-
Speeding up 6-DoF Grasp Sampling with Quality-Diversity
Authors:
Johann Huber,
François Hélénon,
Mathilde Kappel,
Elie Chelly,
Mahdi Khoramshahi,
Faïz Ben Amar,
Stéphane Doncieux
Abstract:
Recent advances in AI have led to significant results in robotic learning, including natural language-conditioned planning and efficient optimization of controllers using generative models. However, the interaction data remains the bottleneck for generalization. Getting data for grasping is a critical challenge, as this skill is required to complete many manipulation tasks. Quality-Diversity (QD)…
▽ More
Recent advances in AI have led to significant results in robotic learning, including natural language-conditioned planning and efficient optimization of controllers using generative models. However, the interaction data remains the bottleneck for generalization. Getting data for grasping is a critical challenge, as this skill is required to complete many manipulation tasks. Quality-Diversity (QD) algorithms optimize a set of solutions to get diverse, high-performing solutions to a given problem. This paper investigates how QD can be combined with priors to speed up the generation of diverse grasps poses in simulation compared to standard 6-DoF grasp sampling schemes. Experiments conducted on 4 grippers with 2-to-5 fingers on standard objects show that QD outperforms commonly used methods by a large margin. Further experiments show that QD optimization automatically finds some efficient priors that are usually hard coded. The deployment of generated grasps on a 2-finger gripper and an Allegro hand shows that the diversity produced maintains sim-to-real transferability. We believe these results to be a significant step toward the generation of large datasets that can lead to robust and generalizing robotic grasping policies.
△ Less
Submitted 10 March, 2024;
originally announced March 2024.
-
Reconstruction for Sparse View Tomography of Long Objects Applied to Imaging in the Wood Industry
Authors:
Buda Bajić,
Johannes A. J. Huber,
Benedikt Neyses,
Linus Olofsson,
Ozan Öktem
Abstract:
In the wood industry, logs are commonly quality screened by discrete X-ray scans on a moving conveyor belt from a few source positions. Typically, two-dimensional (2D) slice-wise measurements are obtained by a sequential scanning geometry. Each 2D slice alone does not carry sufficient information for a three-dimensional tomographic reconstruction in which biological features of interest in the log…
▽ More
In the wood industry, logs are commonly quality screened by discrete X-ray scans on a moving conveyor belt from a few source positions. Typically, two-dimensional (2D) slice-wise measurements are obtained by a sequential scanning geometry. Each 2D slice alone does not carry sufficient information for a three-dimensional tomographic reconstruction in which biological features of interest in the log are well preserved. In the present work, we propose a learned iterative reconstruction method based on the Learned Primal-Dual neural network, suited for sequential scanning geometries. Our method accumulates information between neighbouring slices, instead of only accounting for single slices during reconstruction. Our quantitative and qualitative evaluations with as few as five source positions show that our method yields reconstructions of logs that are sufficiently accurate to identify biological features like knots (branches), heartwood and sapwood.
△ Less
Submitted 5 March, 2024;
originally announced March 2024.
-
Transfer Learning to Detect COVID-19 Coughs with Incremental Addition of Patient Coughs to Healthy People's Cough Detection Models
Authors:
Sudip Vhaduri,
Seungyeon Paik,
Jessica E Huber
Abstract:
Millions of people have died worldwide from COVID-19. In addition to its high death toll, COVID-19 has led to unbearable suffering for individuals and a huge global burden to the healthcare sector. Therefore, researchers have been trying to develop tools to detect symptoms of this human-transmissible disease remotely to control its rapid spread. Coughing is one of the common symptoms that research…
▽ More
Millions of people have died worldwide from COVID-19. In addition to its high death toll, COVID-19 has led to unbearable suffering for individuals and a huge global burden to the healthcare sector. Therefore, researchers have been trying to develop tools to detect symptoms of this human-transmissible disease remotely to control its rapid spread. Coughing is one of the common symptoms that researchers have been trying to detect objectively from smartphone microphone-sensing. While most of the approaches to detect and track cough symptoms rely on machine learning models developed from a large amount of patient data, this is not possible at the early stage of an outbreak. In this work, we present an incremental transfer learning approach that leverages the relationship between healthy peoples' coughs and COVID-19 patients' coughs to detect COVID-19 coughs with reasonable accuracy using a pre-trained healthy cough detection model and a relatively small set of patient coughs, reducing the need for large patient dataset to train the model. This type of model can be a game changer in detecting the onset of a novel respiratory virus.
△ Less
Submitted 11 November, 2023;
originally announced November 2023.
-
Domain Randomization for Sim2real Transfer of Automatically Generated Grasping Datasets
Authors:
Johann Huber,
François Hélénon,
Hippolyte Watrelot,
Faiz Ben Amar,
Stéphane Doncieux
Abstract:
Robotic grasping refers to making a robotic system pick an object by applying forces and torques on its surface. Many recent studies use data-driven approaches to address grasping, but the sparse reward nature of this task made the learning process challenging to bootstrap. To avoid constraining the operational space, an increasing number of works propose grasping datasets to learn from. But most…
▽ More
Robotic grasping refers to making a robotic system pick an object by applying forces and torques on its surface. Many recent studies use data-driven approaches to address grasping, but the sparse reward nature of this task made the learning process challenging to bootstrap. To avoid constraining the operational space, an increasing number of works propose grasping datasets to learn from. But most of them are limited to simulations. The present paper investigates how automatically generated grasps can be exploited in the real world. More than 7000 reach-and-grasp trajectories have been generated with Quality-Diversity (QD) methods on 3 different arms and grippers, including parallel fingers and a dexterous hand, and tested in the real world. Conducted analysis on the collected measure shows correlations between several Domain Randomization-based quality criteria and sim-to-real transferability. Key challenges regarding the reality gap for grasping have been identified, stressing matters on which researchers on grasping should focus in the future. A QD approach has finally been proposed for making grasps more robust to domain randomization, resulting in a transfer ratio of 84% on the Franka Research 3 arm.
△ Less
Submitted 6 October, 2023;
originally announced October 2023.
