Threshold Analysis of Non-Binary Spatially-Coupled LDPC Codes with Windowed Decoding

Size: px
Start display at page:

Download "Threshold Analysis of Non-Binary Spatially-Coupled LDPC Codes with Windowed Decoding"

Transcription

1 1 Threshold Analysis of Non-Binary Spatially-Coupled LDPC Codes with Windowed Decoding Lai Wei, Toshiaki Koike-Akino, David G. M. Mitchell, Thoas E. Fuja, and Daniel J. Costello, Jr. Departent of Electrical Engineering, University of Notre Dae, Notre Dae, IN, U.S {lwei1, david.itchell, tfuja, Mitsubishi Electric Research Laboratories (MERL), Cabridge, MA, U.S. {wei, arxiv: v1 [cs.it] 14 Mar 2014 Abstract In this paper we study the iterative decoding threshold perforance of non-binary spatially-coupled low-density parity-check (NB-SC-LDPC) code ensebles for both the binary erasure channel (BEC) and the binary-input additive white Gaussian noise channel (BIAWGNC), with particular ephasis on windowed decoding (WD). We consider both (2, 4)-regular and (3, 6)-regular NB-SC-LDPC code ensebles constructed using protographs and copute their thresholds using protograph versions of NB density evolution and NB extrinsic inforation transfer analysis. For these code ensebles, we show that WD of NB-SC-LDPC codes, which provides a significant decrease in latency and coplexity copared to decoding across the entire parity-check atrix, results in a negligible decrease in the nearcapacity perforance for a sufficiently large window size W on both the BEC and the BIAWGNC. Also, we show that NB- SC-LDPC code ensebles exhibit gains in the WD threshold copared to the corresponding block code ensebles decoded across the entire parity-check atrix, and that the gains increase as the finite field size q increases. Moreover, fro the viewpoint of decoding coplexity, we see that (3, 6)-regular NB-SC-LDPC codes are particularly attractive due to the fact that they achieve near-capacity thresholds even for sall q and W. I. INTRODUCTION Non-binary low-density parity-check (NB-LDPC) block codes constructed over finite fields of size q > 2 outperfor coparable binary LDPC block codes [1], in particular when the blocklength is short to oderate; however, this perforance gain coes at the cost of an increase in decoding coplexity. A direct ipleentation of the belief-propagation (BP) decoder [1] has coplexity O(q 2 ) per sybol. More recently, an ipleentation based on the fast Fourier transfor [2] was shown to reduce the coplexity to O(q log q). Beyond that, a variety of siple but sub-optial decoding algoriths have been proposed in the literature [3] [4]. As for coputing iterative decoding thresholds, a non-binary extrinsic inforation transfer (NB-EXIT) analysis was proposed in [5] and was later developed into a corresponding version P-NB- EXIT [6] suitable for protograph-based codes. A protograph [7] is a sall Tanner graph, which can be used to produce a structured LDPC code enseble by applying a graph lifting procedure, such that every code in the enseble aintains the structure of the protograph, i.e., it has the sae degree distribution and the sae type of edge connections. Figure 1 illustrates a (3, 6)-regular protograph, Variable node B Check node 3 3 Fig. 1. A (3, 6)-regular protograph and its corresponding base-atrix representation. which can be used to produce a (3, 6)-regular LDPC block code enseble. A protograph with (c b) check nodes and c variable nodes can be represented equivalently by a base (parity-check) atrix B consisting of non-negative integers, in which the (i, j)-th entry (1 i c b and 1 j c) is the nuber of edges between check node i and variable node j. To calculate the BP threshold of a protograph-based code enseble, conventional tools ust be adapted to take the edge connections into account. Although soe freedo is lost in the code design when the protograph structure is adopted, one can use these odified protograph-based analysis tools to find good protographs with better BP thresholds than corresponding unstructured ensebles with the sae degree distribution. Spatially-coupled LDPC (SC-LDPC) codes, also known as terinated LDPC convolutional codes [8], have been shown to exhibit a phenoenon called threshold saturation [9], where, as the terination length grows, the BP decoding threshold saturates to the axiu a-posteriori (MAP) threshold of a (d v, d c )-regular underlying LDPC block code enseble, which in turn iproves to the channel capacity as the density (d v and d c ) of the parity-check atrix increases. Iterative decoding threshold results on the binary erasure channel (BEC) for nonbinary SC-LDPC (NB-SC-LDPC) code ensebles have been reported by Uchikawa et al. [10] and Pieontese et al. [11], and the corresponding threshold saturation was proved by Andriyanova et al. [12]. In each of these papers, the authors assued that decoding was carried out across the entire paritycheck atrix of the code; for siplicity, this will be referred to as the flooding schedule (FS) in our paper. A ajor proble with FS decoding of SC-LDPC codes is

