constructing error correction codes correction codes
play

Constructing Error- -Correction Codes Correction Codes - PowerPoint PPT Presentation

International Workshop on Complex Systems and Networks 2007 Guilin, China Constructing Error- -Correction Codes Correction Codes Constructing Error from Scale- -Free Networks Free Networks from Scale Francis C.M. Lau Francis C.M. Lau


  1. Encoding the Messages � Table look-up is possible for small k � For large k, table look-up may become extremely difficult = ⇒ ≈ × k k 30 � e.g., 100 2 1 . 26 10 Use of Generator Matrix T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 32 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  2. Generator Matrix G (size k x n ) n -tuple n -tuple n -tuple a basis set of k linearly independent n -tuples that spans the subspace = m m m L [ ] message m k 1 2 U = mG (size 1 x n ) codeword T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 33 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  3. 34 ] IWCSN' 2007, Guilin, China 6 u 5 u 4 u 3 u (6, 3) Code Example 2 u 1 u U NIVERSITY NIVERSITY [ = OLYTECHNIC U P OLYTECHNIC K ONG ONG ONG K H ONG HE H T HE P T

  4. Parity-Check Matrix H (size ( n - k ) x n ) For each generator matrix G , there exists an ( n - k ) x n matrix H such that rows of G are orthogonal to rows of H . GH = T G ↔ 0 H k x ( n - k ) all-zeros matrix = = T T UH mGH 0 H can be used to test whether a received vector is a valid codeword. T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 35 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  5. Parity-Check Matrix H (size ( n - k ) x n ) rows are ⎡ ⎤ 1 0 0 1 0 1 orthogonal ⎢ ⎥ = 0 1 0 1 1 0 H ⎢ ⎥ ⎢ ⎥ 0 0 1 0 1 1 ⎣ ⎦ GH = T 0 T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 36 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  6. Parity-Check Matrix H ⎡ ⎤ 1 0 0 ⎢ ⎥ 0 1 0 ⎢ ⎥ ⎢ ⎥ 0 0 1 = ⇒ = T u u u u u u ⎢ ⎥ [ ] UH 0 0 1 2 3 4 5 6 1 1 0 ⎢ ⎥ ⎢ ⎥ 0 1 1 ⎢ ⎥ ⎢ ⎥ ⎣ ⎦ 1 0 1 + + = u u u 0 1 4 6 ⇒ + + = u u u 0 2 4 5 + + = u u u 0 3 5 6 T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 37 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  7. ⎡ ⎤ 1 0 0 1 0 1 ⎢ ⎥ Bipartite Graph = 0 1 0 1 1 0 H ⎢ ⎥ ⎢ ⎥ ⎣ 0 0 1 0 1 1 ⎦ u 1 = + + = c u u u u ( 0 ) 1 1 4 6 2 u variable 3 = + + = c u u u ( 0 ) nodes 2 2 4 5 u 4 = + + = c u u u ( 0 ) u 3 3 5 6 5 check nodes u 6 T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 38 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  8. Decoding Additive White received Codeword U Gaussian vector r ’ 0 � +1 volt Noise Channel 1 � − 1 volt T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 39 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  9. Eight codewords in a 6-tuple space decoded codeword after error correction Hard r i > 0 volt � 0 after making hard Decoding r i < 0 volt � 1 decision on each bit received vector r ’ (AWGN channel) T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 40 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  10. Soft Decoding U = P ( 101110 | ' ) r maximum a posteriori (MAP) decision rule: Select codeword U that has U = P ( 110100 | ' ) r P the largest ( | ' ) U r r ’ U = U = P P ( 011101 | ' ) ( 101001 | ' ) r r a posteriori probability (APP) T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 41 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  11. Performance of Some Well- known Block Codes (Coherent BPSK over an AWGN channel) t = maximum number of guaranteed correctable errors per codeword T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 42 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  12. Performance of BCH Codes (Coherent BPSK over an AWGN channel) T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 43 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  13. Part 3: Low- -Density Density- -Parity Parity- - Part 3: Low Check (LDPC) Codes Check (LDPC) Codes T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 44 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  14. Parity-Check Matrix H (size ( n - k ) x n ) ⎡ ⎤ 1 0 0 1 0 1 ⎢ ⎥ = 0 1 0 1 1 0 H ⎢ ⎥ ⎢ ⎥ ⎣ 0 0 1 0 1 1 ⎦ GH = T 0 T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 45 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  15. Low-Density-Parity-Check Codes � proposed by Gallager (1960) � parity-check matrix H � sparse (most elements are zeros) � fraction of 1’s ~ O ( n ) � elements of H determine the connections between variable nodes degree of check and check nodes degree of variable node c 3 = 3 node u 6 = 2 T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 46 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  16. Low-Density-Parity-Check Codes � sparse (low-density) parity-check matrix H implies that all variable nodes and check nodes have very few connections G ↔ H T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 47 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  17. Error rates achieved by different coding schemes under the binary AWGN channel. Codeword length = 10 6 . Rate =0.5. T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 48 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  18. Types of LDPC Codes � Regular LDPC � all nodes of the same type (variable node or check node) have the same degree A (3, 6)-regular LDPC code of length 10 and rate one-half. variable check node node degree degree T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 49 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  19. Types of LDPC Codes � Irregular LDPC: the degrees of each set of nodes are chosen according to some distribution T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 50 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  20. Degree Distribution of Nodes � Degree distribution of variable nodes d maximum variable node degree v ∑ − λ = λ k x k x 1 ( ) = k 2 fraction of edges connected to the variable nodes with degree k � Degree distribution of check nodes d maximum check node degree c ∑ − ρ = ρ k x k x 1 ( ) = k 2 fraction of edges connected to the check nodes with degree k T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 51 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  21. Code