A novel low-complexity weighted symbol-flipping algorithm with flipping patterns to decode nonbinary low-density parity-check codes is proposed. The proposed decoding procedure updates the hard-decision received symbo...A novel low-complexity weighted symbol-flipping algorithm with flipping patterns to decode nonbinary low-density parity-check codes is proposed. The proposed decoding procedure updates the hard-decision received symbol vector iteratively in search of a valid codeword in the symbol vector space. Only one symbol is flipped in each iteration, and symbol flipping function, which is employed as the symbol flipping metric, combines the number of failed checks and the reliabilities of the received bits and calculated symbols. A scheme to avoid infinite loops and select one symbol to flip in high order Galois field search is also proposed. The design of flipping pattern's order and depth, which is dependent of the computational requirement and error performance, is also proposed and exemplified. Simulation results show that the algorithm achieves an appealing tradeoff between performance and computational requirement over relatively low Galois field for short to medium code length.展开更多
Dan Brown's best-seller, The Da Vinci Code is a classical union of thriller and intelligence, and he has a good command of the knowledge on cryptology, mathematics, religion, culture and art. In addition, he organ...Dan Brown's best-seller, The Da Vinci Code is a classical union of thriller and intelligence, and he has a good command of the knowledge on cryptology, mathematics, religion, culture and art. In addition, he organized his work fully with a large amount of information the public concerned and well-arranged them into the wonderful story.The protagonists of the book, Robert Langdon, the symbologist from Harvard and Sophie Neveu, the decode expert (The curator's granddaughter) have to solve the complicated secret by gradually investigating the strange codes and meet a series of dangerous situations. They find that what they're looking for may be a shocking secret while they solve the codes progressively during the fierce struggle with the mystery manipulator. The secret is the Holy Grail, which the Church tends to hide forever because it will destroy the faith.Therefore, this thesis will analyze the symbolic significance of Holy Grail in the book and the arguments on it against the author's viewpoint by observing related religious figures, religious phenomenon and religious organizations.展开更多
A hybrid decoding algorithm is proposed for nonbinary low-density parity-check(LDPC)codes,which combines the weighted symbol-flipping(WSF)algorithm with the fast Fourier transform q-ary sum-product algorithm(FFT-QSPA)...A hybrid decoding algorithm is proposed for nonbinary low-density parity-check(LDPC)codes,which combines the weighted symbol-flipping(WSF)algorithm with the fast Fourier transform q-ary sum-product algorithm(FFT-QSPA).The flipped position and value are determined by the symbol flipping metric and the received bit values in the first stage WSF algorithm.If the lowcomplexity WSF algorithm is failed,the second stage FFT-QSPA is activated as a switching strategy.Simulation results show that the proposed hybrid algorithm greatly reduces the computational complexity with the performance close to that of FFT-QSPA.展开更多
Symbolic analysis has many applications in the design of analog circuits. Existing approaches rely on two forms of symbolic-expression representation: expanded sum-of-product form and arbitrarily nested form. Expanded...Symbolic analysis has many applications in the design of analog circuits. Existing approaches rely on two forms of symbolic-expression representation: expanded sum-of-product form and arbitrarily nested form. Expanded form suffers the problem that the number of product terms grows exponentially with the size of a circuit. Nested form is neither canonical nor amenable to symbolic manipulation. In this paper, we present a new approach to exact and canonical symbolic analysis by exploiting the sparsity and sharing of product terms. This algorithm, called totally coded method (TCM), consists of representing the symbolic determinant of a circuit matrix by code series and performing symbolic analysis by code manipulation. We describe an efficient code-ordering heuristic and prove that it is optimum for ladder-structured circuits. For practical analog circuits, TCM not only covers all advantages of the algorithm via determinant decision diagrams (DDD) but is more simple and efficient than DDD method.展开更多
Vertical layered space-time codes have demonstrated the enormous potential to accommodate rapid flow data. Thus far, vertical layered space-time codes assumed that perfect estimates of current channel fading condition...Vertical layered space-time codes have demonstrated the enormous potential to accommodate rapid flow data. Thus far, vertical layered space-time codes assumed that perfect estimates of current channel fading conditions are available at the receiver. However, increasing the number of transmit antennas increases the required training interval and reduces the available time in which data may be transmitted before the fading coefficients change. In this paper, a vertical layered space-time code is proposed. By applying the subspace method to the layered space-time code, the symbols can be detected without training symbols and channel estimates at the transmitter or the receiver. Monte Carlo simulations show that performance can approach that of the detection method with the knowledge of the channel.展开更多