2 2 latency. To resolve this issue, a ore efficient technique, called windowed decoding (WD), was proposed in [13]. Copared to FS decoding, WD exploits the convolutional nature of the SC parity-check atrix to localize the decoder and thereby reduce latency; under WD, the decoding window contains only a portion of the parity-check atrix, and within that window BP decoding is perfored. In this paper, assuing that the binary iage of a codeword is transitted, we analyze the WD threshold perforance of (2, 4)-regular and (3, 6)-regular NB-SC-LDPC code ensebles based on protographs. In particular, 1) for the BEC, we develop the NB density evolution (NB- DE) analysis as proposed in [14] into a protograph version, which we call P-NB-DE, and 2) for the binary-input additive white Gaussian noise channel (BIAWGNC) with binary phase-shift keying (BPSK) odulation, we apply the P-NB-EXIT [6] analysis (originally proposed for NB-LDPC block codes) to NB-SC- LDPC codes. The finite field size q is constrained to be 2, where is a positive integer. In both cases, our priary contribution lies in the scenario when WD is ipleented, so that decoder latency can be reduced at the cost of a sall loss in decoder perforance. For three NB-SC-LDPC enseble exaples, we show in Sections III and IV that WD provides two of the ensebles with non-decreasing threshold perforance as W and/or increases. In fact, their WD thresholds are nuerically capacity-achieving for sufficiently large W and. As for the third enseble, although its WD threshold diverges slightly fro capacity when is large (observed on the BEC), it is the strongest candidate for low-latency and/or low-coplexity applications due to its excellent perforance when W and are both sall; this conclusion is further strengthened in our analysis of WD coplexity in Section V. In all, the results of this paper provide theoretical guidance for designing and ipleenting practical NB-SC-LDPC codes for WD. II. NB-SC-LDPC CODE ENSEMBLES An SC-LDPC code enseble can be constructed fro a LDPC block code enseble using an edge spreading technique [15], which can be described conveniently by protographs. As shown in Figure 1, let B denote a block base atrix of size (c b) c, which corresponds to a protograph representation of an LDPC block code enseble with design rate R = b/c. An SC base atrix corresponding to an SC- LDPC code enseble can then be constructed using ( s + 1) coponent base atrices {B i } s i=0, each of size (c b) c, where the edges of B are spread such that s B i = B, i=0 and s is the eory size. The resulting SC base atrix is given in its transpose for in (1) at the botto of this page, where L is called the terination length. The design rate of the code is R L = 1 (c b)(l + s). cl As a result of the terination, there is a rate loss copared to the block code design rate; however, this diinishes as L increases, i.e., R L R = b/c when L. In WD, the window size W is defined as the nuber of colun blocks of size c covered by the decoding window, which slides over a portion of B SC of fixed size W (c b) by W c (in sybols, see [13] for details). In this paper, we use the following three protographs as exaples, where C denotes the SC-LDPC code ensebles and B denotes the underlying LDPC block code ensebles: 1) B [2,4] and C [2,4] : The block base atrix B representing a (2, 4)-regular LDPC block code enseble B [2,4] and the coponent atrices used to construct an SC base atrix B SC representing an SC-LDPC code enseble C [2,4], are given by B = [ 2 2 ] B 0 = B 1 = [ 1 1 ]. As noted above, the value of an entry in B (resp. B SC ) is equal to the nuber of edges connecting the corresponding check node and variable node in the protograph for B (resp. C). 2) B and : The block base atrix B corresponding to a (3, 6)-regular LDPC block code enseble B and the coponent atrices B 0 and B 1 corresponding to an SC-LDPC code enseble are given by B = [ 3 3 ] B 0 = [ 2 1 ], B 1 = [ 1 2 ]. 3) : B = [ 3 3 ] B 0 = B 1 = B 2 = [ 1 1 ]. For each exaple, the terination length is chosen as L = 100, so that R L is close to R. We will refer to the (2, 4) group as the collection of ensebles B [2,4] and C [2,4] and the (3, 6) group as B,, and. In practice, an NB-SC-LDPC code is generated fro B SC in two steps, siilar to the procedure for generating an NB- LDPC block code fro B [7]: 1) Lifting : Replace the nonzero entries in B SC by an M M perutation atrix (or a su of non-overlapping B SC = B 0 B 1... B s B 0 B 1... B s (1) B 0 B 1... B s cl (c b)(l+ s)

