Fully Parallel Window Decoder Architecture for Spatially-Coupled LDPC Codes

Size: px
Start display at page:

Download "Fully Parallel Window Decoder Architecture for Spatially-Coupled LDPC Codes"

Transcription

1 Fully Parallel Widow Decoder Architecture for Spatially-Coupled LDPC Codes Najeeb Ul Hassa, Marti Schlüter, ad Gerhard P. Fettweis Vodafoe Chair Mobile Commuicatios Systems, Dresde Uiversity of Techology (TU Dresde), Dresde, Germay, ajeeb Abstract Spatially-coupled low-desity parity-check (SC- LDPC) codes have bee show to be superior i performace tha LDPC block codes. I order to comply with the practical costraits o latecy, SC-LDPC codes are decoded usig a slidig widow decoder that reduces the latecy ad complexity of decodig compared to traditioal block-wise decodig. However, so far the literature oly cosiders the structural decodig latecy of widow decoder, igorig the processig latecy. Note that the processig latecy directly impacts the decoder s throughput ad is a importat parameter i ay moder commuicatio system. The throughput of a iterative decoder is directly iflueced by the umber of iteratios ad hece i this paper we propose a fully parallel widow decoder architecture for SC-LDPC codes where the decodig iteratios are performed i parallel. This guaratees a high throughout while fulfillig the low latecy requiremets. The overall decodig latecy (structural ad processig latecy) of widow decoder architectures is also compared. I. INTRODUCTION Gallager itroduced a class of liear codes which are described by a sparse parity-check matrix [1] referred as low-desity parity-check (LDPC) codes. Sice these codes are costructed from sparse matrices, these ca be decoded usig a simple ad practical iterative decoder. Hece as a result, i geeral, the decodig complexity per decoded bit is idepedet of the legth of the code whe the umber of decodig iteratios is fixed. Thaks to this property of LDPC codes, various stadards that deals with high data rate, e.g., DVB, WiMAX, WiGig, propose LDPC codes which allow them to operate close to the Shao limit usig log block legths. Spatially-coupled LDPC (SC-LDPC) codes were first iveted by Jimeez Felström ad Zigagirov i [2]. Sice these are characterized by a semi-ifiite diagoal type paritycheck matrix, these were referred to as LDPC covolutioal codes. Like LDPC block codes they are defied by a sparse parity-check matrix, which allows to decode them with belief propagatio algorithms. The differece betwee SC-LDPC ad LDPC block codes is the memory. For LDPC block codes, codewords of differet time istats are ecoded ad decoded idepedetly of each other. A codeword (v [1,L] ) of a termiated SC-LDPC code cosists of L coupled code blocks v t, t = 1,..., L. The origial block-wise decodig approach waits util all L blocks are received ad the performs belief This work was i part supported by the DFG i the CRC 912 HAEC. The authors are grateful for the use of the high performace computig facilities of the ZIH at TU Dresde. propagatio. I [2] ad [3] a pipelied block-wise decoder is cosidered. For a large L, SC-LDPC codes are kow to achieve superior bit error rate (BER) performace compared to LDPC block codes. However, the drawback of havig a large L is the icrease i latecy ad decodig complexity [4] [5]. Hece, the pipelie decoders preseted i [2] [3] have large iitial delay, e.g., equal to the legth of the coupled code L. Aother approach is a slidig widow decoder of size W. The widow decoder operates o W L code blocks, ad the resultig decodig latecy ad decodig complexity becomes idepedet of L. The slidig widow decoder is detailed i Sectio III. It has bee show i [4] ad [6] that biary ad o-biary SC-LDPC codes decoded with the widow decoder outperform their couterpart LDPC block codes uder same latecy, respectively. However, the compariso was solely based o the structural latecy of the codes. The structural latecy of the code depeds o the structure of code ad reflects the fact that the mappig operatio at decoder ca be doe oce a certai umber of symbols (or bits) are available at the iput [7]. Hece decoder processig latecy for LDPC block codes ad SC-LDPC codes decoded usig widow decoder was assumed to be equal. This assumptio was based o the followig argumet; sice the umber of symbols ad the iterative message passig algorithm i two decoders is same, the processig latecy of the LDPC block decoder ad widow decoder is equal. Note that this argumet iheretly assume that the implemetatio of LDPC block decoder ad widow decoder ca be doe i same way. I a iterative decoder, processig latecy depeds o the umber of iteratios. I case of block codes, i.e, whe blocks are ecoded ad decoded idepedetly, the processig latecy ca be reduced by parallelizig the iteratios or also kow as iteratio urollig. I [8], a ultra high speed LDPC decoder architecture has bee preseted achievig a throughput up to 160 Gbit/s based o this priciple. Note that the pipelie decoder for SC-LDPC decoder proposed i [3], reduces to the oe proposed i [8] whe applied to block codes. However, due to the memory read access required i the widow decoder, these architectures are ot suitable ad up to ow, o such architecture has bee proposed for the slidig widow decoder. We propose a way to adapt the high throughput architecture from [8] ad desig a slidig widow decoder i Sectio IV that performs all iteratios i parallel ad approaches the performace of the classical widow decoder. We show the challeges i urollig the