The simplified joint channel estimation and symbol detection based on the EM (expectation-maximization) algorithm for space-time block code (STBC) are proposed. By assuming channel to be invariant within only one STBC...The simplified joint channel estimation and symbol detection based on the EM (expectation-maximization) algorithm for space-time block code (STBC) are proposed. By assuming channel to be invariant within only one STBC word and utilizing the orthogonal structure of STBC, the computational complexity and cost of this algorithm are both very low, so it is very suitable to implementation in real systems.展开更多
In order to obtain coding gain along with diversity gain,rotation code was applied to cooperative diversity employing decoded-and-forward cooperative protocol.Different from the same two symbols transmitted in convent...In order to obtain coding gain along with diversity gain,rotation code was applied to cooperative diversity employing decoded-and-forward cooperative protocol.Different from the same two symbols transmitted in conventional repetition-coded scheme,two different symbols were transmitted separately in two successive timeslots in the proposed rotation-coded cooperative diversity.In this way,constellation spread in the available two-dimensional signal space rather than on a single-dimensional line in repetition-coded scheme,which was supposed to be responsible for the additional coding gain.Under the proposed cooperative transmission model,upper bounds for the symbol-error-rate(SER)of cooperative diversity based on repetition code and rotation code were derived respectively.Both analytical and simulated results show that cooperative diversity based on rotation code can obtain an improved coding gain(by about 2 dB)than repetition-coded scheme without the expense of power or bandwidth.展开更多
Code Component Reuse Supporting Environment (CCRSE), which has been developed by us, is an integrated development environment. CCRSE can provide comprehensive supports for the whole process of reusing code component i...Code Component Reuse Supporting Environment (CCRSE), which has been developed by us, is an integrated development environment. CCRSE can provide comprehensive supports for the whole process of reusing code component in the manner of dynamic composition. The architecture and functionality of CCRSE are introduced. The key achievement is giving the three strategies that are vital to successfully design CCRSE. The three strategies include: (1) according to the three pivotal technologies (encapsulation, composition and management) for supporting composition reuse of code component, design three tools respectively. (2) keep tool for supporting code component development independent of tool for supporting code component composition. (3) strictly restrict code component specification, provide the strong plug and play support for code component composition reuse, and furthest provide transparence to strictly restricted specification of code component in development of component itself.展开更多
In this paper, we discuss a class of piecewise linear hyperbolic maps on the 2-torus. These maps arise in the second-order digital fdter with two' s complement arithmetic. By introducing codings underlying the map op...In this paper, we discuss a class of piecewise linear hyperbolic maps on the 2-torus. These maps arise in the second-order digital fdter with two' s complement arithmetic. By introducing codings underlying the map operations, we give some admissibility conditions for symbolic sequences and find some periodic properties of these symbolic sequences. Then we use these conditions to check the admissibility of periodic symbol sequences.展开更多
A novel Variable-Length Code (VLC), called Alternate VLC (AVLC), is proposed in this letter, which employs two types of VLC to encode source symbols alternately. Its advantage is that it can not only stop the symbol e...A novel Variable-Length Code (VLC), called Alternate VLC (AVLC), is proposed in this letter, which employs two types of VLC to encode source symbols alternately. Its advantage is that it can not only stop the symbol error propagation effect, but also correct symbol insertion errors and avoid symbol deletion er-rors, so the original sequence number of symbols can be kept correctly, which is very important in video com-munication.展开更多
An approximately optimal adaptive arithmetic coding (AC) system using a forbidden symbol (FS) over noisy channels was proposed which allows one to jointly and adaptively design the source decoding and channel correcti...An approximately optimal adaptive arithmetic coding (AC) system using a forbidden symbol (FS) over noisy channels was proposed which allows one to jointly and adaptively design the source decoding and channel correcting in a single process, with superior performance compared with traditional separated techniques. The concept of adaptiveness is applied not only to the source model but also to the amount of coding redundancy. In addition, an improved branch metric computing algorithm and a faster sequential searching algorithm compared with the system proposed by Grangetto were proposed. The proposed system is tested in the case of image transmission over the AWGN channel, and compared with traditional separated system in terms of packet error rate and complexity. Both hard and soft decoding were taken into account.展开更多