-
Toward a Plug-and-Play Vision-Based Grasping Module for Robotics
Authors:
François Hélénon,
Johann Huber,
Faïz Ben Amar,
Stéphane Doncieux
Abstract:
Despite recent advancements in AI for robotics, grasping remains a partially solved challenge, hindered by the lack of benchmarks and reproducibility constraints. This paper introduces a vision-based grasping framework that can easily be transferred across multiple manipulators. Leveraging Quality-Diversity (QD) algorithms, the framework generates diverse repertoires of open-loop grasping trajecto…
▽ More
Despite recent advancements in AI for robotics, grasping remains a partially solved challenge, hindered by the lack of benchmarks and reproducibility constraints. This paper introduces a vision-based grasping framework that can easily be transferred across multiple manipulators. Leveraging Quality-Diversity (QD) algorithms, the framework generates diverse repertoires of open-loop grasping trajectories, enhancing adaptability while maintaining a diversity of grasps. This framework addresses two main issues: the lack of an off-the-shelf vision module for detecting object pose and the generalization of QD trajectories to the whole robot operational space. The proposed solution combines multiple vision modules for 6DoF object detection and tracking while rigidly transforming QD-generated trajectories into the object frame. Experiments on a Franka Research 3 arm and a UR5 arm with a SIH Schunk hand demonstrate comparable performance when the real scene aligns with the simulation used for grasp generation. This work represents a significant stride toward building a reliable vision-based grasping module transferable to new platforms, while being adaptable to diverse scenarios without further training iterations.
△ Less
Submitted 12 March, 2024; v1 submitted 6 October, 2023;
originally announced October 2023.
-
Quality Diversity under Sparse Reward and Sparse Interaction: Application to Grasping in Robotics
Authors:
J. Huber,
F. Hélénon,
M. Coninx,
F. Ben Amar,
S. Doncieux
Abstract:
Quality-Diversity (QD) methods are algorithms that aim to generate a set of diverse and high-performing solutions to a given problem. Originally developed for evolutionary robotics, most QD studies are conducted on a limited set of domains - mainly applied to locomotion, where the fitness and the behavior signal are dense. Grasping is a crucial task for manipulation in robotics. Despite the effort…
▽ More
Quality-Diversity (QD) methods are algorithms that aim to generate a set of diverse and high-performing solutions to a given problem. Originally developed for evolutionary robotics, most QD studies are conducted on a limited set of domains - mainly applied to locomotion, where the fitness and the behavior signal are dense. Grasping is a crucial task for manipulation in robotics. Despite the efforts of many research communities, this task is yet to be solved. Grasping cumulates unprecedented challenges in QD literature: it suffers from reward sparsity, behavioral sparsity, and behavior space misalignment. The present work studies how QD can address grasping. Experiments have been conducted on 15 different methods on 10 grasping domains, corresponding to 2 different robot-gripper setups and 5 standard objects. An evaluation framework that distinguishes the evaluation of an algorithm from its internal components has also been proposed for a fair comparison. The obtained results show that MAP-Elites variants that select successful solutions in priority outperform all the compared methods on the studied metrics by a large margin. We also found experimental evidence that sparse interaction can lead to deceptive novelty. To our knowledge, the ability to efficiently produce examples of grasping trajectories demonstrated in this work has no precedent in the literature.
△ Less
Submitted 31 October, 2023; v1 submitted 10 August, 2023;
originally announced August 2023.
-
E2R: a Hierarchical-Learning inspired Novelty-Search method to generate diverse repertoires of grasping trajectories
Authors:
Johann Huber,
Oumar Sane,
Alex Coninx,
Faiz Ben Amar,
Stephane Doncieux
Abstract:
Robotics grasping refers to the task of making a robotic system pick an object by applying forces and torques on its surface. Despite the recent advances in data-driven approaches, grasping remains an unsolved problem. Most of the works on this task are relying on priors and heavy constraints to avoid the exploration problem. Novelty Search (NS) refers to evolutionary algorithms that replace selec…
▽ More
Robotics grasping refers to the task of making a robotic system pick an object by applying forces and torques on its surface. Despite the recent advances in data-driven approaches, grasping remains an unsolved problem. Most of the works on this task are relying on priors and heavy constraints to avoid the exploration problem. Novelty Search (NS) refers to evolutionary algorithms that replace selection of best performing individuals with selection of the most novel ones. Such methods have already shown promising results on hard exploration problems. In this work, we introduce a new NS-based method that can generate large datasets of grasping trajectories in a platform-agnostic manner. Inspired by the hierarchical learning paradigm, our method decouples approach and prehension to make the behavioral space smoother. Experiments conducted on 3 different robot-gripper setups and on several standard objects shows that our method outperforms state-of-the-art for generating diverse repertoire of grasping trajectories, getting a higher successful run ratio, as well as a better diversity for both approach and prehension. Some of the generated solutions have been successfully deployed on a real robot, showing the exploitability of the obtained repertoires.
△ Less
Submitted 17 April, 2024; v1 submitted 14 October, 2022;
originally announced October 2022.
-
MIMICause: Representation and automatic extraction of causal relation types from clinical notes
Authors:
Vivek Khetan,
Md Imbesat Hassan Rizvi,
Jessica Huber,
Paige Bartusiak,
Bogdan Sacaleanu,
Andrew Fano
Abstract:
Understanding causal narratives communicated in clinical notes can help make strides towards personalized healthcare. Extracted causal information from clinical notes can be combined with structured EHR data such as patients' demographics, diagnoses, and medications. This will enhance healthcare providers' ability to identify aspects of a patient's story communicated in the clinical notes and help…
▽ More
Understanding causal narratives communicated in clinical notes can help make strides towards personalized healthcare. Extracted causal information from clinical notes can be combined with structured EHR data such as patients' demographics, diagnoses, and medications. This will enhance healthcare providers' ability to identify aspects of a patient's story communicated in the clinical notes and help make more informed decisions.
In this work, we propose annotation guidelines, develop an annotated corpus and provide baseline scores to identify types and direction of causal relations between a pair of biomedical concepts in clinical notes; communicated implicitly or explicitly, identified either in a single sentence or across multiple sentences.
We annotate a total of 2714 de-identified examples sampled from the 2018 n2c2 shared task dataset and train four different language model based architectures. Annotation based on our guidelines achieved a high inter-annotator agreement i.e. Fleiss' kappa ($κ$) score of 0.72, and our model for identification of causal relations achieved a macro F1 score of 0.56 on the test data. The high inter-annotator agreement for clinical text shows the quality of our annotation guidelines while the provided baseline F1 score sets the direction for future research towards understanding narratives in clinical texts.
△ Less
Submitted 13 March, 2022; v1 submitted 13 October, 2021;
originally announced October 2021.