Rate 1 ∫ ρ x x ( ) d = − R 0 1 1 ∫ λ x x ( ) d 0 T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 52 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  22. Question Given specific d d v ∑ c ∑ − λ = λ − k ρ = ρ k x k x 1 x k x 1 ( ) and . ( ) = = k k 2 2 How would the LDPC code perform? T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 53 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  23. Answer Dependent on the actual design (connections), the channel type, e.g. AWGN, binary symmetric channel (BSC), binary erasure channel (BEC) and the decoding algorithm. T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 54 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  24. More Question Any idea on the optimal performance of practical LDPC decoders? T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 55 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  25. Belief Propagation (BP) Decoding Part 4: Belief Propagation (BP) Decoding Part 4: Algorithm Algorithm T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 56 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  26. Belief Propagation (BP) Decoding Algorithm � A kind of message-passing decoding algorithm � Applicable to both regular and irregular LDPC codes � Produces very good error performance T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 57 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  27. Belief Propagation (BP) Decoding Algorithm variable � Define Log Likelihood nodes Ratio (LLR): ⎡ ⎤ = P ( bit 0 | info) log P ⎢ ⎥ = ⎣ ⎦ ( bit 1 | info) check nodes T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 58 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  28. BP Decoding 0 r LLR ( ) 1 r Algorithm 1 � Compute initial Log Likelihood Ratio (LLR) for each variable node iteration number based on the received signal vector r (real number elements) ⎡ ⎤ = P r ( bit 0 | ) r i log ⎢ ⎥ i = P r ⎣ ( bit 1 | ) ⎦ i T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 59 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  29. BP Decoding 0 r LLR ( ) 1 Algorithm � Set iteration number k = 1 � Pass the LLR messages from variable nodes to the connected check nodes T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 60 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  30. BP Decoding Algorithm � Check nodes received the LLR messages from the connected variable nodes T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 61 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  31. BP Decoding Algorithm � Each check node computes a message for each of its connected variable nodes, based on the messages from all other variables nodes T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 62 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  32. BP Decoding Algorithm � Each check node computes a message for each of its connected variable nodes, based on the messages from all other variables nodes T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 63 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  33. BP Decoding Algorithm � Each check node computes a message for each of its connected variable nodes, based on the messages from all other variables nodes T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 64 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  34. BP Decoding Algorithm � Each check node computes a message for each of its connected variable nodes, based on the messages from all other variables nodes T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 65 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  35. BP Decoding Algorithm � Each check node computes a message for each of its connected variable nodes, based on the messages from all other variables nodes T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 66 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  36. BP Decoding Algorithm � Each check node computes a message for each of its connected variable nodes, based on the messages from all other variables nodes T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 67 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  37. r → r BP Decoding LLR ( ) LLR ( ) 0 1 1 1 Algorithm � Each variable node update its LLR based on the messages passed from the check nodes and the initial LLR � Based on the updated LLR, estimate the codeword T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 68 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  38. r → r BP Decoding LLR ( ) LLR ( ) 0 1 1 1 Algorithm � Estimate the codeword as [ ] = c c c ˆ ˆ ˆ L ˆ c n 1 2 > ⎧ ⎫ r 0 if LLR ( ) 0 = k where 1 c ⎨ ⎬ ˆ i < r ⎩ 1 if LLR ( ) 0 ⎭ k 1 = � If T ˆ ˆ , is the c c H 0 decoded codeword. T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 69 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  39. 0 r BP Decoding LLR ( ) 1 Algorithm ≠ � If T ˆ , increment the c H 0 iteration number k . � Each variable node computes a message for each of its connected check nodes, based on its initial LLR and the messages from all other connected check nodes T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 70 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  40. 0 r BP Decoding LLR ( ) 1 Algorithm � Each variable node computes a message for each of its connected check nodes, based on its initial LLR and the messages from all other connected check nodes T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 71 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  41. 