2 iteratios of the widow decoder. The BER results are show i Sectio V. II. SPATIALLY-COUPLED LDPC CODES I order to describe spatial couplig, let us cosider a trasmissio of a sequece of LDPC code blocks v t, t = 1,..., L of legth c bits, i.e., code block v t = [v t (1),..., v t (c)] geerated from a ucoded iformatio block u t = [u t (1),..., u t (b)]. A essetial feature of SC- LDPC code is that the blocks at differet time istats are itercoected. Istead of ecodig all codewords idepedetly, the blocks v t are coupled by the ecoder to other time istats. The largest distace betwee a pair of coupled blocks defies the memory m cc of the coupled code. Cosiderig a SC-LDPC code C, the parity-check matrix of a termiated code is give as H [1,L] = H 0 (1).. H mcc (1)... H 0 (L).... H mcc (L) where the elemets of matrix H [1,L] are the sub-matrices of dimesio (c b) c defied as h (1,1) i (t) h (1,c) i (t) H i (t) =... (2) h (c b,1) i (t) h (c b,c) i (t) The correspodig sequece of coupled code blocks forms a codeword v [1,L] = [v 1,..., v t,..., v L ] of a termiated spatially-coupled code. We assume H i (t) = H i (t ) i = 0,..., m cc, t = t = 1,..., L, i.e., a time-ivariat code. I [9] ad [10], authors provide a way to geerate codes that provide a easy/fast ecodig. A alterate represetatio of a SC-LDPC code is by usig a bipartite graph or Taer graph. A Taer graph for a SC- LDPC code cosists of M = (L+m cc )(c b) check odes ad N = Lc variable odes. The check odes correspod to the set of parity-check costraits ad the variable odes correspod to the code bits. Referrig to the parity-check matrix i (1), check odes ad variable odes represet the rows ad colums of (1), respectively. Each 1 i H [1,L] represets a edge coectig the correspodig variable ad check ode i the Taer graph. III. DECODING OF SC-LDPC CODES We cosider a additive white Gaussia oise (AWGN) chael with received symbols havig the followig form, (1) y(i) = x(i) + (i), i = 1,..., N (3) where x(i) are BPSK symbols, obtaied from iput symbols v(i) as x(i) = 2v(i) 1 {+1, 1} ad (i) are idepedet ad idetically distributed Gaussia radom variables with zero mea ad variace σ 2 = N 0 /2, ad N 0 is the sigle sided power spectral desity of the oise. yt mcc m cc yt 1 yt W yt+w 1 y t+w L out(y [t mcc,t 1]) L out(y t) L ch (y [t,t+w 1] ) û t BP Decoder Variable Nodes VN2CN CN2VN Check Nodes Fig. 1. Widow Decoder of size W decodig the symbols i y t. A. Block-wise Decodig Oe of the beefits of havig low desity of oes i the parity-check matrix is that LDPC codes ca be decoded usig a iterative message passig decoder. The decodig complexity icreases with the desity of oes i H, hece a low desity is desirable. I case of AWGN chael, messages i the form of log-likelihood ratios (LLR) are exchaged betwee the coected check ad variable odes i every iteratio. Sice the absolute value of a LLR represets the stregth (belief) of the message, this message passig algorithm is kow as belief propagatio (BP). The decodig for a SC-LDPC code ca be performed by ruig BP algorithm over the complete chai of L coupled blocks v [1,L]. Sice the coupled code is treated i this case as a block code, we refer to such a decoder as a block-wise decoder. However, ruig BP algorithm over the complete chai of L coupled blocks v [1,L] is ot optimum i terms of decodig latecy ad complexity. Aother way of decodig the coupled code is by usig a slidig widow decoder [11]. It has bee show i [4] that SC-LDPC codes decoded usig a widow decoder outperforms LDPC block codes uder equal latecy. B. Widowed Decodig The covolutioal structure of coupled codes allows to defie a latecy costraied widow decoder of size W. Cosider the blocks v t ad v t i the chai of coupled code, where t t + m cc + 1 ad t, t [1 L]. Sice t t + m cc + 1, v t ad v t do ot share ay parity-check equatio (check ode). Widow decoder exploits this property of the covolutioal parity-check matrix of SC-LDPC code to defie a decoder cosistig of W received blocks such that W m cc + 1. I order to decode symbols i y t, the widow cosists of W received blocks, y [t,t+w 1] ad m cc previously decoded blocks i memory of decoder. This is show i Fig. 1 as a shift register of size W code blocks for widow that holds the chael values of y [t,t+w 1]. Similarly a shift register of size m cc code blocks holds the output LLRs correspodig to the decoded code blocks y [t mcc,t 1] i the memory.