-
A Case Study of LLVM-Based Analysis for Optimizing SIMD Code Generation
Authors:
Joseph Huber,
Weile Wei,
Giorgis Georgakoudis,
Johannes Doerfert,
Oscar Hernandez
Abstract:
This paper presents a methodology for using LLVM-based tools to tune the DCA++ (dynamical clusterapproximation) application that targets the new ARM A64FX processor. The goal is to describethe changes required for the new architecture and generate efficient single instruction/multiple data(SIMD) instructions that target the new Scalable Vector Extension instruction set. During manualtuning, the au…
▽ More
This paper presents a methodology for using LLVM-based tools to tune the DCA++ (dynamical clusterapproximation) application that targets the new ARM A64FX processor. The goal is to describethe changes required for the new architecture and generate efficient single instruction/multiple data(SIMD) instructions that target the new Scalable Vector Extension instruction set. During manualtuning, the authors used the LLVM tools to improve code parallelization by using OpenMP SIMD,refactored the code and applied transformation that enabled SIMD optimizations, and ensured thatthe correct libraries were used to achieve optimal performance. By applying these code changes, codespeed was increased by 1.98X and 78 GFlops were achieved on the A64FX processor. The authorsaim to automatize parts of the efforts in the OpenMP Advisor tool, which is built on top of existingand newly introduced LLVM tooling.
△ Less
Submitted 27 June, 2021;
originally announced June 2021.
-
Comparison of Windowed-Decoder Configurations for Spatially Coupled LDPC Codes Under Equal-Complexity Constraints
Authors:
Janik Frenzel,
Stefan Müller-Weinfurtner,
Johannes Huber,
Ralf Müller
Abstract:
Spatially Coupled Low-Density Parity-Check (SC-LDPC) codes offer excellent decoding performance and can be elegantly decoded with a Windowed Decoder (WD). We determine an efficient WD configuration with low control overhead. For fair comparisons, we normalize all configurations to the same maximal computational complexity, which is an important measure of the decoding effort in packet-based data c…
▽ More
Spatially Coupled Low-Density Parity-Check (SC-LDPC) codes offer excellent decoding performance and can be elegantly decoded with a Windowed Decoder (WD). We determine an efficient WD configuration with low control overhead. For fair comparisons, we normalize all configurations to the same maximal computational complexity, which is an important measure of the decoding effort in packet-based data communication systems. We determine an optimized configuration from a joint evaluation of the window size, the window update strategy, and parity check-based Early Termination (ET). Firstly, we use a variable node-centered update strategy, which omits updates of messages in some parts of the decoding window. With the complexity normalization, the window size can be increased compared to a check node-centered update strategy, which uniformly updates all messages in the decoding window. Secondly, we only require the satisfaction of the top-most parity-check equations in each window to move to the next position more quickly. Using a surprisingly large window size, the resulting WD halves the average decoding complexity of the block decoder while maintaining a rather small gap in the decoding performance.
△ Less
Submitted 27 April, 2020;
originally announced April 2020.
-
ReMASC: Realistic Replay Attack Corpus for Voice Controlled Systems
Authors:
Yuan Gong,
Jian Yang,
Jacob Huber,
Mitchell MacKnight,
Christian Poellabauer
Abstract:
This paper introduces a new database of voice recordings with the goal of supporting research on vulnerabilities and protection of voice-controlled systems (VCSs). In contrast to prior efforts, the proposed database contains both genuine voice commands and replayed recordings of such commands, collected in realistic VCSs usage scenarios and using modern voice assistant development kits. Specifical…
▽ More
This paper introduces a new database of voice recordings with the goal of supporting research on vulnerabilities and protection of voice-controlled systems (VCSs). In contrast to prior efforts, the proposed database contains both genuine voice commands and replayed recordings of such commands, collected in realistic VCSs usage scenarios and using modern voice assistant development kits. Specifically, the database contains recordings from four systems (each with a different microphone array) in a variety of environmental conditions with different forms of background noise and relative positions between speaker and device. To the best of our knowledge, this is the first publicly available database that has been specifically designed for the protection of state-of-the-art voice-controlled systems against various replay attacks in various conditions and environments.
△ Less
Submitted 2 July, 2019; v1 submitted 6 April, 2019;
originally announced April 2019.
-
Phase Shift Keying on the Hypersphere: Peak Power-Efficient MIMO Communications
Authors:
Christoph Rachinger,
Ralf R. Müller,
Johannes B. Huber
Abstract:
Phase Shift Keying on the Hypersphere (PSKH), a generalization of conventional Phase Shift Keying (PSK) for Multiple-Input Multiple-Output (MIMO) systems, is introduced. In PSKH, constellation points are distributed on a multidimensional hypersphere. The use of such constellations with a Peak-To-Average-Sum-Power-Ratio (PASPR) of 1 allows to use load-modulated transmitters which can cope with a sm…
▽ More
Phase Shift Keying on the Hypersphere (PSKH), a generalization of conventional Phase Shift Keying (PSK) for Multiple-Input Multiple-Output (MIMO) systems, is introduced. In PSKH, constellation points are distributed on a multidimensional hypersphere. The use of such constellations with a Peak-To-Average-Sum-Power-Ratio (PASPR) of 1 allows to use load-modulated transmitters which can cope with a small backoff, which in turn results in a high power efficiency. In this paper, we discuss several methods how to generate PSKH constellations and compare their performance. After applying conventional Pulse-Amplitude Modulation (PAM), the PASPR of the continuous time PSKH signal depends on the choice of the pulse shaping method. This choice also influences bandwidth and power efficiency of a PSKH system. In order to reduce the PASPR of the continuous transmission signal, we use spherical interpolation to generate a smooth signal over the hypersphere and present corresponding receiver techniques. Additionally, complexity reduction techniques are proposed and compared. Finally, we discuss the methods presented in this paper regarding their trade-offs with respect to PASPR, bandwidth, power efficiency and receiver complexity.
△ Less
Submitted 20 December, 2016; v1 submitted 3 November, 2016;
originally announced November 2016.
-
Layering of Communication Networks and a Forward-Backward Duality
Authors:
Michael Cyran,
Birgit Schotsch,
Johannes B. Huber,
Robert F. H. Fischer,
Vahid Forutan
Abstract:
In layered communication networks there are only connections between intermediate nodes in adjacent layers. Applying network coding to such networks provides a number of benefits in theory as well as in practice. We propose a "layering procedure" to transform an arbitrary network into a layered structure. Furthermore, we derive a "forward-backward duality" for linear network codes, which can be se…
▽ More
In layered communication networks there are only connections between intermediate nodes in adjacent layers. Applying network coding to such networks provides a number of benefits in theory as well as in practice. We propose a "layering procedure" to transform an arbitrary network into a layered structure. Furthermore, we derive a "forward-backward duality" for linear network codes, which can be seen as an analogon to the "uplink-downlink duality" in MIMO communication systems.
△ Less
Submitted 9 February, 2016;
originally announced February 2016.
-
Towards Log-Linear Logics with Concrete Domains
Authors:
Melisachew Wudage Chekol,
Jakob Huber,
Heiner Stuckenschmidt
Abstract:
We present $\mathcal{MEL}^{++}$ (M denotes Markov logic networks) an extension of the log-linear description logics $\mathcal{EL}^{++}$-LL with concrete domains, nominals, and instances. We use Markov logic networks (MLNs) in order to find the most probable, classified and coherent $\mathcal{EL}^{++}$ ontology from an $\mathcal{MEL}^{++}$ knowledge base. In particular, we develop a novel way to de…
▽ More
We present $\mathcal{MEL}^{++}$ (M denotes Markov logic networks) an extension of the log-linear description logics $\mathcal{EL}^{++}$-LL with concrete domains, nominals, and instances. We use Markov logic networks (MLNs) in order to find the most probable, classified and coherent $\mathcal{EL}^{++}$ ontology from an $\mathcal{MEL}^{++}$ knowledge base. In particular, we develop a novel way to deal with concrete domains (also known as datatypes) by extending MLN's cutting plane inference (CPI) algorithm.
△ Less
Submitted 15 July, 2015; v1 submitted 9 July, 2015;
originally announced July 2015.
-
Error Correction for Differential Linear Network Coding in Slowly-Varying Networks
Authors:
Sven Puchinger,
Michael Cyran,
Robert F. H. Fischer,
Martin Bossert,
Johannes B. Huber
Abstract:
Differential linear network coding (DLNC) is a precoding scheme for information transmission over random linear networks. By using differential encoding and decoding, the conventional approach of lifting, required for inherent channel sounding, can be omitted and in turn higher transmission rates are supported. However, the scheme is sensitive to variations in the network topology. In this paper,…
▽ More
Differential linear network coding (DLNC) is a precoding scheme for information transmission over random linear networks. By using differential encoding and decoding, the conventional approach of lifting, required for inherent channel sounding, can be omitted and in turn higher transmission rates are supported. However, the scheme is sensitive to variations in the network topology. In this paper, we derive an extended DLNC channel model which includes slow network changes. Based on this, we propose and analyze a suitable channel coding scheme matched to the situation at hand using rank-metric convolutional codes.
△ Less
Submitted 28 January, 2015;
originally announced January 2015.
-
LODE: Linking Digital Humanities Content to the Web of Data
Authors:
Jakob Huber,
Timo Sztyler,
Jan Noessner,
Jaimie Murdock,
Colin Allen,
Mathias Niepert
Abstract:
Numerous digital humanities projects maintain their data collections in the form of text, images, and metadata. While data may be stored in many formats, from plain text to XML to relational databases, the use of the resource description framework (RDF) as a standardized representation has gained considerable traction during the last five years. Almost every digital humanities meeting has at least…
▽ More
Numerous digital humanities projects maintain their data collections in the form of text, images, and metadata. While data may be stored in many formats, from plain text to XML to relational databases, the use of the resource description framework (RDF) as a standardized representation has gained considerable traction during the last five years. Almost every digital humanities meeting has at least one session concerned with the topic of digital humanities, RDF, and linked data. While most existing work in linked data has focused on improving algorithms for entity matching, the aim of the LinkedHumanities project is to build digital humanities tools that work "out of the box," enabling their use by humanities scholars, computer scientists, librarians, and information scientists alike. With this paper, we report on the Linked Open Data Enhancer (LODE) framework developed as part of the LinkedHumanities project. With LODE we support non-technical users to enrich a local RDF repository with high-quality data from the Linked Open Data cloud. LODE links and enhances the local RDF repository without compromising the quality of the data. In particular, LODE supports the user in the enhancement and linking process by providing intuitive user-interfaces and by suggesting high-quality linking candidates using tailored matching algorithms. We hope that the LODE framework will be useful to digital humanities scholars complementing other digital humanities tools.
△ Less
Submitted 1 June, 2014;
originally announced June 2014.
-
Low Complexity Decoding for Higher Order Punctured Trellis-Coded Modulation Over Intersymbol Interference Channels
Authors:
Fabian Schuh,
Johannes B. Huber
Abstract:
Trellis-coded modulation (TCM) is a power and bandwidth efficient digital transmission scheme which offers very low structural delay of the data stream. Classical TCM uses a signal constellation of twice the cardinality compared to an uncoded transmission with one bit of redundancy per PAM symbol, i.e., application of codes with rates $\frac{n-1}{n}$ when $2^{n}$ denotes the cardinality of the sig…
▽ More
Trellis-coded modulation (TCM) is a power and bandwidth efficient digital transmission scheme which offers very low structural delay of the data stream. Classical TCM uses a signal constellation of twice the cardinality compared to an uncoded transmission with one bit of redundancy per PAM symbol, i.e., application of codes with rates $\frac{n-1}{n}$ when $2^{n}$ denotes the cardinality of the signal constellation.
Recently published work allows rate adjustment for TCM by means of puncturing the convolutional code (CC) on which a TCM scheme is based on.
In this paper it is shown how punctured TCM-signals transmitted over intersymbol interference (ISI) channels can favorably be decoded. Significant complexity reductions at only minor performance loss can be achieved by means of reduced state sequence estimation.
△ Less
Submitted 27 May, 2014;
originally announced May 2014.
-
On the Design of Fast Convergent LDPC Codes: An Optimization Approach
Authors:
Vahid Jamali,
Yasser Karimian,
Johannes Huber,
Mahmoud Ahmadian
Abstract:
The complexity-performance trade-off is a fundamental aspect of the design of low-density parity-check (LDPC) codes. In this paper, we consider LDPC codes for the binary erasure channel (BEC), use code rate for performance metric, and number of decoding iterations to achieve a certain residual erasure probability for complexity metric. We first propose a quite accurate approximation of the number…
▽ More
The complexity-performance trade-off is a fundamental aspect of the design of low-density parity-check (LDPC) codes. In this paper, we consider LDPC codes for the binary erasure channel (BEC), use code rate for performance metric, and number of decoding iterations to achieve a certain residual erasure probability for complexity metric. We first propose a quite accurate approximation of the number of iterations for the BEC. Moreover, a simple but efficient utility function corresponding to the number of iterations is developed. Using the aforementioned approximation and the utility function, two optimization problems w.r.t. complexity are formulated to find the code degree distributions. We show that both optimization problems are convex. In particular, the problem with the proposed approximation belongs to the class of semi-infinite problems which are computationally challenging to be solved. However, the problem with the proposed utility function falls into the class of semi-definite programming (SDP) and thus, the global solution can be found efficiently using available SDP solvers. Numerical results reveal the superiority of the proposed code design compared to existing code designs from literature.
△ Less
Submitted 17 January, 2014;
originally announced January 2014.
-
An efficient length- and rate-preserving concatenation of polar and repetition codes
Authors:
Mathis Seidl,
Johannes B. Huber
Abstract:
We improve the method in \cite{Seidl:10} for increasing the finite-lengh performance of polar codes by protecting specific, less reliable symbols with simple outer repetition codes. Decoding of the scheme integrates easily in the known successive decoding algorithms for polar codes. Overall rate and block length remain unchanged, the decoding complexity is at most doubled. A comparison to related…
▽ More
We improve the method in \cite{Seidl:10} for increasing the finite-lengh performance of polar codes by protecting specific, less reliable symbols with simple outer repetition codes. Decoding of the scheme integrates easily in the known successive decoding algorithms for polar codes. Overall rate and block length remain unchanged, the decoding complexity is at most doubled. A comparison to related methods for performance improvement of polar codes is drawn.
△ Less
Submitted 10 December, 2013;
originally announced December 2013.
-
Low Complexity Decoding for Punctured Trellis-Coded Modulation Over Intersymbol Interference Channels
Authors:
Fabian Schuh,
Johannes B. Huber
Abstract:
Classical trellis-coded modulation (TCM) as introduced by Ungerboeck in 1976/1983 uses a signal constellation of twice the cardinality compared to an uncoded transmission with one bit of redundancy per PAM symbol, i.e., application of codes with rates $\frac{n-1}{n}$ when $2^{n}$ denotes the cardinality of the signal constellation. The original approach therefore only comprises integer transmissio…
▽ More
Classical trellis-coded modulation (TCM) as introduced by Ungerboeck in 1976/1983 uses a signal constellation of twice the cardinality compared to an uncoded transmission with one bit of redundancy per PAM symbol, i.e., application of codes with rates $\frac{n-1}{n}$ when $2^{n}$ denotes the cardinality of the signal constellation. The original approach therefore only comprises integer transmission rates, i.e., $R=\left\{ 2,\,3,\,4\,\ldots \right\}$, additionally, when transmitting over an intersymbol interference (ISI) channel an optimum decoding scheme would perform equalization and decoding of the channel code jointly. In this paper, we allow rate adjustment for TCM by means of puncturing the convolutional code (CC) on which a TCM scheme is based on. In this case a nontrivial mapping of the output symbols of the CC to signal points results in a time-variant trellis. We propose an efficient technique to integrate an ISI-channel into this trellis and show that the computational complexity can be significantly reduced by means of a reduced state sequence estimation (RSSE) algorithm for time-variant trellises.
△ Less
Submitted 5 December, 2013;
originally announced December 2013.
-
The Automated Mapping of Plans for Plan Recognition
Authors:
Marcus J. Huber,
Edmund H. Durfee,
Michael P. Wellman
Abstract:
To coordinate with other agents in its environment, an agent needs models of what the other agents are trying to do. When communication is impossible or expensive, this information must be acquired indirectly via plan recognition. Typical approaches to plan recognition start with a specification of the possible plans the other agents may be following, and develop special techniques for discrimin…
▽ More
To coordinate with other agents in its environment, an agent needs models of what the other agents are trying to do. When communication is impossible or expensive, this information must be acquired indirectly via plan recognition. Typical approaches to plan recognition start with a specification of the possible plans the other agents may be following, and develop special techniques for discriminating among the possibilities. Perhaps more desirable would be a uniform procedure for mapping plans to general structures supporting inference based on uncertain and incomplete observations. In this paper, we describe a set of methods for converting plans represented in a flexible procedural language to observation models represented as probabilistic belief networks.
△ Less
Submitted 27 February, 2013;
originally announced February 2013.
-
Polar-Coded Modulaton
Authors:
Mathis Seidl,
Andreas Schenk,
Clemens Stierstorfer,
Johannes B. Huber
Abstract:
A framework is proposed that allows for a joint description and optimization of both binary polar coding and $2^m$-ary digital pulse-amplitude modulation (PAM) schemes such as multilevel coding (MLC) and bit-interleaved coded modulation (BICM). The conceptual equivalence of polar coding and multilevel coding is pointed out in detail. Based on a novel characterization of the channel polarization ph…
▽ More
A framework is proposed that allows for a joint description and optimization of both binary polar coding and $2^m$-ary digital pulse-amplitude modulation (PAM) schemes such as multilevel coding (MLC) and bit-interleaved coded modulation (BICM). The conceptual equivalence of polar coding and multilevel coding is pointed out in detail. Based on a novel characterization of the channel polarization phenomenon, rules for the optimal choice of the labeling in coded modulation schemes employing polar codes are developed. Simulation results regarding the error performance of the proposed schemes on the AWGN channel are included.
△ Less
Submitted 12 February, 2013;
originally announced February 2013.
-
Confidence Intervals for the Mutual Information
Authors:
A. G. Stefani,
J. B. Huber,
C. Jardin,
H. Sticht
Abstract:
By combining a bound on the absolute value of the difference of mutual information between two joint probablity distributions with a fixed variational distance, and a bound on the probability of a maximal deviation in variational distance between a true joint probability distribution and an empirical joint probability distribution, confidence intervals for the mutual information of two random vari…
▽ More
By combining a bound on the absolute value of the difference of mutual information between two joint probablity distributions with a fixed variational distance, and a bound on the probability of a maximal deviation in variational distance between a true joint probability distribution and an empirical joint probability distribution, confidence intervals for the mutual information of two random variables with finite alphabets are established. Different from previous results, these intervals do not need any assumptions on the distribution and the sample size.
△ Less
Submitted 27 January, 2013; v1 submitted 24 January, 2013;
originally announced January 2013.
