let G() deote a udirected graph, with vertices ad V(G) deote the vertex
More informationIMP: Superposer Integrated Morphometrics Package Superposition Tool
IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College
More informationXiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation
Flexible Colorig Xiaozhou (Steve) Li, Atri Rudra, Ram Swamiatha HP Laboratories HPL-2010-177 Keyword(s): graph colorig; hardess of approximatio Abstract: Motivated b y reliability cosideratios i data deduplicatio
More informationBezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only
Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of
More information3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationThe Counterchanged Crossed Cube Interconnection Network and Its Topology Properties
WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology
More informationOne advantage that SONAR has over any other music-sequencing product I ve worked
*gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig
More informationCS 683: Advanced Design and Analysis of Algorithms
CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,
More informationTask scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation
6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08
More informationAn Efficient Algorithm for Graph Bisection of Triangularizations
Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe
More informationLecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions
U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets
More informationHeaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015
Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 201 Heaps 201 Goodrich ad Tamassia xkcd. http://xkcd.com/83/. Tree. Used with permissio uder
More informationPerformance Plus Software Parameter Definitions
Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios
More informationOn Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract
O Ifiite Groups that are Isomorphic to its Proper Ifiite Subgroup Jaymar Talledo Baliho Abstract Two groups are isomorphic if there exists a isomorphism betwee them Lagrage Theorem states that the order
More informationcondition w i B i S maximum u i
ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility
More informationperformance to the performance they can experience when they use the services from a xed location.
I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi
More informationThe Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems
The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,
More informationAutomatic Generation of Polynomial-Basis Multipliers in GF (2 n ) using Recursive VHDL
Automatic Geeratio of Polyomial-Basis Multipliers i GF (2 ) usig Recursive VHDL J. Nelso, G. Lai, A. Teca Abstract Multiplicatio i GF (2 ) is very commoly used i the fields of cryptography ad error correctig
More informationAdaptive Resource Allocation for Electric Environmental Pollution through the Control Network
Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the
More information1 Graph Sparsfication
CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider
More informationOn Nonblocking Folded-Clos Networks in Computer Communication Environments
O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred
More informationConstruction of Regular and Irregular QC-LDPC Codes: a Finite Field Approach and Masking
06 Iteratioal Symposium o Advaces i Electrical, Electroics ad Computer Egieerig (ISAEECE 06 Costructio of egular ad Irregular QC-LDPC Codes: a Fiite Field Approach ad Maskig Xiaopeg Che,a, Li Zhou,,, ui
More informationBOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM
MATEC Web of Cofereces 79, 01014 (016) DOI: 10.1051/ mateccof/0167901014 T 016 BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM Staislav Shidlovskiy 1, 1 Natioal Research
More informationForce Network Analysis using Complementary Energy
orce Network Aalysis usig Complemetary Eergy Adrew BORGART Assistat Professor Delft Uiversity of Techology Delft, The Netherlads A.Borgart@tudelft.l Yaick LIEM Studet Delft Uiversity of Techology Delft,
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies
More informationGraphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU)
Graphs Miimum Spaig Trees Slides by Rose Hoberma (CMU) Problem: Layig Telephoe Wire Cetral office 2 Wirig: Naïve Approach Cetral office Expesive! 3 Wirig: Better Approach Cetral office Miimize the total
More informationEnd Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization
Ed Semester Examiatio 2013-14 CSE, III Yr. (I Sem), 30002: Computer Orgaizatio Istructios: GROUP -A 1. Write the questio paper group (A, B, C, D), o frot page top of aswer book, as per what is metioed
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:
More informationAN OPTIMIZATION NETWORK FOR MATRIX INVERSION
397 AN OPTIMIZATION NETWORK FOR MATRIX INVERSION Ju-Seog Jag, S~ Youg Lee, ad Sag-Yug Shi Korea Advaced Istitute of Sciece ad Techology, P.O. Box 150, Cheogryag, Seoul, Korea ABSTRACT Iverse matrix calculatio
More informationOctahedral Graph Scaling
Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of
More informationK-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns
K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge
More informationOn (K t e)-saturated Graphs
Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph
More informationLinear Time-Invariant Systems
9/9/00 LIEAR TIE-IVARIAT SYSTES Uit, d Part Liear Time-Ivariat Sstems A importat class of discrete-time sstem cosists of those that are Liear Priciple of superpositio Time-ivariat dela of the iput sequece
More informationCombination Labelings Of Graphs
Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is
More informationLecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming
Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis
More informationNTH, GEOMETRIC, AND TELESCOPING TEST
NTH, GEOMETRIC, AND TELESCOPING TEST Sectio 9. Calculus BC AP/Dual, Revised 08 viet.dag@humbleisd.et /4/08 0:0 PM 9.: th, Geometric, ad Telescopig Test SUMMARY OF TESTS FOR SERIES Lookig at the first few
More informationMAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS
Fura Uiversity Electroic Joural of Udergraduate Matheatics Volue 00, 1996 6-16 MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS DAVID SITTON Abstract. How ay edges ca there be i a axiu atchig i a coplete
More informationComputing a k-sparse n-length Discrete Fourier Transform using at most 4k samples and O(k log k) complexity
2013 IEEE Iteratioal Symposium o Iformatio Theory Computig a k-sparse -legth Discrete Fourier Trasform usig at most 4k samples ad O(k log k) complexity Sameer Pawar ad Kaa Ramchadra Dept of Electrical
More informationAPPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview
APPLICATION NOTE Automated Gai Flatteig Scope ad Overview A flat optical power spectrum is essetial for optical telecommuicatio sigals. This stems from a eed to balace the chael powers across large distaces.
More informationSecurity of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More information