A novel joint source channel distortion model was proposed, which can essentially estimate the average distortion in progressive image transmission. To improve the precision of the model, the redundancy generated by a...A novel joint source channel distortion model was proposed, which can essentially estimate the average distortion in progressive image transmission. To improve the precision of the model, the redundancy generated by a forbidden symbol in the arithmetic codes is used to distinguish the quantization distortion and the channel distortion, all the coefficients from the first error one to the end of the sequence are set to be a value within the variance range of the coefficients instead of zero, then the error propagation coming from the entropy coding can be essentially estimated, which is disregarded in the most conventional joint source channel coding (JSCC) systems. The precision of the model in terms of average peak-signal-to-noise has been improved about 0.5 dB compared to classical works. An efficient unequal error protection system based on the model is developed, and can be used in the wireless communication systems.展开更多
A phase-domain blind estimator of symbol duration based on Haar wavelet transform(HWT) is proposed.It can estimate the symbol duration of phase modulated signals,such as M-ary phase-shift keying(MPSK) signals and ...A phase-domain blind estimator of symbol duration based on Haar wavelet transform(HWT) is proposed.It can estimate the symbol duration of phase modulated signals,such as M-ary phase-shift keying(MPSK) signals and polyphase coded signals.The closed form of the spectrum of HWT is derived.Theoretical analysis shows the frequency of the first spectral peak is equal to the symbol rate,which is the reciprocal of symbol duration.Thus the symbol duration can be extracted from the spectrum.Subsequently,the optimum wavelet scale is determined according to the maximum output signal to noise ratio(OSNR) criterion.MAT-LAB simulations show that this algorithm can blindly estimate the symbol duration without any prior knowledge.This estimator need not estimate the carrier frequency and has the characteristics of low computation complexity and high accuracy.展开更多
Bit-Interleaved Coded Modulation with Iterative Decoding (BICM-ID) is a bandwidth ef- ficient transmission, where the bit error rate is reduced through the iterative information exchange between the inner demapper and...Bit-Interleaved Coded Modulation with Iterative Decoding (BICM-ID) is a bandwidth ef- ficient transmission, where the bit error rate is reduced through the iterative information exchange between the inner demapper and the outer decoder. The choice of the symbol mapping is the crucial design parameter. This paper indicates that the Harmonic Mean of the Minimum Squared Euclidean (HMMSE) distance is the best criterion for the mapping design. Based on the design criterion of the HMMSE distance, a new search algorithm to find the optimized labeling maps for BICM-ID system is proposed. Numerical results and performance comparison show that the new labeling search method has a low complexity and outperforms other labeling schemes using other design criterion in BICM-ID system, therefore it is an optimized labeling method.展开更多
Based on mirror-blocks,a totally coded algorithm(TCA) for switched-current(SI) network analysis in frequency domain is presented.The algorithm is simple,available,and suitable for any switched-current networks.A basis...Based on mirror-blocks,a totally coded algorithm(TCA) for switched-current(SI) network analysis in frequency domain is presented.The algorithm is simple,available,and suitable for any switched-current networks.A basis of analysis and design for switched-current networks via this algorithm is provided.展开更多
文摘A novel low-complexity weighted symbol-flipping algorithm with flipping patterns to decode nonbinary low-density parity-check codes is proposed. The proposed decoding procedure updates the hard-decision received symbol vector iteratively in search of a valid codeword in the symbol vector space. Only one symbol is flipped in each iteration, and symbol flipping function, which is employed as the symbol flipping metric, combines the number of failed checks and the reliabilities of the received bits and calculated symbols. A scheme to avoid infinite loops and select one symbol to flip in high order Galois field search is also proposed. The design of flipping pattern's order and depth, which is dependent of the computational requirement and error performance, is also proposed and exemplified. Simulation results show that the algorithm achieves an appealing tradeoff between performance and computational requirement over relatively low Galois field for short to medium code length.
文摘Dan Brown's best-seller, The Da Vinci Code is a classical union of thriller and intelligence, and he has a good command of the knowledge on cryptology, mathematics, religion, culture and art. In addition, he organized his work fully with a large amount of information the public concerned and well-arranged them into the wonderful story.The protagonists of the book, Robert Langdon, the symbologist from Harvard and Sophie Neveu, the decode expert (The curator's granddaughter) have to solve the complicated secret by gradually investigating the strange codes and meet a series of dangerous situations. They find that what they're looking for may be a shocking secret while they solve the codes progressively during the fierce struggle with the mystery manipulator. The secret is the Holy Grail, which the Church tends to hide forever because it will destroy the faith.Therefore, this thesis will analyze the symbolic significance of Holy Grail in the book and the arguments on it against the author's viewpoint by observing related religious figures, religious phenomenon and religious organizations.