3 3 M M perutation atrices), and replace the zero entries by the M M all-zero atrix; M is called the lifting factor. In this way, the structure of B SC is aintained in the lifted SC-LDPC atrix, so the threshold analysis of the SC-LDPC code enseble C can be carried out directly based on B SC. 2) Labeling : Randoly assign to each non-zero entry in the lifted parity-check atrix a non-zero eleent in GF(q), where q = 2 is the finite field size. After the lifting step, the parity-check atrix is still binary, i.e., the non-binary feature does not arise until labeling. Both the perutation atrices and the selection of labels can be optiized in order to obtain a good code [6], but this is not our ephasis here, since we are interested in a threshold analysis of the general non-binary enseble, where the diension of the essage odel used in the threshold analysis depends on the size of the finite field [5] [14]. III. THRESHOLD ANALYSIS OF NB-SC-LDPC CODE ENSEMBLES ON THE BEC A. P-NB-DE Analysis on the BEC We extended the NB-DE algorith for the BEC [14] to a protograph version, which we denote P-NB-DE, siilar to the procedure used to extend NB-EXIT to P-NB-EXIT in [6]. Since edge connections are taken into account, P-NB-DE is essentially the BP algorith perfored on a protograph. The resulting BP threshold is denoted ɛ BP (δ) with δ [0, 1], which is the largest channel erasure rate such that all transitted sybols can be recovered successfully with probability at least (1 δ) when the nuber of iterations goes to infinity. Our results are obtained for δ = 10 6 ; however, we note that setting δ = provides siilar results. B. Nuerical Results In this section, we present the nuerical results for the BEC, with ephasis on the threshold perforance of NB-SC- LDPC code ensebles when WD is used. As a benchark, Figure 2 first copares the FS threshold perforance of the (2, 4) group and the (3, 6) group, where FS decoding is carried out on the entire parity-check atrix and not restricted to a window. We observe that the NB-SC-LDPC codes perfor extreely well copared to their block code counterparts, in particular for large field size. Unlike the block code case, always outperfors C [2,4], and the thresholds of these two ensebles increase onotonically with. However, this onotonic increase is not observed for, where the obtained threshold actually decreases very slightly for > 5. (See the related discussion of Figure 3(b) below.) Figure 3(a) shows that, for a sufficiently large window size W, WD provides threshold perforance nearly the sae as the FS, i.e., the perforance loss is negligible while the decoder benefits fro greatly reduced delay. We define W to be the sallest window size such that WD provides a threshold within 3% of the FS threshold universally for all field sizes. 1 For C [2,4], we find W = This 3% value is actually loose for oderate to large. In the cases we exained, the WD threshold with W = W typically lies within % of or is even nuerically identical to the FS threshold for > B [2,4] B C [2,4] Fig. 2. Coparison of the thresholds based on the flooding schedule (FS) for the (2, 4) and (3, 6) groups on the BEC. Siilar observations can be ade for WD of and in Figure 3(b) and 3(c): For, W = 7. The WD threshold grows to a value within 0.1% of the channel capacity when = 5, and then decreases very slightly as increases further. Nevertheless, the WD threshold reains very close to capacity even for large. For, W = 10. The WD threshold does not degrade as increases, but instead saturates to a value nuerically indistinguishable fro capacity. However, when W is sall (e.g., W = 5), does not perfor as well as due to its larger eory size, which increases the delay required to ake reliable decisions (see [13]). To suarize, for the three considered NB-SC-LDPC code ensebles, the gain introduced by spatial coupling copared to the corresponding uncoupled NB-LDPC block code ensebles grows with increasing field size for sufficiently large window size W. Furtherore, the thresholds of the C [2,4] and NB-SC-LDPC code ensebles saturate to a value nuerically indistinguishable fro capacity for large with either FS decoding or WD with a sufficiently large W. This is analogous to the case where the thresholds of binary (d v, d c )-regular SC-LDPC code ensebles saturate to capacity as d v and d c get large. It is interesting to note that for binary ensebles the graph density (d v and d c ) ust get large to approach capacity, whereas for non-binary ensebles capacity can be approached for fixed density by increasing the field size. In other words, the increase in coplexity needed to approach capacity is different in the two cases. IV. THRESHOLD ANALYSIS OF NB-SC-LDPC CODE ENSEMBLES ON THE BIAWGNC A. P-NB-EXIT Analysis on the BIAWGNC We use the P-NB-EXIT algorith presented in [6] to analyze the threshold perforance of NB-SC-LDPC code ensebles on the BIAWGNC, assuing that the binary iage