3 I terms of parity-check matrix, the slidig widow decoder of size W operates o a sectio of W (c b) rows ad W c colums of the matrix H [1,L], correspodig to W coupled blocks. Hece, widow decoder cosists M W = W (c b) check ad N W = W c variable odes. The BP decoder cosists of M W check ad N W variable odes. The VN2CN ad CN2VN modules defie the coectios from N W variable to M W check odes ad vice versa, respectively. Remark 1: Note that it is because of the time-ivariace of the SC-LDPC code that the VN2CN ad CN2VN stays fixed for the decodig of complete coupled codeword v [1,L]. Hece for implemetatio cosideratios of the widow decoder, a time-ivariat code is suitable. The calculatio of LLR values i variable ad check odes ad the decodig algorithm is detailed below. C. Decodig Algorithm Let v k, k = 1,..., N W ad c j, j = 1,..., M W deote the N W variable ad M W check odes withi a widow. The L ch (v k ) deote the iput chael LLR for variable ode v k ad N (v k ) deotes the set of check odes coected to the variable ode v k. Similarly N (c j ) represets the set of variable odes coected to the check ode c j. The message from the variable ode v k to the check ode c j i th iteratio is deoted as L () v k,c j. 1) Iitializatio: I the iitializatio phase, all variable odes v k seds L ch (v k ) to all its coected check odes, L (0) v k,c j = L ch (v k ). (4) 2) Iterative Process: I the succeedig iteratios, the extrisic LLRs from the variable ode v k to the check ode c j are calculated as follows, L () v k,c j = L ch (v k ) + l N (v k )\c j L ( 1) c l,v k. (5) Here L () c l,v k deotes the message from the check ode c l to the variable ode v k. Ad N (v k )\c j represets the set of check odes coectig to v k excludig c j. The exclusio of c j here precludes the iformatio received by v k from c j to be reused to calculate the message L vk,c j. Similarly the extrisic LLRs from the check ode c j to the variable ode v k are calculated as follows, L () c j,v k = 2 tah 1 l N (c j)\v k tah ( ) L ( 1) v l,c j. (6) 2 Similar to (5), the calculatio of L () c j,v k excludes the variable ode v k. The widow at time t, as show i Fig. 1, decodes the symbols i the received block y t oly, ad hece they are termed target symbols. The miimum size of the widow decoder must be at least m cc + 1 code blocks, such that the parity check equatios icludig the target symbols are i the widow. The BP algorithm is applied to the odes withi the widow oly, however, due to the memory of the coupled code, a read access to the m cc previously decoded blocks is also required. 3) After I max Iteratios: The iterative process cotiues util the maximum umber of iteratios I max is reached. The output LLR L out (v k ) for variable ode v k is the computed as L out (v k ) = L ch (v k ) + l N (v k ) L (Imax) c l,v k. (7) The output LLRs correspodig to the target symbols (L out (y t )) are the fed back to the memory shift register, as show i the Fig. 1. Oce the target symbols are decoded, c ew chael values correspodig to y t+w, eter the widow decoder from right ad the estimates of the iformatio bits û t leaves the decoder from left. The decodig process cotiues util all the code blocks are decoded. Remark 2: It is importat to ote here that the architecture i Fig. 1 allows to keep the output messages of all the variable odes i y [t+1,t+w 1] i the registers to be used for the decodig of succeedig code blocks. This implies that the messages alog the edges calculated for decodig the symbols i y t are kept for the decodig of succeedig code blocks. The widow decoder provides a way to icrease the termiatio legth L arbitrarily large ad is suitable for cotiuous decodig of iput blocks. Furthermore, sice message passig algorithm is applied oly to W received blocks, the memory ad hardware requiremets for such a decoder are far less compared to block-wise decodig of SC-LDPC codes. I geeral, the storage requiremets for the decoder reduces by a factor of L/W compared to the block-wise decoder. IV. FULLY PARALLEL WINDOW DECODER I the decoder architecture preseted i Fig. 1, a ew code block eters from right oly after I max iteratios are performed. Assumig that T p secods are required to perform a sigle decodig iteratio (updatig all N W variable ad M W check odes i a widow). The the decoder geerates a output every T p I max secods. Note that the update of all N W variable ad M W check odes are doe i parallel. I terms of processig latecy, the critical path 1 of the decoder depeds o the umber of iteratios I max. Oe way to reduce the decodig processig latecy or cosequetly icreasig the decodig throughput is to parallelize these I max iteratios. This will reduce the critical path to 1 iteratio. Cosiderig block codes, i.e., each code block is ecoded ad decoded idepedetly, these I max iteratios ca be urolled (pipelied) to obtai a fully parallel decoder. Hece a code block eters ad leaves the BP decoder every T p secods 2. This icreases the decoder throughput by a factor of I max. Such a decoder architecture to decode LDPC block codes was proposed i [8]. The architecture, however, requires that all the code blocks are ecoded ad decoded idepedetly ad does ot require a read access to the memory. I the followig we propose a urolled fully parallel widow decoder architecture. 1 Critical path is the path i the etire desig with the maximum delay. 2 Note that, the iitial processig latecy to decode the first block is still T pi max secods. However, after this iitial latecy, decoded blocks leaves the decoder every T p secods.