基金Supported by the National High Technology Research and Development Programme of China(No.2009AAJ128,2009AAJ208,2010AA7010422)
文摘A hybrid decoding algorithm is proposed for nonbinary low-density parity-check(LDPC)codes,which combines the weighted symbol-flipping(WSF)algorithm with the fast Fourier transform q-ary sum-product algorithm(FFT-QSPA).The flipped position and value are determined by the symbol flipping metric and the received bit values in the first stage WSF algorithm.If the lowcomplexity WSF algorithm is failed,the second stage FFT-QSPA is activated as a switching strategy.Simulation results show that the proposed hybrid algorithm greatly reduces the computational complexity with the performance close to that of FFT-QSPA.
文摘Symbolic analysis has many applications in the design of analog circuits. Existing approaches rely on two forms of symbolic-expression representation: expanded sum-of-product form and arbitrarily nested form. Expanded form suffers the problem that the number of product terms grows exponentially with the size of a circuit. Nested form is neither canonical nor amenable to symbolic manipulation. In this paper, we present a new approach to exact and canonical symbolic analysis by exploiting the sparsity and sharing of product terms. This algorithm, called totally coded method (TCM), consists of representing the symbolic determinant of a circuit matrix by code series and performing symbolic analysis by code manipulation. We describe an efficient code-ordering heuristic and prove that it is optimum for ladder-structured circuits. For practical analog circuits, TCM not only covers all advantages of the algorithm via determinant decision diagrams (DDD) but is more simple and efficient than DDD method.
基金Partially supported by the National Natural Sciences Foundation (No.69872029) and the Research Fund for Doctoral Program of Higher Education (No.1999069808) of China
文摘Vertical layered space-time codes have demonstrated the enormous potential to accommodate rapid flow data. Thus far, vertical layered space-time codes assumed that perfect estimates of current channel fading conditions are available at the receiver. However, increasing the number of transmit antennas increases the required training interval and reduces the available time in which data may be transmitted before the fading coefficients change. In this paper, a vertical layered space-time code is proposed. By applying the subspace method to the layered space-time code, the symbols can be detected without training symbols and channel estimates at the transmitter or the receiver. Monte Carlo simulations show that performance can approach that of the detection method with the knowledge of the channel.
基金This project was supported by the National Natural Science Foundation of China (60272079).
文摘The simplified joint channel estimation and symbol detection based on the EM (expectation-maximization) algorithm for space-time block code (STBC) are proposed. By assuming channel to be invariant within only one STBC word and utilizing the orthogonal structure of STBC, the computational complexity and cost of this algorithm are both very low, so it is very suitable to implementation in real systems.
基金Project(2006AA01Z270)supported by the National High Technology Research and Development Program of ChinaProject(U0635003)supported by the National Natural Science Foundation of Guangdong Province,ChinaProject(2007F07)supported by the National Science Foundation of Shaanxi Province,China
文摘In order to obtain coding gain along with diversity gain,rotation code was applied to cooperative diversity employing decoded-and-forward cooperative protocol.Different from the same two symbols transmitted in conventional repetition-coded scheme,two different symbols were transmitted separately in two successive timeslots in the proposed rotation-coded cooperative diversity.In this way,constellation spread in the available two-dimensional signal space rather than on a single-dimensional line in repetition-coded scheme,which was supposed to be responsible for the additional coding gain.Under the proposed cooperative transmission model,upper bounds for the symbol-error-rate(SER)of cooperative diversity based on repetition code and rotation code were derived respectively.Both analytical and simulated results show that cooperative diversity based on rotation code can obtain an improved coding gain(by about 2 dB)than repetition-coded scheme without the expense of power or bandwidth.
基金key Project of Science and Technology of Ministry of Education of China(99188)
文摘Code Component Reuse Supporting Environment (CCRSE), which has been developed by us, is an integrated development environment. CCRSE can provide comprehensive supports for the whole process of reusing code component in the manner of dynamic composition. The architecture and functionality of CCRSE are introduced. The key achievement is giving the three strategies that are vital to successfully design CCRSE. The three strategies include: (1) according to the three pivotal technologies (encapsulation, composition and management) for supporting composition reuse of code component, design three tools respectively. (2) keep tool for supporting code component development independent of tool for supporting code component composition. (3) strictly restrict code component specification, provide the strong plug and play support for code component composition reuse, and furthest provide transparence to strictly restricted specification of code component in development of component itself.