4 B [2,4] C [2,4] C [2,4], W = 6 C [2,4], W = 10 C [2,4], W = 20 (a) B [2,4] and C [2,4] Threshold: Eb/N0 (db) B [2,4] B C [2,4] (a) Coparison of the (2, 4) and (3, 6) groups: FS B, W = 3, W = B, W = 3, W = 5 Threshold: Eb/N0 (db) (b) B and (b) B and 5 Fig. 4. FS thresholds of the (2, 4) and (3, 6) groups and WD thresholds of on the BIAWGNC. Fig B, W = 3, W = 5, W = 10 (c) B and FS and WD thresholds of the (2, 4) and (3, 6) groups on the BEC. protograph, where the essages represent utual inforation (MI) values, a odel obtained by approxiating the distribution of the log-likelihood ratios as (jointly) Gaussian. The threshold is obtained by deterining the sallest signal-tonoise ratio E b /N 0 such that decoding is successful, i.e., the sallest value of E b /N 0 such that the a-posteriori MI between each variable node and a corresponding codeword sybol goes to 1 as the nuber of iterations increases. B. Nuerical Results Figure 4(a) copares the FS thresholds of the (2, 4) and (3, 6) groups on the BIAWGNC and Figure 4(b) shows the WD thresholds of for different W. 2 Both figures illustrate siilar behavior as the BEC results presented in Section III-B, and the sae is true for the WD thresholds of C [2,4] of a codeword is transitted and that BPSK odulation is used. Siilar to the P-NB-DE analysis on the BEC, the P- NB-EXIT analysis is also a BP algorith perfored on the 2 Due to coputational coplexity, the BIAWGNC thresholds were calculated only up to = 8. However, siilar to the approach taken by Uchikawa et al. in [10], the BIAWGNC threshold perforance for = 9 and 10 is conjectured to be consistent with the corresponding BEC results.

5 5 and (not included in the figure due to space liitations). To suarize, sall gains are observed for C [2,4] copared to B [2,4] until the field size gets large, whereas nuerically capacity-achieving WD thresholds that are significantly better than the corresponding block code thresholds are observed for both and. Moreover, we find that W = 10 for C [2,4] and, while is a better choice for WD, since W = 7. V. DECODING COMPLEXITY In practice, we would like to copare the perforance of NB-SC-LDPC codes and the corresponding NB-LDPC block codes when their decoding latency is the sae. Since it is assued that the binary iage of a codeword is transitted, it is convenient to easure the latency in ters of bits, denoted as W b, which is the nuber of coluns in the window for WD of SC-LDPC codes and the blocklength of LDPC block codes, both easured in bits (instead of GF (q) sybols). To be ore specific, if the lifting factor (see Section II) is M for SC-LDPC codes and M for LDPC block codes, then the equal latency condition is given by W b = W c M = c M, i.e., M = W M, which eans that SC-LDPC codes ust use perutation atrices W ties saller than LDPC block codes to aintain the sae latency, where c is the nuber of coluns in the B and B i atrices. For the codes we considered fro the (2, 4) and (3, 6) groups, c = 2. For fixed M, W b then depends on W. (The threshold analysis corresponds to the case when M.) As stated in [3] and the references therein, for NB-LDPC codes, if the BP algorith eploys the fast Fourier transfor, then the coputational coplexity at a check node is O(q) = O(q log 2 q) per sybol while that at a variable node is O(q). In our case, however, due to the constraint of equal latency, the decoding coplexity should be estiated per window for an SC-LDPC code, or equivalently, per blocklength for an LDPC block code. Like the protograph exaples in this paper, an SC-LDPC code is typically derived fro a (d v, d c )-regular LDPC block code. Consequently, if the window size is oderate to large, the part of the SC parity-check atrix covered by the window can be considered as (d v, d c )-regular as well and thus has (approxiately) the sae nuber of non-zero entries as the parity-check atrix of an LDPC block code. This indicates that the decoding coplexity of an SC-LDPC code and an LDPC block code is the sae when the decoding latency is the sae. 3 The total nuber of non-zero entries in the window is d v W b /, so the decoding coplexity per window is ( ) Wb O d v (q + q) = MO (W c d v (q + q)). (2) 3 In fact, due to the check-node irregularity at the beginning of the window and the variable-node irregularity at the end of the window, the actual decoding coplexity of the SC-LDPC code is slightly lower than the LDPC block code. Nevertheless, we keep this regularity assuption for siplicity. Other factors that influence the decoding coplexity, such as the nuber of iterations, are not considered. Decoding Coplexity , W=5, =5 C [2,4], =10 and, =5 C [2,4], W=10, =10, W=10, =5 d v = 2 d v = 2, W = 5 d v = 2, W = 10 d v = 3 d v = 3, W = 5 d v = 3, W = 10 Fig. 5. The order of decoding coplexity O (W c d v (q + q)) when an LDPC block code and an SC-LDPC code have the sae decoding latency and thus have the sae decoding coplexity. Ignoring the M factor on the right-hand side of (2), Figure 5 shows the order of the decoding coplexity when d v = 2 and 3 with FS decoding and WD (W = 5 and 10); note that FS decoding is equivalent to WD with W = L + s L = 100, i.e. decoding corresponds to an increase in the window size by approxiately an order of agnitude and to a corresponding order-of-agnitude increase in decoding coplexity. The five specific points highlighted in the figure are all cases when FS decoding or WD threshold of an SC-LDPC code enseble nuerically achieves (or is very close to) capacity (recall that the FS threshold of an LDPC block code enseble cannot be capacity-achieving, as shown in Figures 2 and 4(a)). We observe that Coparing FS decoding to WD for the sae enseble, both the coplexity and the latency are significantly reduced by adopting the latter. Coparing C [2,4] (W = 100), (W = 50), and (W = 25) for WD, both the coplexity and the latency of are less than the other two ensebles for the sae perforance (near-capacity). As a result, the (3, 6)-regular construction (especially ) is better than the (2, 4)-regular construction when designing an NB-SC-LDPC code with decoding latency and coplexity constraints and stringent perforance requireents. This result is supported by decoding perforance siulations of finite-length codes (see [17]). VI. CONCLUSIONS This paper analyzed the windowed decoding threshold perforance of several ensebles of non-binary spatially coupled LDPC codes; this was done for both the binary erasure channel and the BPSK-odulated additive white Gaussian