4 Shift Reg. SI/PO I 1 Chael value,[1,...,m cc] I i VN2CN = I out 1 Memory I 2 Check Nodes CN2VN Stage I I max Variable Nodes chael values Decoded bits I out = I i +1 Fig. 2. Urolled architecture for widow decoder. Fig. 3. Detail descriptio of a pipelie stage. A. Urollig the Iteratios of Widow Decoder Now cosiderig the widow decoder preseted i Sectio III, we aim at proposig a urolled architecture for the widow decoder i order to parallelize the decodig iteratios. As a result, the decoder geerates a output every T p secods. A obvious hurdle i directly applyig the architecture from [8] is the memory of the SC-LDPC code. As described i Sectio III, widow decoder eeds the read access to the m cc already decoded code blocks ad decodig of symbols i y t+1 starts oly after fiishig I max iteratios for the decodig of symbols i y t. This meas that the urolled widow decoder ca oly utilize the ufiished (itermediate) output LLRs of the target symbols from the previous widows. Figure 2 shows a top level view of the urolled widow decoder architecture with I max pipelie stages. A detailed view of each stage is show i Fig. 3. We ote the similarities with the pipelie SC-LDPC decoder i [3], however, the major differece lies i the fact that we start with a widow decodig schedule. Whereas, the architecture i [3] rus the BP algorithm over the etire coupled codeword, resultig i a very large iitial latecy. 3 The chael values i Fig. 2 are stored i a serial-iput/parallel-output shift register. O receivig a ew code block, the iput register shifts oe to left, takes i c ew values correspodig to oe code block. Similar to Fig. 1, each stage cosists of N W variable odes, M W check odes, VN2CN ad CN2VN etworks. The iputs to each stage are the results from the previous stage I i = I 1, out ad the chael values of W received code blocks. The chael values has to be available for all iteratios ad thus are stored i the pipelie registers (). The output I out cotai the results of th iteratio for all the W code blocks i the widow. Memory Maagemet: I additio to this, the followig iput ad output operatios to the memory are also required at each stage; memory,,[1,...,m cc] : read LLRs of m cc code blocks from the 3 Here iitial latecy meas the latecy to decode symbols i y 1. I target : write the values of target symbols i the memory. Let us explai the memory read ad write operatio by usig a example. Cosider a SC-LDPC code with m cc = 2 decoded usig I max = 5 iteratios. The horizotal wires at the bottom ad upper part of Fig. 4 show the memory write ad read operatio for every pipelie stage, respectively. At time t, a th pipelie stage reads two memory iputs (m cc = 2), oe from itself but writte at time t T p ad oe from the (+1) th pipelie stage also writte at time t T p. This is because, the two precedig code blocks have bee target blocks T p secods before i th pipelie stage ad i ( + 1) th pipelie stage. As a example, for the first pipelie stage the two reads are, 1,[1] = 1 delay = T p 1,[2] = 2 delay = T p The memory read ad write operatio here for the last pipelie stage is differet. Sice, the last iteratio has o ext pipelie stage, which meas all m cc = 2 precedig code blocks are decoded. Hece, m cc memory reads, 5,[1] = 5 delay = T p 5,[2] = 5 delay = 2T p I geeral, whe m cc > 2, earlier pipelie stages also require the target values of already decoded code blocks. The memory read ad write operatio is accomplished by storig the target values from each pipelie stage ito its pipelie registers. I geeral for ay m cc ad I max, each stage requires to read m cc memories. At time t, the k th iput from memory for stage, I,[k] mem, is give as, { I target I,[k] mem = +k 1 (t T p), + k 1 < I max I max (t ( + k I max )T p ), + k 1 I max (8) where k = 1,..., m cc ad = 1,..., I max. Remark 3: It is importat to ote here that for the urolled widow decoder, every T p secods the N W variable odes i the first pipelie stage sed the chael values (see (4)) to all coected check odes. This is differet to the architecture