-
A Tight Lower Bound on the Mutual Information of a Binary and an Arbitrary Finite Random Variable in Dependence of the Variational Distance
Authors:
A. G. Stefani,
J. B. Huber,
C. Jardin,
H. Sticht
Abstract:
In this paper a numerical method is presented, which finds a lower bound for the mutual information between a binary and an arbitrary finite random variable with joint distributions that have a variational distance not greater than a known value to a known joint distribution. This lower bound can be applied to mutual information estimation with confidence intervals.
In this paper a numerical method is presented, which finds a lower bound for the mutual information between a binary and an arbitrary finite random variable with joint distributions that have a variational distance not greater than a known value to a known joint distribution. This lower bound can be applied to mutual information estimation with confidence intervals.
△ Less
Submitted 27 January, 2013; v1 submitted 24 January, 2013;
originally announced January 2013.
-
Multilevel Polar-Coded Modulation
Authors:
Mathis Seidl,
Andreas Schenk,
Clemens Stierstorfer,
Johannes B. Huber
Abstract:
A framework is proposed that allows for a joint description and optimization of both binary polar coding and the multilevel coding (MLC) approach for $2^m$-ary digital pulse-amplitude modulation (PAM). The conceptual equivalence of polar coding and multilevel coding is pointed out in detail. Based on a novel characterization of the channel polarization phenomenon, rules for the optimal choice of t…
▽ More
A framework is proposed that allows for a joint description and optimization of both binary polar coding and the multilevel coding (MLC) approach for $2^m$-ary digital pulse-amplitude modulation (PAM). The conceptual equivalence of polar coding and multilevel coding is pointed out in detail. Based on a novel characterization of the channel polarization phenomenon, rules for the optimal choice of the bit labeling in this coded modulation scheme employing polar codes are developed. Simulation results for the AWGN channel are included.
△ Less
Submitted 18 January, 2013;
originally announced January 2013.
-
Punctured Trellis-Coded Modulation
Authors:
Fabian Schuh,
Andreas Schenk,
Johannes B. Huber
Abstract:
In classic trellis-coded modulation (TCM) signal constellations of twice the cardinality are applied when compared to an uncoded transmission enabling transmission of one bit of redundancy per PAM-symbol, i.e., rates of $\frac{K}{K+1}$ when $2^{K+1}$ denotes the cardinality of the signal constellation. In order to support different rates, multi-dimensional (i.e., $\mathcal{D}$-dimensional) constel…
▽ More
In classic trellis-coded modulation (TCM) signal constellations of twice the cardinality are applied when compared to an uncoded transmission enabling transmission of one bit of redundancy per PAM-symbol, i.e., rates of $\frac{K}{K+1}$ when $2^{K+1}$ denotes the cardinality of the signal constellation. In order to support different rates, multi-dimensional (i.e., $\mathcal{D}$-dimensional) constellations had been proposed by means of combining subsequent one- or two-dimensional modulation steps, resulting in TCM-schemes with $\frac{1}{\mathcal{D}}$ bit redundancy per real dimension. In contrast, in this paper we propose to perform rate adjustment for TCM by means of puncturing the convolutional code (CC) on which a TCM-scheme is based on. It is shown, that due to the nontrivial mapping of the output symbols of the CC to signal points in the case of puncturing, a modification of the corresponding Viterbi-decoder algorithm and an optimization of the CC and the puncturing scheme are necessary.
△ Less
Submitted 17 January, 2013;
originally announced January 2013.
-
Non-Systematic Complex Number RS Coded OFDM by Unique Word Prefix
Authors:
Mario Huemer,
Christian Hofbauer,
Johannes B. Huber
Abstract:
In this paper we expand our recently introduced concept of UW-OFDM (unique word orthogonal frequency division multiplexing). In UW-OFDM the cyclic prefixes (CPs) are replaced by deterministic sequences, the so-called unique words (UWs). The UWs are generated by appropriately loading a set of redundant subcarriers. By that a systematic complex number Reed Solomon (RS) code construction is introduce…
▽ More
In this paper we expand our recently introduced concept of UW-OFDM (unique word orthogonal frequency division multiplexing). In UW-OFDM the cyclic prefixes (CPs) are replaced by deterministic sequences, the so-called unique words (UWs). The UWs are generated by appropriately loading a set of redundant subcarriers. By that a systematic complex number Reed Solomon (RS) code construction is introduced in a quite natural way, because an RS code may be defined as the set of vectors, for which a block of successive zeros occurs in the other domain w.r.t. a discrete Fourier transform. (For a fixed block different to zero, i.e., a UW, a coset code of an RS code is generated.) A remaining problem in the original systematic coded UW-OFDM concept is the fact that the redundant subcarrier symbols disproportionately contribute to the mean OFDM symbol energy. In this paper we introduce the concept of non-systematic coded UW-OFDM, where the redundancy is no longer allocated to dedicated subcarriers, but distributed over all subcarriers. We derive optimum complex valued code generator matrices matched to the BLUE (best linear unbiased estimator) and to the LMMSE (linear minimum mean square error) data estimator, respectively. With the help of simulations we highlight the advantageous spectral properties and the superior BER (bit error ratio) performance of non-systematic coded UW-OFDM compared to systematic coded UW-OFDM as well as to CP-OFDM in AWGN (additive white Gaussian noise) and in frequency selective environments.
△ Less
Submitted 6 December, 2012;
originally announced December 2012.
-
Aspects of Polar-Coded Modulation
Authors:
Mathis Seidl,
Andreas Schenk,
Clemens Stierstorfer,
Johannes B. Huber
Abstract:
We consider the joint design of polar coding and higher-order modulation schemes for ever increased spectral efficiency. The close connection between the polar code construction and the multi-level coding approach is described in detail. Relations between different modulation schemes such as bit-interleaved coded modulation (BICM) and multi-level coding (MLC) in case of polar-coded modulation as w…
▽ More
We consider the joint design of polar coding and higher-order modulation schemes for ever increased spectral efficiency. The close connection between the polar code construction and the multi-level coding approach is described in detail. Relations between different modulation schemes such as bit-interleaved coded modulation (BICM) and multi-level coding (MLC) in case of polar-coded modulation as well as the influence of the applied labeling rule and the selection of frozen channels are demonstrated.
△ Less
Submitted 29 November, 2012;
originally announced November 2012.