6 6 noise channel. It was observed that windowed decoding (with a sufficiently large window) provides the spatially-coupled codes with capacity-approaching perforance as the field size grows. Moreover, the gain copared to the corresponding block code ensebles increases as well. One particular enseble of (3, 6)- regular NB-SC-LDPC codes with eory size s = 1 was shown to exhibit near-capacity perforance even for relatively sall field and window sizes, i.e., low decoding coplexity and sall decoding latency. REFERENCES [1] M. C. Davey and D. J. C. MacKay, Low-density parity check codes over GF (q), IEEE Coun. Letters, vol. 2, no. 6, pp , Jun [2] L. Barnault and D. Declercq, Fast decoding algorith for LDPC over GF(2 q ), in Proc. IEEE Inf. Theory Workshop, pp , Paris, France, Apr [3] A. Voicila, D. Declercq, F. Verdier, M. Fossorier, M., and P. Urard, Lowcoplexity decoding for non-binary LDPC codes in high order fields, IEEE Trans. Coun., vol. 58, no. 5, pp , May [4] Erbao Li, D. Declercq, and K. Gunna, Trellis-based extended in-su algorith for non-binary LDPC codes and its hardware structure, IEEE Trans. Coun., vol. 61, no. 7, pp , Jul [5] A. Bennatan and D. Burshtein, Design and analysis of nonbinary LDPC codes for arbitrary discrete-eoryless channels, IEEE Trans. Inf. Theory, vol. 52, no. 2, pp , Feb [6] L. Dolecek, D. Divsalar, Y. Sun, and B. Airi, Non-binary protographbased LDPC codes: Enuerators, analysis, and designs, [Online]. Available: [7] J. Thorpe, Low-density parity-check (LDPC) codes constructed fro protographs, JPL IPN Progress Report , Aug [8] M. Lentaier, A. Sridharan, D. J. Costello, Jr., and K. Sh. Zigangirov, Iterative decoding threshold analysis for LDPC convolutional codes, IEEE Trans. Inf. Theory, vol 56, no. 10, pp , Oct [9] S. Kudekar, T. J. Richardson, and R. L. Urbanke, Threshold saturation via spatial coupling: Why convolutional LDPC ensebles perfor so well over the BEC, IEEE Trans. Inf. Theory, vol. 57, no. 2, pp , Feb [10] H. Uchikawa, K. Kasai, and K. Sakaniwa, Design and perforance of rate-copatible non-binary LDPC convolutional codes, [Online]. Available: [11] A. Pieontese, A. G. Aat, and G. Colavolpe, Nonbinary spatiallycoupled LDPC codes on the binary erasure channel, in Proc. IEEE Int. Conf. Coun., pp , Budapest, Hungary, Jun [12] I. Andriyanova and A. G. Aat, Threshold saturation for nonbinary SC- LDPC codes on the binary erasure channel, [Online]. Available: [13] A. R. Iyengar, M. Papaleo, P. H. Siegel, J. K. Wolf, A. Vanelli-Coralli, and G. E. Corazza, Windowed decoding of protograph-based LDPC convolutional codes over erasure channels, IEEE Trans. Inf. Theory, vol. 58, no. 4, pp , Apr [14] V. Rathi and R. L. Urbanke, Density evolution, thresholds and the stability condition for non-binary LDPC codes, IEE Coun. Proc., vol. 152, no. 6, pp , Dec [15] M. Lentaier, G. P. Fettweis, K. Sh. Zigangirov, and D. J. Costello, Jr., Approaching capacity with asyptotically regular LDPC codes, in Proc. Inf. Theory and App. Workshop, San Diego, CA, Feb [16] M. Lentaier, M. M. Prenda, and G. P. Fettweis, Efficient essage passing scheduling for terinated LDPC convolutional codes, in Proc. IEEE Int. Syp. on Inf. Theory, pp , Saint Petersburg, Russia, Aug [17] K. Huang, D. G. M. Mitchell, L. Wei, X. Ma, and D. J. Costello, Jr., Perforance coparison of non-binary LDPC block and spatially coupled codes, subitted to IEEE Int. Syp. on Inf. Theory, Jan