基金Project supported by National Natural Science Foundation of Chi-na (Grant No .10471087) ,and Shanghai Municipal Commission ofEducation (Grant No .03AK33)
文摘In this paper, we discuss a class of piecewise linear hyperbolic maps on the 2-torus. These maps arise in the second-order digital fdter with two' s complement arithmetic. By introducing codings underlying the map operations, we give some admissibility conditions for symbolic sequences and find some periodic properties of these symbolic sequences. Then we use these conditions to check the admissibility of periodic symbol sequences.
文摘A novel Variable-Length Code (VLC), called Alternate VLC (AVLC), is proposed in this letter, which employs two types of VLC to encode source symbols alternately. Its advantage is that it can not only stop the symbol error propagation effect, but also correct symbol insertion errors and avoid symbol deletion er-rors, so the original sequence number of symbols can be kept correctly, which is very important in video com-munication.
文摘An approximately optimal adaptive arithmetic coding (AC) system using a forbidden symbol (FS) over noisy channels was proposed which allows one to jointly and adaptively design the source decoding and channel correcting in a single process, with superior performance compared with traditional separated techniques. The concept of adaptiveness is applied not only to the source model but also to the amount of coding redundancy. In addition, an improved branch metric computing algorithm and a faster sequential searching algorithm compared with the system proposed by Grangetto were proposed. The proposed system is tested in the case of image transmission over the AWGN channel, and compared with traditional separated system in terms of packet error rate and complexity. Both hard and soft decoding were taken into account.
基金The National Natural Science Foundation of China (No. 60202006)
文摘A novel joint source channel distortion model was proposed, which can essentially estimate the average distortion in progressive image transmission. To improve the precision of the model, the redundancy generated by a forbidden symbol in the arithmetic codes is used to distinguish the quantization distortion and the channel distortion, all the coefficients from the first error one to the end of the sequence are set to be a value within the variance range of the coefficients instead of zero, then the error propagation coming from the entropy coding can be essentially estimated, which is disregarded in the most conventional joint source channel coding (JSCC) systems. The precision of the model in terms of average peak-signal-to-noise has been improved about 0.5 dB compared to classical works. An efficient unequal error protection system based on the model is developed, and can be used in the wireless communication systems.
基金supported by the Postdoctoral Science Foundation of China (20080441050)
文摘A phase-domain blind estimator of symbol duration based on Haar wavelet transform(HWT) is proposed.It can estimate the symbol duration of phase modulated signals,such as M-ary phase-shift keying(MPSK) signals and polyphase coded signals.The closed form of the spectrum of HWT is derived.Theoretical analysis shows the frequency of the first spectral peak is equal to the symbol rate,which is the reciprocal of symbol duration.Thus the symbol duration can be extracted from the spectrum.Subsequently,the optimum wavelet scale is determined according to the maximum output signal to noise ratio(OSNR) criterion.MAT-LAB simulations show that this algorithm can blindly estimate the symbol duration without any prior knowledge.This estimator need not estimate the carrier frequency and has the characteristics of low computation complexity and high accuracy.
基金Supported by the National Natural Science Foundation of China (No.60472104).
文摘Bit-Interleaved Coded Modulation with Iterative Decoding (BICM-ID) is a bandwidth ef- ficient transmission, where the bit error rate is reduced through the iterative information exchange between the inner demapper and the outer decoder. The choice of the symbol mapping is the crucial design parameter. This paper indicates that the Harmonic Mean of the Minimum Squared Euclidean (HMMSE) distance is the best criterion for the mapping design. Based on the design criterion of the HMMSE distance, a new search algorithm to find the optimized labeling maps for BICM-ID system is proposed. Numerical results and performance comparison show that the new labeling search method has a low complexity and outperforms other labeling schemes using other design criterion in BICM-ID system, therefore it is an optimized labeling method.
文摘Based on mirror-blocks,a totally coded algorithm(TCA) for switched-current(SI) network analysis in frequency domain is presented.The algorithm is simple,available,and suitable for any switched-current networks.A basis of analysis and design for switched-current networks via this algorithm is provided.