-
Matched Decoding for Punctured Convolutional Encoded Transmission Over ISI-Channels
Authors:
Fabian Schuh,
Andreas Schenk,
Johannes B. Huber
Abstract:
Matched decoding is a technique that enables the efficient maximum-likelihood sequence estimation of convolutionally encoded PAM-transmission over ISI-channels. Recently, we have shown that the super-trellis of encoder and channel can be described with significantly fewer states without loss in Euclidean distance, by introducing a non-linear representation of the trellis. This paper extends the ma…
▽ More
Matched decoding is a technique that enables the efficient maximum-likelihood sequence estimation of convolutionally encoded PAM-transmission over ISI-channels. Recently, we have shown that the super-trellis of encoder and channel can be described with significantly fewer states without loss in Euclidean distance, by introducing a non-linear representation of the trellis. This paper extends the matched decoding concept to punctured convolutional codes and introduces a time-variant, non-linear trellis description.
△ Less
Submitted 1 August, 2012;
originally announced August 2012.
-
Reduced Complexity Super-Trellis Decoding for Convolutionally Encoded Transmission Over ISI-Channels
Authors:
Fabian Schuh,
Andreas Schenk,
Johannes B. Huber
Abstract:
In this paper we propose a matched encoding (ME) scheme for convolutionally encoded transmission over intersymbol interference (usually called ISI) channels. A novel trellis description enables to perform equalization and decoding jointly, i.e., enables efficient super-trellis decoding. By means of this matched non-linear trellis description we can significantly reduce the number of states needed…
▽ More
In this paper we propose a matched encoding (ME) scheme for convolutionally encoded transmission over intersymbol interference (usually called ISI) channels. A novel trellis description enables to perform equalization and decoding jointly, i.e., enables efficient super-trellis decoding. By means of this matched non-linear trellis description we can significantly reduce the number of states needed for the receiver-side Viterbi algorithm to perform maximum-likelihood sequence estimation. Further complexity reduction is achieved using the concept of reduced-state sequence estimation.
△ Less
Submitted 4 October, 2012; v1 submitted 19 July, 2012;
originally announced July 2012.
-
Nonlinear Trellis Description for Convolutionally Encoded Transmission Over ISI-channels with Applications for CPM
Authors:
Fabian Schuh,
Johannes B. Huber
Abstract:
In this paper we propose a matched decoding scheme for convolutionally encoded transmission over intersymbol interference (ISI) channels and devise a nonlinear trellis description. As an application we show that for coded continuous phase modulation (CPM) using a non-coherent receiver the number of states of the super trellis can be significantly reduced by means of a matched non-linear trellis en…
▽ More
In this paper we propose a matched decoding scheme for convolutionally encoded transmission over intersymbol interference (ISI) channels and devise a nonlinear trellis description. As an application we show that for coded continuous phase modulation (CPM) using a non-coherent receiver the number of states of the super trellis can be significantly reduced by means of a matched non-linear trellis encoder.
△ Less
Submitted 1 August, 2012; v1 submitted 31 May, 2012;
originally announced May 2012.
-
Reduced-Complexity Collaborative Decoding of Interleaved Reed-Solomon and Gabidulin Codes
Authors:
Hans Kurzweil,
Mathis Seidl,
Johannes B. Huber
Abstract:
An alternative method for collaborative decoding of interleaved Reed-Solomon codes as well as Gabidulin codes for the case of high interleaving degree is proposed. As an example of application, simulation results are presented for a concatenated coding scheme using polar codes as inner codes.
An alternative method for collaborative decoding of interleaved Reed-Solomon codes as well as Gabidulin codes for the case of high interleaving degree is proposed. As an example of application, simulation results are presented for a concatenated coding scheme using polar codes as inner codes.
△ Less
Submitted 19 May, 2011; v1 submitted 15 February, 2011;
originally announced February 2011.
-
Collaborative Decoding of Interleaved Reed-Solomon Codes using Gaussian Elimination
Authors:
Hans Kurzweil,
Mathis Seidl,
Johannes B. Huber
Abstract:
We propose an alternative method for collaborative decoding of interleaved Reed-Solomon codes. Simulation results for a concatenated coding scheme using polar codes as inner codes are included.
We propose an alternative method for collaborative decoding of interleaved Reed-Solomon codes. Simulation results for a concatenated coding scheme using polar codes as inner codes are included.
△ Less
Submitted 17 September, 2010;
originally announced September 2010.
-
Coded OFDM by Unique Word Prefix
Authors:
Mario Huemer,
Christian Hofbauer,
Johannes B. Huber
Abstract:
In this paper we propose a novel transmit signal structure and an adjusted and optimized receiver for OFDM (orthogonal frequency division multiplexing). Instead of the conventional cyclic prefix we use a deterministic sequence, which we call unique word (UW), as guard interval. We show how unique words, which are already well investigated for single carrier systems with frequency domain equaliza…
▽ More
In this paper we propose a novel transmit signal structure and an adjusted and optimized receiver for OFDM (orthogonal frequency division multiplexing). Instead of the conventional cyclic prefix we use a deterministic sequence, which we call unique word (UW), as guard interval. We show how unique words, which are already well investigated for single carrier systems with frequency domain equalization (SC/FDE), can also be introduced in OFDM symbols. Since unique words represent known sequences, they can advantageously be used for synchronization and channel estimation purposes. Furthermore, the proposed approach introduces a complex number Reed-Solomon (RS-) code structure within the sequence of subcarriers. This allows for RS-decoding or to apply a highly efficient Wiener smoother succeeding a zero forcing stage at the receiver. We present simulation results in an indoor multipath environment to highlight the advantageous properties of the proposed scheme.
△ Less
Submitted 8 January, 2010;
originally announced January 2010.
-
Multiple-Bases Belief-Propagation Decoding of High-Density Cyclic Codes
Authors:
Thorsten Hehn,
Johannes B. Huber,
Olgica Milenkovic,
Stefan Laendner
Abstract:
We introduce a new method for decoding short and moderate length linear block codes with dense parity-check matrix representations of cyclic form, termed multiple-bases belief-propagation (MBBP). The proposed iterative scheme makes use of the fact that a code has many structurally diverse parity-check matrices, capable of detecting different error patterns. We show that this inherent code proper…
▽ More
We introduce a new method for decoding short and moderate length linear block codes with dense parity-check matrix representations of cyclic form, termed multiple-bases belief-propagation (MBBP). The proposed iterative scheme makes use of the fact that a code has many structurally diverse parity-check matrices, capable of detecting different error patterns. We show that this inherent code property leads to decoding algorithms with significantly better performance when compared to standard BP decoding. Furthermore, we describe how to choose sets of parity-check matrices of cyclic form amenable for multiple-bases decoding, based on analytical studies performed for the binary erasure channel. For several cyclic and extended cyclic codes, the MBBP decoding performance can be shown to closely follow that of maximum-likelihood decoders.
△ Less
Submitted 1 May, 2009;
originally announced May 2009.
-
MBBP for improved iterative channel decoding in 802.16e WiMAX systems
Authors:
Thorsten Hehn,
Johannes B. Huber,
Stefan Laendner
Abstract:
We propose the application of multiple-bases belief-propagation, an optimized iterative decoding method, to a set of rate-1/2 LDPC codes from the IEEE 802.16e WiMAX standard. The presented approach allows for improved decoding performance when signaling over the AWGN channel. As all required operations for this method can be run in parallel, the decoding delay of this method and standard belief-…
▽ More
We propose the application of multiple-bases belief-propagation, an optimized iterative decoding method, to a set of rate-1/2 LDPC codes from the IEEE 802.16e WiMAX standard. The presented approach allows for improved decoding performance when signaling over the AWGN channel. As all required operations for this method can be run in parallel, the decoding delay of this method and standard belief-propagation decoding are equal. The obtained results are compared to the performance of LDPC codes optimized with the progressive edge-growth algorithm and to bounds from information theory. It will be shown that the discussed method mitigates the gap to the well-known random coding bound by about 20 percent.
△ Less
Submitted 8 September, 2008;
originally announced September 2008.
-
The lowest-possible BER and FER for any discrete memoryless channel with given capacity
Authors:
Johannes B. Huber,
Thorsten Hehn
Abstract:
We investigate properties of a channel coding scheme leading to the minimum-possible frame error ratio when transmitting over a memoryless channel with rate R>C. The results are compared to the well-known properties of a channel coding scheme leading to minimum bit error ratio. It is concluded that these two optimization requests are contradicting. A valuable application of the derived results i…
▽ More
We investigate properties of a channel coding scheme leading to the minimum-possible frame error ratio when transmitting over a memoryless channel with rate R>C. The results are compared to the well-known properties of a channel coding scheme leading to minimum bit error ratio. It is concluded that these two optimization requests are contradicting. A valuable application of the derived results is presented.
△ Less
Submitted 20 March, 2009; v1 submitted 7 January, 2008;
originally announced January 2008.
-
Permutation Decoding and the Stopping Redundancy Hierarchy of Cyclic and Extended Cyclic Codes
Authors:
Thorsten Hehn,
Olgica Milenkovic,
Stefan Laendner,
Johannes B. Huber
Abstract:
We introduce the notion of the stopping redundancy hierarchy of a linear block code as a measure of the trade-off between performance and complexity of iterative decoding for the binary erasure channel. We derive lower and upper bounds for the stopping redundancy hierarchy via Lovasz's Local Lemma and Bonferroni-type inequalities, and specialize them for codes with cyclic parity-check matrices.…
▽ More
We introduce the notion of the stopping redundancy hierarchy of a linear block code as a measure of the trade-off between performance and complexity of iterative decoding for the binary erasure channel. We derive lower and upper bounds for the stopping redundancy hierarchy via Lovasz's Local Lemma and Bonferroni-type inequalities, and specialize them for codes with cyclic parity-check matrices. Based on the observed properties of parity-check matrices with good stopping redundancy characteristics, we develop a novel decoding technique, termed automorphism group decoding, that combines iterative message passing and permutation decoding. We also present bounds on the smallest number of permutations of an automorphism group decoder needed to correct any set of erasures up to a prescribed size. Simulation results demonstrate that for a large number of algebraic codes, the performance of the new decoding method is close to that of maximum likelihood decoding.
△ Less
Submitted 3 July, 2008; v1 submitted 7 August, 2007;
originally announced August 2007.
-
Permutation Decoding and the Stopping Redundancy Hierarchy of Linear Block Codes
Authors:
Thorsten Hehn,
Olgica Milenkovic,
Stefan Laendner,
Johannes B. Huber
Abstract:
We investigate the stopping redundancy hierarchy of linear block codes and its connection to permutation decoding techniques. An element in the ordered list of stopping redundancy values represents the smallest number of possibly linearly dependent rows in any parity-check matrix of a code that avoids stopping sets of a given size. Redundant parity-check equations can be shown to have a similar…
▽ More
We investigate the stopping redundancy hierarchy of linear block codes and its connection to permutation decoding techniques. An element in the ordered list of stopping redundancy values represents the smallest number of possibly linearly dependent rows in any parity-check matrix of a code that avoids stopping sets of a given size. Redundant parity-check equations can be shown to have a similar effect on decoding performance as permuting the coordinates of the received codeword according to a selected set of automorphisms of the code. Based on this finding we develop new decoding strategies for data transmission over the binary erasure channel that combine iterative message passing and permutation decoding in order to avoid errors confined to stopping sets. We also introduce the notion of s-SAD sets, containing the smallest number of automorphisms of a code with the property that they move any set of not more than s erasures into positions that do not correspond to stopping sets within a judiciously chosen parity-check matrix.
△ Less
Submitted 13 February, 2007; v1 submitted 8 February, 2007;
originally announced February 2007.
-
The Trapping Redundancy of Linear Block Codes
Authors:
Stefan Laendner,
Thorsten Hehn,
Olgica Milenkovic,
Johannes B. Huber
Abstract:
We generalize the notion of the stopping redundancy in order to study the smallest size of a trapping set in Tanner graphs of linear block codes. In this context, we introduce the notion of the trapping redundancy of a code, which quantifies the relationship between the number of redundant rows in any parity-check matrix of a given code and the size of its smallest trapping set. Trapping sets wi…
▽ More
We generalize the notion of the stopping redundancy in order to study the smallest size of a trapping set in Tanner graphs of linear block codes. In this context, we introduce the notion of the trapping redundancy of a code, which quantifies the relationship between the number of redundant rows in any parity-check matrix of a given code and the size of its smallest trapping set. Trapping sets with certain parameter sizes are known to cause error-floors in the performance curves of iterative belief propagation decoders, and it is therefore important to identify decoding matrices that avoid such sets. Bounds on the trapping redundancy are obtained using probabilistic and constructive methods, and the analysis covers both general and elementary trapping sets. Numerical values for these bounds are computed for the [2640,1320] Margulis code and the class of projective geometry codes, and compared with some new code-specific trapping set size estimates.
△ Less
Submitted 17 September, 2008; v1 submitted 30 December, 2006;
originally announced January 2007.