0 r BP Decoding LLR ( ) 1 Algorithm � Each variable node computes a message for each of its connected check nodes, based on its initial LLR and the messages from all other connected check nodes T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 72 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  42. BP Decoding Algorithm � Check nodes received the LLR messages from the connected variable nodes T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 73 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  43. BP Decoding Algorithm � Each check node computes a message for each of its connected variable nodes, based on the messages from all other variables nodes � Same iterative process repeated …. until convergence to a valid codeword or maximum number of iterations exceeded T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 74 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  44. Capacity (Threshold) of LDPC codes Given the degree distributions d d c ∑ v ∑ − − λ = λ ρ = ρ k k x k x 1 x k x 1 ( ) ( ) = = k k 2 2 and the channel type (AWGN, BSC or BEC) and the use of BP decoding algorithm. Richard and Urbanke (2001) proposed an effective algorithm – density evolution – to determine the capacity (threshold) of LDPC codes. T. J. Richardson and R. Urbanke, “The capacity of low-density parity-check codes under message- passing decoding,” IEEE Trans. Inform. Theory , vol. 47, pp. 599–618, Feb. 2001. T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 75 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  45. Density Evolution Algorithm iterations d v ∑ − λ = λ k x k x 1 ( ) = k 2 Density d c ∑ threshold − ρ = ρ k x k x 1 ( ) Evolution σ * value = k 2 Algorithm channel type a higher threshold value indicates a higher achievable performance of the code achievable T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 76 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  46. Good Degree Distribution Pairs (Rate = 0.5) T. J. Richardson et al., “Design of capacity-approaching irregular low-density parity-check codes,” IEEE Trans. Inform. Theory , vol. 47, pp. 619–637, Feb.2001. T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 77 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  47. Good Degree Distribution Pairs (Rate = 0.5) T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 78 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  48. Density Evolution Algorithm � the threshold value , for example indicates the σ * maximum noise power that can be tolerated for error-free communication in AWGN channels � the threshold value can be achieved σ achieved if * � the message-passing process does not contain any cycles � number of iterations tends to infinity � codeword length is infinite � codeword length is infinite T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 79 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  49. Density Evolution Algorithm � Problems: � optimizing the codes based on DE algorithm is not a d d simple task v c ∑ ∑ − − λ = λ ρ = ρ k k x k x 1 x k x 1 ( ) ( ) = = k k 2 2 � codeword length cannot be infinite � optimizing the threshold value may vary to maximize the threshold value give a more complex code � number of connections T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 80 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  50. Part 5: Review of Complex Networks Part 5: Review of Complex Networks T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 81 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  51. Basic properties � Path length : the distance between two nodes, which is defined as the number of edges along the shortest path connecting them T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 82 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  52. Basic properties � Betweenness centrality : the fraction of shortest paths going through a given node � Assortative mixing : preference of high-degree nodes attach to other high-degree nodes � Disassortative mixing : preference of high- degree nodes attach to low-degree nodes T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 83 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  53. Examples of Complex Networks � Random Networks � Given a network with N nodes. Each pair of nodes are connected with a probability of p . Poisson distribution = p 0.1 ER μ − μ k e = p k ( ) k ! μ = T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 84 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  54. Examples of Complex Networks � Regular Coupled Networks 1 � high clustering � large average path 0.8 length 0.6 P(k) 0.4 � Fully-connected 0.2 Networks 0 2 2.5 3 3.5 4 4.5 <k> T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 85 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  55. Examples of Complex Networks = p 0 WS � Small-World Networks � Each edge of a regular coupled network is re-wired with a probability of p � high clustering = p 0.2 WS � small average path length T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 86 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  56. Examples of Complex Networks � Scale-Free Networks T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 87 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  57. Examples of Complex Networks � Scale-Free (SF) Networks − γ − γ n n f x x Pr( ) ~ ( ) ~ i i T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 88 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  58. Characteristics of Typical Complex Networks Average Distance Degree Clustering Distribution Coefficient Ο N Random Networks Short Poisson Low (log( )) Ο Regular Coupled Long N Uniform High ( ) Network Ο N Fast to disseminate Small World Short (log( )) - High information Networks Scale Free Very Short Power-Law - Ο N (log(log( )))* Networks *The exponent parameter should be valued between 2 and 3. See reference “ Scale-Free Networks Are Ultrasmall ”, PRL, vol. 90, no. 5 T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 89 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  59. Part 6: Scale- -free Networks to free Networks to Part 6: Scale LDPC Codes LDPC Codes T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 90 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  60. Scale-free Networks meet LDPC Codes Can the “very short distance” property of scale-free network helps passing/spreading messages quickly in the decoding of LDPC codes? If so, how? T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 91 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  61. Scale-free Networks meet LDPC Codes ? ? T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 92 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  62. From Bipartite Graph to Unipartite Graph T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 93 P P OLYTECHNIC OLYTECHNIC U U NIVERSITY NIVERSITY

