Short-length Low-density Parity-check Codes: Construction and Decoding Algorithms (2015)
Efficient Decoding Techniques for LDPC Codes
Efficient decoding techniques for LDPC codes are in demand, since these codes are included in many standards nowadays. Although the theoretical performance of LDPC codes is impressive, their practical implementation leads to problems like numerical inaccuracy, limited memory resources, etc. We investigate methods that are suited to reduce the decoding complexity while still keeping the loss in performance small. We aim to reduce the complexity using three approaches: simplification of the component decoders, restricting the message passing algorithm to binary variables and combining the LDPC decoder with other receiver tasks like demapping or multi-user detection. For the simplification of the component decoders, we analyze the min-sum algorithm and derive a theoretical framework which is used to explain previous heuristic approaches to improve the performance of this algorithm. Using this framework, we are able to modify the algorithm in order to ...
Lechner, G. — Vienna University of Technology
Factor Graph Based Detection Schemes for Mobile Terrestrial DVB Systems with Long OFDM Blocks
This PhD dissertation analyzes the performance of second generation digital video broadcasting (DVB) systems in mobile terrestrial environments and proposes an iterative detection algorithm based on factor graphs (FG) to reduce the distortion caused by the time variation of the channel, providing error-free communication in very severe mobile conditions. The research work focuses on mobile scenarios where the intercarrier interference (ICI) is very high: high vehicular speeds when long orthogonal frequency-division multiplexing (OFDM) blocks are used. As a starting point, we provide the theoretical background on the main topics behind the transmission and reception of terrestrial digital television signals in mobile environments, long with a general overview of the main signal processing techniques included in last generation terrestrial DVB systems. The proposed FG-based detector design is then assessed over a simpli ed bit-interleaved coded modulation (BICM)-OFDM communication scheme for a ...
Ochandiano, Pello — University of Mondragon
This dissertation presents a general method and eight algebraic methods for constructing high performance and efficiently encodable non-binary quasi-cyclic LDPC codes based on arrays of special circulant permutation matrices. Two design techniques, array masking and array dispersion, for constructing both regular and irregular LDPC codes with desired specifications are also proposed. Codes constructed based on these methods perform very well over the AWGN channel and flat fading channels. With iterative decoding using a Fast Fourier Transform based sum-product algorithm, they achieve significantly large coding gains over Reed-Solomon codes of the same lengths and rates decoded with either algebraic hard-decision Berlekamp- Massey algorithm or algebraic soft-decision K¨otter-Vardy algorithm. Also presented is a class of asymptotically optimal LDPC codes for correcting bursts of erasures. Due to their quasi-cyclic structure, these non-binary LDPC codes can be encoded using simple shift-registers with linear complexity. ...
Zhou, Bo — University of California, Davis
Adaptive Signal Processing for Power Line Communications
This thesis represents a significant part of the research activity conducted during the PhD program in Information Technologies, supported by Selta S.p.A, Cadeo, Italy, focused on the analysis and design of a Power Line Communications (PLC) system. In recent times the PLC technologies have been considered for integration in Smart Grids architectures, as they are used to exploit the existing power line infrastructure for information transmission purposes on low, medium and high voltage lines. The characterization of a reliable PLC system is a current object of research as well as it is the design of modems for communications over the power lines. In this thesis, the focus is on the analysis of a full-duplex PLC modem for communication over high-voltage lines, and, in particular, on the design of the echo canceller device and innovative channel coding schemes. The first part ...
Tripodi, Carlo — Università degli Studi di Parma
Decentralized Estimation Under Communication Constraints
In this thesis, we consider the problem of decentralized estimation under communication constraints in the context of Collaborative Signal and Information Processing. Motivated by sensor network applications, a high volume of data collected at distinct locations and possibly in diverse modalities together with the spatially distributed nature and the resource limitations of the underlying system are of concern. Designing processing schemes which match the constraints imposed by the system while providing a reasonable accuracy has been a major challenge in which we are particularly interested in the tradeoff between the estimation performance and the utilization of communications subject to energy and bandwidth constraints. One remarkable approach for decentralized inference in sensor networks is to exploit graphical models together with message passing algorithms. In this framework, after the so-called information graph of the problem is constructed, it is mapped onto the ...
Uney, Murat — Middle East Technical University
Design and applications of Filterbank structures implementing Reed-Solomon codes
In nowadays communication systems, error correction provides robust data transmission through imperfect (noisy) channels. Error correcting codes are a crucial component in most storage and communication systems – wired or wireless –, e.g. GSM, UMTS, xDSL, CD/DVD. At least as important as the data integrity issue is the recent realization that error correcting codes fundamentally change the trade-offs in system design. High-integrity, low redundancy coding can be applied to increase data rate, or battery life time or by reducing hardware costs, making it possible to enter mass market. When it comes to the design of error correcting codes and their properties, there are two main theories that play an important role in this work. Classical coding theory aims at finding the best code given an available block length. This thesis focuses on the ubiquitous Reed-Solomon codes, one of the major ...
Van Meerbergen, Geert — Katholieke Universiteit Leuven
In a communication system it results undoubtedly of great interest to compress the information generated by the data sources to its most elementary representation, so that the amount of power necessary for reliable communications can be reduced. It is often the case that the redundancy shown by a wide variety of information sources can be modelled by taking into account the probabilistic dependance among consecutive source symbols rather than the probabilistic distribution of a single symbol. These sources are commonly referred to as single or multiterminal sources "with memory" being the memory, in this latter case, the existing temporal correlation among the consecutive symbol vectors generated by the multiterminal source. It is well known that, when the source has memory, the average amount of information per source symbol is given by the entropy rate, which is lower than its entropy ...
Del Ser, Javier — University of Navarra (TECNUN)
Iterative Multi-User Receivers for CDMA Systems
Mobile communication networks of the third and future generations are designed to offer high-data rate services like video-telephony and data-transfer. The current Rake receiver architecture will create a shortage in available bandwidth offered to the users. This is not due to a shortage in spectrum but results from inefficient receiver architectures. Spectral efficiency can be increased considerably through multi-user detection techniques in the receiver algorithms. The present thesis investigates iterative re- ceivers for encoded CDMA transmission in the uplink. The iterative receiver is a suboptimal receiver algorithm with manageable complexity. It consists of an inter- ference mitigating multi-user detector, a bank of single-user decoders, and a channel estimator. Instead of deciding on the transmitted symbols right after the first decod- ing, the receiver feeds back tentative decision symbols to mitigate multiple-access interference in the next iteration. Similarly, soft decision symbols ...
Wehinger, J. — Vienna University of Technology
Distributed Memory Reduction Operations in Presence of Process Desynchronization
Despite decades of exponential growth in computational power, humans continue to find new problems that eclipse available computational resources. This unrelenting pursuit for computational power has brought about supercomputers consisting of millions of individual computing units. Writing programs that would efficiently utilize the computational power of such complex machines has turned out to be a major challenge. As of today, most \ac{HPC} applications continue to be based on the distributed memory programming paradigm, through the use of \ac{MPI}. One of the principal drivers behind the research in this dissertation was the coupling of multi-scale and multi-physics iPIC3D space weather simulation with in-situ raytraced visualization for real-time simulation steering. This application was developed by the Leuven Intel ExaScale Lab as a research prototype for the type of HPC applications projected to run on exascale machines of the 2018-2020 timeframe. Due to ...
Marendic, Petar — Vrije Universiteit Brussel
Polar Coding for the Wiretap Broadcast Channel
In the next era of communications, where heterogeneous, asynchronous and ultra-low latency networks are drawn on the horizon, classical cryptography might be inadequate due to the excessive cost of maintaining a public-key infrastructure and the high computational capacity required in the devices. Moreover, it is becoming increasingly difficult to guarantee that the computational capacity of adversaries would not be able to break the cryptograms. Consequently, information-theoretic security, and particularly its application to keyless secrecy communication, might play an important role in the future development of these systems. The notion of secrecy in this case does not rely on any assumption of the computational power of eavesdroppers, and is based instead on guaranteeing statistical independence between the information message and the observed cryptogram. This is possible by constructing channel codes that exploit the noisy behavior of the channels involved in the ...
del Olmo Alòs, Jaume — Universitat Politècnica de Catalunya
Robust Network Topology Inference and Processing of Graph Signals
The abundance of large and heterogeneous systems is rendering contemporary data more pervasive, intricate, and with a non-regular structure. With classical techniques facing troubles to deal with the irregular (non-Euclidean) domain where the signals are defined, a popular approach at the heart of graph signal processing (GSP) is to: (i) represent the underlying support via a graph and (ii) exploit the topology of this graph to process the signals at hand. In addition to the irregular structure of the signals, another critical limitation is that the observed data is prone to the presence of perturbations, which, in the context of GSP, may affect not only the observed signals but also the topology of the supporting graph. Ignoring the presence of perturbations, along with the couplings between the errors in the signal and the errors in their support, can drastically hinder ...
Rey, Samuel — King Juan Carlos University
Low-Complexity Iterative Detection Algorithms for Multi-Antenna Systems
Multiple input multiple output (MIMO) techniques have been widely employed by dif- ferent wireless systems with many advantages. By using multiple antennas, the system is able to transmit multiple data streams simultaneously and within the same frequency band. The methods known as spatial multiplexing (SM) and spatial diversity (SD) im- proves the high spectral efficiency and link reliability of wireless communication systems without requiring additional transmitting power. By introducing channel coding in the transmission procedure, the information redundancy is introduced to further improve the reliability of SM links and the quality of service for the next generation communication systems. However, the throughput performance of these systems is limited by interference. A number of different interference suppression techniques have been reported in the literature. Theses techniques can be generally categorised into two aspects: the preprocessing techniques at the transmitter side and ...
Peng Li — University of York
Wireless Network Localization via Cooperation
This dissertation details two classes of cooperative localization methods for wireless networks in mixed line-of-sight and non-line-of-sight (LOS/NLOS) environments. The classes of methods depend on the amount of prior knowledge available. The methods used for both classes are based on the assumptions in practical localization environments that neither NLOS identification nor experimental campaigns are affordable. Two major contributions are, first, in methods that provide satisfactory localization accuracy whilst relaxing the requirement on statistical knowledge about the measurement model. Second, in methods that provide significantly improved localization performance without the requirement of good initialization. In the first half of the dissertation, cooperative localization using received signal strength (RSS) measurements in homogeneous mixed LOS/NLOS environments is considered for the case where the key model parameter, the path loss exponent, is unknown. The approach taken is to model the positions and the path ...
Jin, Di — Signal Processing Group, Technische Universität Darmstadt
Randomized Space-Time Block Coding for the Multiple-Relay Channel
In the last decade, cooperation among multiple terminals has been seen as one of the more promising strategies to improve transmission speed in wireless communications networks. Basically, the idea is to mimic an antenna array and apply distributed versions of well-known space-diversity techniques. In this context, the simplest cooperative scheme is the relay channel: all the terminals (relays) that overhear a point-to-point communication between a source and a destination may decide to aid the source by forwarding (relaying) its message. In a mobile system, it is common to assume that the relays do not have any information about the channel between them and the destination. Under this hypothesis, the best solution to exploit the diversity offered by multiple transmitting antennas is to use space-time coding (STC). However, classical STC's are designed for systems with a fixed and usually low number ...
Gregoratti, David — Universitat Politecnica de Catalunya (UPC)
Multiuser demodulation for DS-CDMA systems in fading channels
Multiuser demodulation algorithms for centralized receivers of asynchronous direct-sequence (DS) spread-spectrum code-division multiple-access (CDMA) systems in frequency-selective fading channels are studied. Both DS-CDMA systems with short (one symbol interval) and long (several symbol intervals) spreading sequences are considered. Linear multiuser receivers process ideally the complete received data block. The approximation of ideal infinite memory-length (IIR) linear multiuser detectors by finite memory-length (FIR) detectors is studied. It is shown that the FIR detectors can be made near-far resistant under a given ratio between maximum and minimum received power of users by selecting an appropriate memory-length. Numerical examples demonstrate the fact that moderate memory-lengths of the FIR detectors are sufficient to achieve the performance of the ideal IIR detectors even under severe near-far conditions. Multiuser demodulation in relatively fast fading channels is analyzed. The optimal maximum likelihood sequence detection receiver and suboptimal ...
Juntti, Markku — University of Oulou
The current layout is optimized for mobile phones. Page previews, thumbnails, and full abstracts will remain hidden until the browser window grows in width.
The current layout is optimized for tablet devices. Page previews and some thumbnails will remain hidden until the browser window grows in width.