Dynamic Window Decoding for LDPC Convolutional Codes in Low-Latency Optical Communications

Dynamic Window Decoding for LDPC Convolutional Codes in Low-Latency Optical Communications MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Dynamic Window Decoding for LDPC Convolutional Codes in Low-Latency Optical Communications Xia, T.; Koike-Akino, T.; Millar, D.S.; Kojima,

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

Block-LDPC Codes Vs Duo-Binary Turbo-Codes for European Next Generation Wireless Systems

Block-LDPC Codes Vs Duo-Binary Turbo-Codes for European Next Generation Wireless Systems Block-LDPC Codes Vs Duo-Binary Turbo-Codes for European Next Generation Wireless Systes Thierry Lestable* Ernesto Zieran # Marie-Helene Haon + and Stephan Stiglayr & (*) Advanced Technology & Standards

More information

Randomized Progressive Edge-Growth (RandPEG)

Randomized Progressive Edge-Growth (RandPEG) Randomized Progressive Edge-Growth (Rand) Auguste Venkiah, David Declercq, Charly Poulliat ETIS, CNRS, ENSEA, Univ Cergy-Pontoise F-95000 Cergy-Pontoise email:{venkiah,declercq,poulliat}@ensea.fr Abstract

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

Design of Cages with a Randomized Progressive Edge-Growth Algorithm

Design of Cages with a Randomized Progressive Edge-Growth Algorithm 1 Design of Cages with a Randomized Progressive Edge-Growth Algorithm Auguste Venkiah, David Declercq and Charly Poulliat ETIS - CNRS UMR 8051 - ENSEA - University of Cergy-Pontoise Abstract The progressive

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

Reconstruction of Time Series using Optimal Ordering of ICA Components

Reconstruction of Time Series using Optimal Ordering of ICA Components Reconstruction of Tie Series using Optial Ordering of ICA Coponents Ar Goneid and Abear Kael Departent of Coputer Science & Engineering, The Aerican University in Cairo, Cairo, Egypt e-ail: goneid@aucegypt.edu

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

Ascending order sort Descending order sort

Ascending order sort Descending order sort Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

Effects of Desingularization and Collocation-Point Shift on Steady Waves with Forward Speed

Effects of Desingularization and Collocation-Point Shift on Steady Waves with Forward Speed Effects of Desingularization and Collocation-Point Shift on Steady Waves with Forward Speed Yonghwan Ki* & Dick K.P. Yue** Massachusetts Institute of Technology, Departent of Ocean Engineering, Cabridge,

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Design of Cages with a Randomized Progressive Edge-Growth Algorithm

Design of Cages with a Randomized Progressive Edge-Growth Algorithm 1 Design of Cages with a Randomized Progressive Edge-Growth Algorithm Auguste Venkiah, David Declercq and Charly Poulliat ETIS - CNRS UMR 8051 - ENSEA - University of Cergy-Pontoise Abstract The Progressive

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

Optimized Graph-Based Codes For Modern Flash Memories

Optimized Graph-Based Codes For Modern Flash Memories Optimized Graph-Based Codes For Modern Flash Memories Homa Esfahanizadeh Joint work with Ahmed Hareedy and Lara Dolecek LORIS Lab Electrical Engineering Department, UCLA 10/08/2016 Presentation Outline

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

Complexity Comparison of Non-Binary LDPC Decoders

Complexity Comparison of Non-Binary LDPC Decoders Complexity Comparison of Non-Binary LDPC Decoders Laura Conde-Canencia, Ali Al-Ghouwayel, Emmanuel Boutillon To cite this version: Laura Conde-Canencia, Ali Al-Ghouwayel, Emmanuel Boutillon. Complexity

More information

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes

More information

6.1 Topological relations between two simple geometric objects

6.1 Topological relations between two simple geometric objects Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

MIDA: AN IDA SEARCH WITH DYNAMIC CONTROL

MIDA: AN IDA SEARCH WITH DYNAMIC CONTROL April 1991 UILU-ENG-91-2216 CRHC-91-9 Center fo r Reliable and High-Perforance Coputing MIDA: AN IDA SEARCH WITH DYNAMIC CONTROL Benjain W. Wah Coordinated Science Laboratory College of Engineering UNIVERSITY

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

Error Floors of LDPC Codes

Error Floors of LDPC Codes Error Floors of LDPC Codes Tom Richardson Flarion Technologies Bedminster, NJ 07921 tjr@flarion.com Abstract We introduce a computational technique that accurately predicts performance for a given LDPC

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Medical Biophysics 302E/335G/ st1-07 page 1

Medical Biophysics 302E/335G/ st1-07 page 1 Medical Biophysics 302E/335G/500 20070109 st1-07 page 1 STEREOLOGICAL METHODS - CONCEPTS Upon copletion of this lesson, the student should be able to: -define the ter stereology -distinguish between quantitative

More information

On the Performance Evaluation of Quasi-Cyclic LDPC Codes with Arbitrary Puncturing

On the Performance Evaluation of Quasi-Cyclic LDPC Codes with Arbitrary Puncturing On the Performance Evaluation of Quasi-Cyclic LDPC Codes with Arbitrary Puncturing Ying Xu, and Yueun Wei Department of Wireless Research Huawei Technologies Co., Ltd, Shanghai, 6, China Email: {eaglexu,

More information

I ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making

I ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making I ve Seen Enough : Increentally Iproving Visualizations to Support Rapid Decision Making Sajjadur Rahan Marya Aliakbarpour 2 Ha Kyung Kong Eric Blais 3 Karrie Karahalios,4 Aditya Paraeswaran Ronitt Rubinfield

More information

ISSN (Print) Research Article. *Corresponding author Akilambigai P

ISSN (Print) Research Article. *Corresponding author Akilambigai P Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2016; 4(5):223-227 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)

More information

Implementation of fast motion estimation algorithms and comparison with full search method in H.264

Implementation of fast motion estimation algorithms and comparison with full search method in H.264 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Heterogeneous Radial Basis Function Networks

Heterogeneous Radial Basis Function Networks Proceedings of the International Conference on Neural Networks (ICNN ), vol. 2, pp. 23-2, June. Heterogeneous Radial Basis Function Networks D. Randall Wilson, Tony R. Martinez e-ail: randy@axon.cs.byu.edu,

More information

Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression

Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression Sha M. Kakade Microsoft Research and Wharton, U Penn skakade@icrosoft.co Varun Kanade SEAS, Harvard University

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of

More information

The Boundary Between Privacy and Utility in Data Publishing

The Boundary Between Privacy and Utility in Data Publishing The Boundary Between Privacy and Utility in Data Publishing Vibhor Rastogi Dan Suciu Sungho Hong ABSTRACT We consider the privacy proble in data publishing: given a database instance containing sensitive

More information

Lowering the Error Floors of Irregular High-Rate LDPC Codes by Graph Conditioning

Lowering the Error Floors of Irregular High-Rate LDPC Codes by Graph Conditioning Lowering the Error Floors of Irregular High- LDPC Codes by Graph Conditioning Wen-Yen Weng, Aditya Ramamoorthy and Richard D. Wesel Electrical Engineering Department, UCLA, Los Angeles, CA, 90095-594.

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

Boosted Detection of Objects and Attributes

Boosted Detection of Objects and Attributes L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

A Discrete Spring Model to Generate Fair Curves and Surfaces

A Discrete Spring Model to Generate Fair Curves and Surfaces A Discrete Spring Model to Generate Fair Curves and Surfaces Atsushi Yaada Kenji Shiada 2 Tootake Furuhata and Ko-Hsiu Hou 2 Tokyo Research Laboratory IBM Japan Ltd. LAB-S73 623-4 Shiotsurua Yaato Kanagawa

More information

LOW-density parity-check (LDPC) codes have attracted

LOW-density parity-check (LDPC) codes have attracted 2966 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004 LDPC Block and Convolutional Codes Based on Circulant Matrices R. Michael Tanner, Fellow, IEEE, Deepak Sridhara, Arvind Sridharan,

More information

Scheduling Parallel Task Graphs on (Almost) Homogeneous Multi-cluster Platforms

Scheduling Parallel Task Graphs on (Almost) Homogeneous Multi-cluster Platforms 1 Scheduling Parallel Task Graphs on (Alost) Hoogeneous Multi-cluster Platfors Pierre-François Dutot, Tchiou N Takpé, Frédéric Suter and Henri Casanova Abstract Applications structured as parallel task

More information

A wireless sensor network for visual detection and classification of intrusions

A wireless sensor network for visual detection and classification of intrusions A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

A Study of the Relationship Between Support Vector Machine and Gabriel Graph

A Study of the Relationship Between Support Vector Machine and Gabriel Graph A Study of the Relationship Between Support Vector Machine and Gabriel Graph Wan Zhang and Irwin King {wzhang, king}@cse.cuhk.edu.hk Departent of Coputer Science & Engineering The Chinese University of

More information

Brian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi

Brian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi A Hierarchical Application of ICA-based Feature Etraction to Iage Classification Introduction Iage classification poses one of the greatest challenges in the achine vision and achine learning counities.

More information

Set Theoretic Estimation for Problems in Subtractive Color

Set Theoretic Estimation for Problems in Subtractive Color Set Theoretic Estiation for Probles in Subtractive Color Gaurav Shara Digital Iaging Technology Center, Xerox Corporation, MS0128-27E, 800 Phillips Rd, Webster, NY 14580 Received 25 March 1999; accepted

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Keyword Search in Spatial Databases: Towards Searching by Document

Keyword Search in Spatial Databases: Towards Searching by Document IEEE International Conference on Data Engineering Keyword Search in Spatial Databases: Towards Searching by Docuent Dongxiang Zhang #1, Yeow Meng Chee 2, Anirban Mondal 3, Anthony K. H. Tung #4, Masaru

More information

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.

More information

Experiences with complex user profiles for approximate P2P community matching

Experiences with complex user profiles for approximate P2P community matching Experiences with coplex user profiles for approxiate PP counity atching Patrizio Dazzi ISTI-CNR Pisa, Italy p.dazzi@isti.cnr.it Matteo Mordacchini IIT-CNR Pisa, Italy.ordacchini@iit.cnr.it Fabio Baglini

More information

Complexity-Optimized Low-Density Parity-Check Codes

Complexity-Optimized Low-Density Parity-Check Codes Complexity-Optimized Low-Density Parity-Check Codes Masoud Ardakani Department of Electrical & Computer Engineering University of Alberta, ardakani@ece.ualberta.ca Benjamin Smith, Wei Yu, Frank R. Kschischang

More information

Quantized Iterative Message Passing Decoders with Low Error Floor for LDPC Codes

Quantized Iterative Message Passing Decoders with Low Error Floor for LDPC Codes Quantized Iterative Message Passing Decoders with Low Error Floor for LDPC Codes Xiaojie Zhang and Paul H. Siegel University of California, San Diego 1. Introduction Low-density parity-check (LDPC) codes

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

Module Contact: Dr Rudy Lapeer (CMP) Copyright of the University of East Anglia Version 1

Module Contact: Dr Rudy Lapeer (CMP) Copyright of the University of East Anglia Version 1 UNIVERSITY OF EAST ANGLIA School of Coputing Sciences Main Series UG Exaination 2016-17 GRAPHICS 1 CMP-5010B Tie allowed: 2 hours Answer THREE questions. Notes are not peritted in this exaination Do not

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

Rule Extraction using Artificial Neural Networks

Rule Extraction using Artificial Neural Networks Rule Extraction using Artificial Neural Networks S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract Artificial neural networks have been successfully applied to a variety of business application probles involving

More information

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University

More information

Summary. Reconstruction of data from non-uniformly spaced samples

Summary. Reconstruction of data from non-uniformly spaced samples Is there always extra bandwidth in non-unifor spatial sapling? Ralf Ferber* and Massiiliano Vassallo, WesternGeco London Technology Center; Jon-Fredrik Hopperstad and Ali Özbek, Schluberger Cabridge Research

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

Leveraging Relevance Cues for Improved Spoken Document Retrieval

Leveraging Relevance Cues for Improved Spoken Document Retrieval Leveraging Relevance Cues for Iproved Spoken Docuent Retrieval Pei-Ning Chen 1, Kuan-Yu Chen 2 and Berlin Chen 1 National Taiwan Noral University, Taiwan 1 Institute of Inforation Science, Acadeia Sinica,

More information

A Network-based Seamless Handover Scheme for Multi-homed Devices

A Network-based Seamless Handover Scheme for Multi-homed Devices A Network-based Sealess Handover Schee for Multi-hoed Devices Md. Shohrab Hossain and Mohaed Atiquzzaan School of Coputer Science, University of Oklahoa, Noran, OK 7319 Eail: {shohrab, atiq}@ou.edu Abstract

More information

Modal Masses Estimation in OMA by a Consecutive Mass Change Method.

Modal Masses Estimation in OMA by a Consecutive Mass Change Method. Modal Masses Estiation in OMA by a Consecutive Mass Change Method. F. Pelayo University of Oviedo, Departent of Construction and Manufacturing Engineering, Gijón, Spain M. López-Aenlle University of Oviedo,

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Genetic-Based EM Algorithm for Learning Gaussian Mixture Models

Genetic-Based EM Algorithm for Learning Gaussian Mixture Models 1344 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 27, NO. 8, AUGUST 2005 Genetic-Based EM Algorith for Learning Gaussian Mixture Models Franz Pernkopf, Meber, IEEE, and Djael Bouchaffra,

More information

Hopcount in Application Layer Multicast Schemes

Hopcount in Application Layer Multicast Schemes 1 Hopcount in pplication Layer Multicast Schees Milena Janic, Novi Ineke epaka Wangi, Xiaoing Zhou and Piet Van Mieghe Delft University of Technology Faculty of Electrical Engineering, Matheatics and oputer

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

On combining chase-2 and sum-product algorithms for LDPC codes

On combining chase-2 and sum-product algorithms for LDPC codes University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2012 On combining chase-2 and sum-product algorithms

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm Proble Solving of graph correspondence using Genetics Algorith and ACO Algorith Alireza Rezaee, 1, Azizeh Ajalli 2 Assistant professor,departent of Mechatronics Engineering, Faculty of New Sciences and

More information