  63. From Bipartite Graph to Unipartite Graph power-law degree distribution Power-law degree distribution ! T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 94 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  64. Typical node degree distribution of the corresponding unipartite graph. Codeword length = 10000 and maximum variable node degree = 20. X. Zheng, F.C.M. Lau and C.K. Tse, " Study of LDPC Codes Built on Scale-Free Networks," Proceedings, NOLTA'06, Bologna, Italy, September 2006, pp. 563-566. T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 95 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  65. Building LDPC Codes From SF Networks � Assume that the variable nodes have the power-law k γ − P k degree distribution and the check nodes ( ) ~ λ obey the Poisson-law degree distribution − μ μ l e = P l ( ) ρ l ! � Use the (Density Evolution) DE to select the γ μ . optimized parameters and T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 96 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  66. [1] σ Threshold value and average variable node degrees < k > of LDPC codes built * from scale-free networks and the optimized ones reported in [1] for an AWGN channel. Rate equals 0.5. [1] T. J. Richardson et al., “Design of capacity-approaching irregular low-density parity-check codes,” IEEE Trans. Inform. Theory , vol. 47, pp. 619–637, Feb.2001. T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 97 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  67. Typical node degree distribution of the corresponding unipartite graph. Codeword length = 1000 and maximum variable node degree = 15. X. Zheng, F.C.M. Lau and C.K. Tse, “Error Performance of Short-Block-Length LDPC Code Built on Scale-Free Networks,” Proceedings, The Third Shanghai International Symposium on Nonlinear Sciences and Applications , Shanghai, China, June 2007, pp. 55-57. T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 98 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  68. Building LDPC Codes From SF Networks σ � Threshold values lower compared with those * reported in the literature � Average variable node degrees < k > lower compared with those reported in the literature Which one is better in practice ? T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 99 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

  69. Threshold Value � The threshold value can be achieved σ * achieved if � the message-passing process does not contain any cycles and � number of iterations tends to infinity and � codeword length is infinite � codeword length is infinite T HE HE H H ONG ONG K K ONG T ONG IWCSN' 2007, Guilin, China 100 P OLYTECHNIC P OLYTECHNIC U U NIVERSITY NIVERSITY

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend