您当前所在位置: 首页 > 学者
在线提示

恭喜!关注成功

在线提示

确认取消关注该学者?

邀请同行关闭

只需输入对方姓名和电子邮箱,就可以邀请你的同行加入中国科技论文在线。

真实姓名:

电子邮件:

尊敬的

我诚挚的邀请你加入中国科技论文在线,点击

链接,进入网站进行注册。

添加个性化留言

已为您找到该学者7条结果 成果回收站

上传时间

2010年07月16日

【期刊论文】On the Minimal Interpolation Problem and Decoding RSCodes

马啸, Xiao Ma and Xin-mei Wang, Member, IEEE

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL.46, NO.4, JULY 2000,-0001,():

-1年11月30日

摘要

Some properties of the minimal interpolation problemare investigated, from which a simple proof of the validity of theWelch-Berlekamp algorithm is presented. A new key equation is derived,which is closely related to the classical key equation of syndrome-decodingalgorithm and can be solved by the Welch–Berlekamp algorithm.

上传时间

2010年07月16日

【期刊论文】Binary Intersymbol Interference Channels: GallagerCodes, Density Evolution, and CodePerformance Bounds

马啸, Aleksandar Kavcic, Member, IEEE, Xiao Ma, and Michael Mitzenmacher

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL.49, NO.7, JULY 2003,-0001,():

-1年11月30日

摘要

We study the limits of performance of Gallager codes(low-density parity-check (LDPC) codes) over binary linear intersymbolinterference (ISI) channels with additive white Gaussiannoise (AWGN). Using the graph representations of the channel,the code, and the sum-product message-passing detector/decoder,we prove two error concentration theorems. Our proofs expandon previous work by handling complications introduced by thechannel memory. We circumvent these problems by consideringnot just linear Gallager codes but also their cosets and by distinguishingbetween different types of message flow neighborhoodsdepending on the actual transmitted symbols. We compute thenoise tolerance threshold using a suitably developed densityevolution algorithm and verify, by simulation, that the thresholdsrepresent accurate predictions of the performance of the iterativesum-product algorithm for finite (but large) block lengths. Wealso demonstrate that for high rates, the thresholds are very closeto the theoretical limit of performance for Gallager codes overISI channels. If C denotes the capacity of a binary ISI channeland if Ci i d denotes the maximal achievable mutual informationrate when the channel inputs are independent and identicallydistributed (i.i.d.) binary random variables (Ci i d C), weprove that the maximum information rate achievable by thesum-product decoder of a Gallager (coset) code is upper-boundedby Ci i d . The last topic investigated is the performance limit ofthe decoder if the trellis portion of the sum-product algorithm isexecuted only once; this demonstrates the potential for tradingoff the computational requirements and the performance of thedecoder.

上传时间

2010年07月16日

【期刊论文】Iterative Detection/Decoding for Two-TrackPartial Response Channels

马啸, Xiao Ma and Li Ping, Member, IEEE

IEEE COMMUNICATIONS LETTERS, VOL.8, NO.7, JULY 2004,-0001,():

-1年11月30日

摘要

In this letter, we investigate the iterative detection/decoding algorithms for two-track partial response channels.We first describe the iterative algorithm as an iterative message-passing/processing algorithm over a high-level normal graphand then propose two trellis-based detection algorithms. Thenatural one is based on a joint trellis, which can be implementedfor low-order channels. For moderate-order channels, we proposea separated detection, which is based on two single-track trellises.Compared with the joint detection, the separated detection issimpler in most cases. Simulation results show that, for two-trackEPR4 channels with minor intertrack interferences, the separateddetection causes only marginal degradation in performance.

上传时间

2010年07月16日

【期刊论文】Matched Information Rate Codes forPartial Response Channels

马啸, Aleksandar Kavcic, Xiao Ma and Nedeljko Varnica

,-0001,():

-1年11月30日

摘要

In this paper we design capacity-approaching codes for partial response channels. The codesare constructed as concatenations of inner trellis codes and outer low-density parity-check (LDPC)codes. Unlike previous constructions of trellis codes for partial response channels, we disregardany algebraic properties (e.g., the minimum distance or the run-length limit) in our design of thetrellis code. Our design is purely probabilistic in that we construct the inner trellis code to mimicthe transition probabilities of a Markov process that achieves a high (capacity-approaching) informationrate. Hence, we name it a matched information rate (MIR) design. We provide a set of5 design rules for constructions of capacity-approaching MIR inner trellis codes. We optimizethe outer LDPC code using density evolution tools specially modified to fit the superchannelconsisting of the inner MIR trellis code concatenated with the partial response channel. Usingthis strategy, we design degree sequences of irregular LDPC codes whose noise tolerance thresholdsare only fractions of a decibel away from the capacity. Examples of code constructions areshown for channels both with and without spectral nulls.

上传时间

2010年07月16日

【期刊论文】Path Partitions and Forward-Only TrellisAlgorithms

马啸, Xiao Ma and Aleksandar Kavcic, Member, IEEE

,-0001,():

-1年11月30日

摘要

This is a semi-tutorial paper on trellis-based algorithms.We argue that most decoding/detection algorithms describedon trellises can be formulated as path-partitioning algorithms,with proper definitions of mappings from subsets of pathsto metrics of subsets. Thereby, the only two operations neededare path-concatenation and path-collection, which play the roles ofmultiplication and addition, respectively. Furthermore, we showthat the trellis structure permits the path-partitioning algorithmsto be formulated as forward-only algorithms (with structures resemblingthe Viterbi algorithm), thus eliminating the need forbackward computations regardless of what task needs to be performedon the trellis. While all of the actual decoding/detectionalgorithms presented here are rederivations of variations of previouslyknown methods, we believe that the exposition of the algorithmsin a unified manner as forward-only path-partitioningalgorithms is the most intuitive manner in which to generalize theViterbi algorithm. We also believe that this approach may in factinfluence the practical implementation of the algorithms as well asinfluence the construction of other forward-only algorithms (e.g.,byte-wise forward-only detection algorithms).

合作学者

  • 马啸 邀请

    中山大学,广东

    尚未开通主页