5 I 1 (t) : I 2 (t) : I 3 (t) : I 1 (t + T p ) : I 2 (t + T p ) : I 3 (t + T p ) : Fig. 5. Sapshot of the code blocks beig processed i I max = 3 pipelie stages at clock cycle t ad t + 1. The code blocks i gree ad red represet the memory ad target blocks at each stage, respectively. Memory for stage I I 5 I 4 I 3 I 2 I 1 delay=2t p 1,[1,2] 2,[1,2] 3,[1,2] 4,[1,2] 5,[1,2] Fig. 4. Memory read ad write operatio for the urolled widow decoder, m cc = 2 ad I max = 5. from Fig. 1, where the messages are kept alog the edges emaatig from variable odes i registers ad the iitializatio step is ot doe for all N W variable odes rather oly for the ew c variable odes eterig i the shift register. Remark 4: Also ote that i the urolled widow decoder, time-ivariace ature of code is a ecessity. Sice a pipelie stage performs the th iteratio o a widow, CN2VN ad VN2CN etworks must be same i all I max pipelie stages. Hece for a high throughout, low latecy widow decoder implemetatio, a time-ivariat SC-LDPC code must be desiged. B. Circular Pipelie Widow Decoder As explaied i Remark 3, the ewly computed results are ot cosumed i the followig widows whe the iteratios are urolled. To explai this further, let us take a example of a widow decoder of size W = 6 performig I max = 3 iteratios o a SC-LDPC code with m cc = 2. The Fig. 5 shows a sapshot of the code blocks beig processed withi all pipelie stages at time t ad t+t p. I the first pipelie stage I 1, symbols i y t ad y t+1 are the target symbols at time t ad t + T p, respectively. The symbols i y t are also the target symbols i the secod pipelie stage at time t + T p, which takes all the computed messages for the odes withi the widow at the begiig of time t+t p from the first stage, i.e., I2 i = I1 out. Now at time t, I max iteratios are processed o the code blocks y [t 2,t+3]. The output LLRs correspodig to y t 2 are stored i the memory ad the results computed for code blocks y [t 1,t+3] are discarded. However, i this example the results for code blocks y [t+1,t+3] ca be fed back to the first pipelie stage, makig it a circular pipelie widow decoder. As a result, the variable odes i code blocks y [t+1,t+3] i the first pipelie stage at time t + T p are ot iitialized with the chael values. Ad oly the variable odes i code blocks y [t+4,t+6] are iitialized with the chael values. C. Overall Latecy Compariso Fially, let us compare the overall latecy of the widow decoder architectures preseted i this paper. Let us deote T r as the time to receive oe code block y t of c bits ad T p deotes the time to perform oe decodig iteratio. i.e., updatig N W variable ad M W check odes. Assumig the trasmissio starts at t = 0, the first code block is received at the iput of the decoder at time t = T r. Now for the classical widow decoder i Fig. 1, the overall decodig latecy for the first code block iitial WD is give as, iitial WD = (W 1)T r + I max T p, (9) where (W 1)T r is the structural latecy ad I max T p is the processig latecy. For a received block y l, l = 2,..., L, the decodig starts after l 1 blocks are processed. Hece the overall decodig latecy is a fuctio of block umber l ad

6 is give as, WD (l) = (W l)t r + (l + 1) (I max T p ). (10) Now cosiderig the widow decoder architecture i Fig. 2, the iitial latecy is the same as i (9), iitial Pipe. WD = (W 1)T r + I max T p. (11) Cosiderig T p T r, the overall latecy for a received block y l, l = 2,..., L, is fixed ad is give as, Pipe. WD (l) = T p, (12) which is cosiderably less as compared to (10) ad also, importatly, idepedet of W. I the ext sectio, we demostrate usig simulatio the beefit i terms of BER whe feedig these computed results from the last stage to the first stage. V. SIMULATION RESULTS I this sectio, we compare the BER curves for the widow decoder from Sectio III ad the two pipelie widow decoder architectures preseted i Sectio IV. The time-ivariat SC- LDPC code has bee geerated followig the method from [10]. Note that i this work, we focus o the decoder architecture ad do ot aim to optimize the SC-LDPC code. A rate 1/2 SC-LDPC code with memory m cc = 23 is decoded with a widow size of W = 35. The widow decoder has N W = 840 variable ad M W = 420 check odes. The decoder performs I max = 10 iteratios. Figure 6 shows the BER curves for the three widow decoder architectures. It is evidet here that feedig back the calculated results from last pipelie stage to the first pipelie stage helps reduce the gap betwee the pipelie widow decoder ad classical widow decoder. The gap is reduced to 0.1 db at high SNR s but for low SNR values, there is o sigificat improvemet i performace for circular pipelie widow decoder compared to the pipelie widow decoder. This is because at low SNR, the code blocks further away from the target block show very little improvemet i terms of LLR values with iteratios. This has bee previously observed i [5]. Hece the last stage is ot able to provide much ew iformatio to the first stage at low SNR. VI. CONCLUSION We propose a fully parallel widow decoder architecture for widow decoder by pipeliig (urollig) the iteratios. Due to the memory read access required i the widow decoder, the already proposed fully parallel architectures are ot applicable. Compared to the classical widow decoder, egligible loss i performace was observed which is due to utilizig the ufiished (itermediate) values i the memory. The coectios betwee the pipelie stages (iput-output ad memory maagemet) are also detailed. To the best of authors kowledge, o such architecture for widow decoder has bee proposed i the literature. We further compare the overall decodig latecy of the widow decoder. With this architecture ow the assumptio regardig the decodig processig latecy, Bit Error Rate WD Pipe.-WD Circ-Pipe.-WD E b /N 0 [db] Fig. 6. BER compariso betwee the classical widow decoder (WD), pipelie widow decoder (Pipe.-WD) ad the circular pipelie widow decoder (Circ-Pipe.-WD). For all three decoders, I max = 10 iteratios are performed. detailed i Sectio I, is valid. Sice, for both block decoder ad widow decoder, iteratios ca be urolled to icrease the decodig throughput by a factor of I max. The results are also verified usig Verilog simulatio, with FPGA implemetatio left as a future work. REFERENCES [1] R. G. Gallager, Low desity parity check codes, Ph.D. dissertatio, Massachussetts Istitute of Techology (MIT), [2] A. Jimeez Felstrom ad K. Zigagirov, Time-varyig periodic covolutioal codes with low-desity parity-check matrix, IEEE Tras. If. Theory, vol. 45, o. 6, pp , Sep [3] A. Pusae, A. Feltstrom, A. Sridhara, M. Letmaier, K. Zigagirov, ad D. Costello, Implemetatio aspects of LDPC covolutioal codes, IEEE Tras. Commu., vol. 56, o. 7, pp , Jul [4] N. Ul Hassa, M. Letmaier, ad G. Fettweis, Compariso of LDPC block ad LDPC covolutioal codes based o their decodig latecy, i Proc. It. Symp. o Turbo Codes & Iterative If. Proc., Aug. 2012, pp [5] M. Letmaier, M. Preda, ad G. Fettweis, Efficiet message passig schedulig for termiated LDPC covolutioal codes, i Proc. IEEE It. Symp. Iform. Theory (ISIT), Aug. 2011, pp [6] K. Huag, D. G. M. Mitchell, L. Wei, M. Xiao, ad D. J. Costello Jr, Performace compariso of o-biary LDPC block ad spatially coupled codes, i Proc. IEEE It. Symp. Iform. Theory (ISIT), Ju. 2014, pp [7] T. Heh ad J. Huber, LDPC codes ad covolutioal codes with equal structural delay: A compariso, IEEE Tras. Commu., vol. 57, o. 6, pp , Ju [8] P. Schlafer, N. Weh, M. Alles, ad T. Lehigk-Emde, A ew dimesio of parallelism i ultra high throughput LDPC decodig, i IEEE Workshop o Sigal Processig Systems (SiPS), Oct 2013, pp [9] A. Pusae, K. Zigagirov, ad J. Costello, D.J., Costructio of irregular LDPC covolutioal codes with fast ecodig, i Proc. IEEE It. Cof. Commu. (ICC), vol. 3, Jue 2006, pp [10] I. Bocharova, B. Kudryashov, ad R. Johaesso, LDPC covolutioal codes versus QC LDPC block codes i commuicatio stadard scearios, i Proc. IEEE It. Symp. Iform. Theory (ISIT), Jue 2014, pp [11] M. Papaleo, A. Iyegar, P. Siegel, J. Wolf, ad G. Corazza, Widowed erasure decodig of LDPC covolutioal codes, i Proc. IEEE Iform. Theory Workshop (ITW), Ja. 2010, pp. 1 5.

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Joint Message-Passing Symbol-Decoding of LDPC Coded Signals over Partial-Response Channels

Joint Message-Passing Symbol-Decoding of LDPC Coded Signals over Partial-Response Channels Joit Message-Passig Symbol-Decodig of LDPC Coded Sigals over Partial-Respose Chaels Rathakumar Radhakrisha ad ae Vasić Departmet of Electrical ad Computer Egieerig Uiversity of Arizoa, Tucso, AZ-8572 Email:

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO

DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO Sagwo Seo, Trevor Mudge Advaced Computer Architecture Laboratory Uiversity of Michiga at A Arbor {swseo, tm}@umich.edu Yumig Zhu, Chaitali

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

k (check node degree) and j (variable node degree)

k (check node degree) and j (variable node degree) A Parallel Turbo Decodig Message Passig Architecture for Array LDPC Codes Kira Guam, Pakaj Bhagawat, Weihuag Wag, Gwa Choi, Mark Yeary * Dept. of Electrical Egieerig, Texas A&M Uiversity, College Statio,

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

Lecture 2: Spectra of Graphs

Lecture 2: Spectra of Graphs Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Neural Networks A Model of Boolean Functions

Neural Networks A Model of Boolean Functions Neural Networks A Model of Boolea Fuctios Berd Steibach, Roma Kohut Freiberg Uiversity of Miig ad Techology Istitute of Computer Sciece D-09596 Freiberg, Germay e-mails: steib@iformatik.tu-freiberg.de

More information

EE123 Digital Signal Processing

EE123 Digital Signal Processing Last Time EE Digital Sigal Processig Lecture 7 Block Covolutio, Overlap ad Add, FFT Discrete Fourier Trasform Properties of the Liear covolutio through circular Today Liear covolutio with Overlap ad add

More information

A REDUCED-COMPLEXITY LDPC DECODING ALGORITHM WITH CHEBYSHEV POLYNOMIAL FITTING

A REDUCED-COMPLEXITY LDPC DECODING ALGORITHM WITH CHEBYSHEV POLYNOMIAL FITTING Joural of Theoretical ad Applied Iformatio Techology st March. Vol. 49 No. 5 - JATIT & LLS. All rights reserved. ISSN: 99-8645 www.jatit.org E-ISSN: 87-95 A REDUCED-COMPLEXITY LDPC DECODING ALGORITHM WITH

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de

More information

Alpha Individual Solutions MAΘ National Convention 2013

Alpha Individual Solutions MAΘ National Convention 2013 Alpha Idividual Solutios MAΘ Natioal Covetio 0 Aswers:. D. A. C 4. D 5. C 6. B 7. A 8. C 9. D 0. B. B. A. D 4. C 5. A 6. C 7. B 8. A 9. A 0. C. E. B. D 4. C 5. A 6. D 7. B 8. C 9. D 0. B TB. 570 TB. 5

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Examples and Applications of Binary Search

Examples and Applications of Binary Search Toy Gog ITEE Uiersity of Queeslad I the secod lecture last week we studied the biary search algorithm that soles the problem of determiig if a particular alue appears i a sorted list of iteger or ot. We

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad

More information

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware Parallel Polygo Approximatio Algorithm Targeted at Recofigurable Multi-Rig Hardware M. Arif Wai* ad Hamid R. Arabia** *Califoria State Uiversity Bakersfield, Califoria, USA **Uiversity of Georgia, Georgia,

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13 CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

GPUMP: a Multiple-Precision Integer Library for GPUs

GPUMP: a Multiple-Precision Integer Library for GPUs GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract

More information

Homework 1 Solutions MA 522 Fall 2017

Homework 1 Solutions MA 522 Fall 2017 Homework 1 Solutios MA 5 Fall 017 1. Cosider the searchig problem: Iput A sequece of umbers A = [a 1,..., a ] ad a value v. Output A idex i such that v = A[i] or the special value NIL if v does ot appear

More information

Consider the following population data for the state of California. Year Population

Consider the following population data for the state of California. Year Population Assigmets for Bradie Fall 2016 for Chapter 5 Assigmet sheet for Sectios 5.1, 5.3, 5.5, 5.6, 5.7, 5.8 Read Pages 341-349 Exercises for Sectio 5.1 Lagrage Iterpolatio #1, #4, #7, #13, #14 For #1 use MATLAB

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting)

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting) MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fittig) I this chapter, we will eamie some methods of aalysis ad data processig; data obtaied as a result of a give

More information

A General Framework for Accurate Statistical Timing Analysis Considering Correlations

A General Framework for Accurate Statistical Timing Analysis Considering Correlations A Geeral Framework for Accurate Statistical Timig Aalysis Cosiderig Correlatios 7.4 Vishal Khadelwal Departmet of ECE Uiversity of Marylad-College Park vishalk@glue.umd.edu Akur Srivastava Departmet of

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Speeding-up dynamic programming in sequence alignment

Speeding-up dynamic programming in sequence alignment Departmet of Computer Sciece Aarhus Uiversity Demark Speedig-up dyamic programmig i sequece aligmet Master s Thesis Dug My Hoa - 443 December, Supervisor: Christia Nørgaard Storm Pederse Implemetatio code

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

Toward Realtime Side Information Decoding On Multi-Core Processors

Toward Realtime Side Information Decoding On Multi-Core Processors MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Toward Realtime Side Iformatio Decodig O Multi-Core Processors Svetislav Momcilovic, Yige Wag, Shatau Rae, Athoy Vetro TR21-1 December 21 Abstract

More information

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 )

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 ) EE26: Digital Desig, Sprig 28 3/6/8 EE 26: Itroductio to Digital Desig Combiatioal Datapath Yao Zheg Departmet of Electrical Egieerig Uiversity of Hawaiʻi at Māoa Combiatioal Logic Blocks Multiplexer Ecoders/Decoders

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence?

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence? 6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.

More information

Protected points in ordered trees

Protected points in ordered trees Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic

More information

ANN WHICH COVERS MLP AND RBF

ANN WHICH COVERS MLP AND RBF ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi

More information

Numerical Methods Lecture 6 - Curve Fitting Techniques

Numerical Methods Lecture 6 - Curve Fitting Techniques Numerical Methods Lecture 6 - Curve Fittig Techiques Topics motivatio iterpolatio liear regressio higher order polyomial form expoetial form Curve fittig - motivatio For root fidig, we used a give fuctio

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

Perhaps the method will give that for every e > U f() > p - 3/+e There is o o-trivial upper boud for f() ad ot eve f() < Z - e. seems to be kow, where

Perhaps the method will give that for every e > U f() > p - 3/+e There is o o-trivial upper boud for f() ad ot eve f() < Z - e. seems to be kow, where ON MAXIMUM CHORDAL SUBGRAPH * Paul Erdos Mathematical Istitute of the Hugaria Academy of Scieces ad Reu Laskar Clemso Uiversity 1. Let G() deote a udirected graph, with vertices ad V(G) deote the vertex

