-
arXiv:1504.03946 [pdf, ps, other]
An investigation of SUDOKU-inspired non-linear codes with local constraints
Abstract: Codes with local permutation constraints are described. Belief propagation decoding is shown to require the computation of permanents, and trellis-based methods for computing the permanents are introduced. New insights into the asymptotic performance of such codes are presented. A universal encoder for codes with local constraints is introduced, and simulation results for two code structures, SUDO… ▽ More
Submitted 16 April, 2015; v1 submitted 15 April, 2015; originally announced April 2015.
Comments: Accepted for presentation at ISIT 2015
-
Challenges and some new directions in channel coding
Abstract: Three areas of ongoing research in channel coding are surveyed, and recent developments are presented in each area: spatially coupled Low-Density Parity-Check (LDPC) codes, non-binary LDPC codes, and polar coding.
Submitted 15 April, 2015; originally announced April 2015.
Comments: Accepted for publication in the Journal of Communications and Networks, JCN copyright applies
-
Non-binary LDPC decoding using truncated messages in the Walsh-Hadamard domain
Abstract: The Extended Min-Sum (EMS) algorithm for non-binary low-density parity-check (LDPC) defined over an alphabet of size $q$ operates on truncated messages of length $q'$ to achieve a complexity of the order $q'^2$. In contrast, Walsh-Hadamard (WH) transform based iterative decoders achieve a complexity of the order $q\log q$, which is much larger for $q'<<q$. In this paper, we demonstrate that consid… ▽ More
Submitted 20 July, 2014; v1 submitted 16 July, 2014; originally announced July 2014.
Comments: 5 pages, accepted for publication at the International Symposium on Information Theory and its Applications (ISITA 2014), October 2014
-
arXiv:1407.4328 [pdf, ps, other]
Density Evolution for SUDOKU Codes on the Erasure Channel
Abstract: Codes based on SUDOKU puzzles are discussed, and belief propagation decoding introduced for the erasure channel. Despite the non-linearity of the code constraints, it is argued that density evolution can be used to analyse code performance due to the invariance of the code under alphabet permutation. The belief propagation decoder for erasure channels operates by exchanging messages containing set… ▽ More
Submitted 16 July, 2014; originally announced July 2014.
Comments: 5 pages, accepted for publication at the 8th International Symposium on Turbo Codes and Iterative Processing, August 2014
-
The Role Model Estimator Revisited
Abstract: We re-visit the role model strategy introduced in an earlier paper, which allows one to train an estimator for degraded observations by imitating a reference estimator that has access to superior observations. We show that, while it is true and surprising that this strategy yields the optimal Bayesian estimator for the degraded observations, it in fact reduces to a much simpler form in the non-par… ▽ More
Submitted 16 July, 2014; originally announced July 2014.
Comments: 5 pages
Journal ref: Published at the IEEE International Symposium on Information Theory (ISIT 2014)
-
EXIT Chart Approximations using the Role Model Approach
Abstract: Extrinsic Information Transfer (EXIT) functions can be measured by statistical methods if the message alphabet size is moderate or if messages are true a-posteriori distributions. We propose an approximation we call mixed information that constitutes a lower bound for the true EXIT function and can be estimated by statistical methods even when the message alphabet is large and histogram-based appr… ▽ More
Submitted 3 June, 2010; originally announced June 2010.
Comments: 5 pages, 5 figures, to be presented at the IEEE Symposium on Information Theory (ISIT 2010) in Austin, Texas, June 2010
-
arXiv:0809.1300 [pdf, ps, other]
What makes a good role model
Abstract: The role model strategy is introduced as a method for designing an estimator by approaching the output of a superior estimator that has better input observations. This strategy is shown to yield the optimal Bayesian estimator when a Markov condition is fulfilled. Two examples involving simple channels are given to illustrate its use. The strategy is combined with time averaging to construct a st… ▽ More
Submitted 8 September, 2008; originally announced September 2008.
Comments: This paper is dedicated to Jim Massey on the occasion of his 75th birthday. Submitted to the IEEE Transactions on Information Theory