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Xiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation

Xiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation Flexible Colorig Xiaozhou (Steve) Li, Atri Rudra, Ram Swamiatha HP Laboratories HPL-2010-177 Keyword(s): graph colorig; hardess of approximatio Abstract: Motivated b y reliability cosideratios i data deduplicatio

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets

More information

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 201 Heaps 201 Goodrich ad Tamassia xkcd. http://xkcd.com/83/. Tree. Used with permissio uder

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract O Ifiite Groups that are Isomorphic to its Proper Ifiite Subgroup Jaymar Talledo Baliho Abstract Two groups are isomorphic if there exists a isomorphism betwee them Lagrage Theorem states that the order

More information

condition w i B i S maximum u i

condition w i B i S maximum u i ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

Automatic Generation of Polynomial-Basis Multipliers in GF (2 n ) using Recursive VHDL

Automatic Generation of Polynomial-Basis Multipliers in GF (2 n ) using Recursive VHDL Automatic Geeratio of Polyomial-Basis Multipliers i GF (2 ) usig Recursive VHDL J. Nelso, G. Lai, A. Teca Abstract Multiplicatio i GF (2 ) is very commoly used i the fields of cryptography ad error correctig

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

Construction of Regular and Irregular QC-LDPC Codes: a Finite Field Approach and Masking

Construction of Regular and Irregular QC-LDPC Codes: a Finite Field Approach and Masking 06 Iteratioal Symposium o Advaces i Electrical, Electroics ad Computer Egieerig (ISAEECE 06 Costructio of egular ad Irregular QC-LDPC Codes: a Fiite Field Approach ad Maskig Xiaopeg Che,a, Li Zhou,,, ui

More information

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM MATEC Web of Cofereces 79, 01014 (016) DOI: 10.1051/ mateccof/0167901014 T 016 BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM Staislav Shidlovskiy 1, 1 Natioal Research

More information

Force Network Analysis using Complementary Energy

Force Network Analysis using Complementary Energy orce Network Aalysis usig Complemetary Eergy Adrew BORGART Assistat Professor Delft Uiversity of Techology Delft, The Netherlads A.Borgart@tudelft.l Yaick LIEM Studet Delft Uiversity of Techology Delft,

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU)

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU) Graphs Miimum Spaig Trees Slides by Rose Hoberma (CMU) Problem: Layig Telephoe Wire Cetral office 2 Wirig: Naïve Approach Cetral office Expesive! 3 Wirig: Better Approach Cetral office Miimize the total

More information

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization Ed Semester Examiatio 2013-14 CSE, III Yr. (I Sem), 30002: Computer Orgaizatio Istructios: GROUP -A 1. Write the questio paper group (A, B, C, D), o frot page top of aswer book, as per what is metioed

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION 397 AN OPTIMIZATION NETWORK FOR MATRIX INVERSION Ju-Seog Jag, S~ Youg Lee, ad Sag-Yug Shi Korea Advaced Istitute of Sciece ad Techology, P.O. Box 150, Cheogryag, Seoul, Korea ABSTRACT Iverse matrix calculatio

More information

Octahedral Graph Scaling

Octahedral Graph Scaling Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of

More information

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

Linear Time-Invariant Systems

Linear Time-Invariant Systems 9/9/00 LIEAR TIE-IVARIAT SYSTES Uit, d Part Liear Time-Ivariat Sstems A importat class of discrete-time sstem cosists of those that are Liear Priciple of superpositio Time-ivariat dela of the iput sequece

More information

Combination Labelings Of Graphs

Combination Labelings Of Graphs Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

NTH, GEOMETRIC, AND TELESCOPING TEST

NTH, GEOMETRIC, AND TELESCOPING TEST NTH, GEOMETRIC, AND TELESCOPING TEST Sectio 9. Calculus BC AP/Dual, Revised 08 viet.dag@humbleisd.et /4/08 0:0 PM 9.: th, Geometric, ad Telescopig Test SUMMARY OF TESTS FOR SERIES Lookig at the first few

More information

MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS

MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS Fura Uiversity Electroic Joural of Udergraduate Matheatics Volue 00, 1996 6-16 MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS DAVID SITTON Abstract. How ay edges ca there be i a axiu atchig i a coplete

More information

Computing a k-sparse n-length Discrete Fourier Transform using at most 4k samples and O(k log k) complexity

Computing a k-sparse n-length Discrete Fourier Transform using at most 4k samples and O(k log k) complexity 2013 IEEE Iteratioal Symposium o Iformatio Theory Computig a k-sparse -legth Discrete Fourier Trasform usig at most 4k samples ad O(k log k) complexity Sameer Pawar ad Kaa Ramchadra Dept of Electrical

More information

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview APPLICATION NOTE Automated Gai Flatteig Scope ad Overview A flat optical power spectrum is essetial for optical telecommuicatio sigals. This stems from a eed to balace the chael powers across large distaces.

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information