Variations of Rank Modulation for Flash Memories
|
|
- Bethany Morris
- 5 years ago
- Views:
Transcription
1 Variations of Rank Modulation for Flash Memories Zhiying Wang Joint work with Anxiao(Andrew) Jiang Jehoshua Bruck
2 Flash Memory Control Gate Floating Gate Source Drain Substrate Block erasure X
3 Flash Memory Iterative writing Writing speed
4 Flash Memory Charge leakage 4 4
5 Flash Memory Charge leakage Data reliability 4 5
6 Rank Modulation* cell Indices 4 5 permutation: (5 4 ) Writing speed Data reliability *A. Jiang, R. Mateescu, M. Schwartz, J. Bruck, Rank Modulation for Flash Memories, 008 6
7 Decoding Rank Modulation Maximal level identification; maximal level removal For m cells, need (m-) iterations Capacity: log(5!)/5 (5 4 ) 4 5 7
8 Variation I: Partial Rank Modulation Reduce the complexity of decoding Only k iterations (k=) Capacity: log(5*4)/5 k-partial rank modulation (k-permutations): top k cells; total of m cells (5 ) (5 4 ) 4 5 8
9 Partial Rank Modulation: Updating Push-to-the-top operation
10 Gray Code for Partial Rank Modulation A cycle of all k-permutations Transition: push-to-the-top 0
11 Gray Code for Rank Modulation* m=k+= *A. Jiang, R. Mateescu, M. Schwartz, J. Bruck, Rank Modulation for Flash Memories, 008
12 Gray Code for Rank Modulation* *A. Jiang, R. Mateescu, M. Schwartz, J. Bruck, Rank Modulation for Flash Memories, 008 m=k+=
13 Gray Code as a Counter Counter from 0 to 5 m=k+= Absolute Value Counter 0 Rank Modulation Counter
14 Gray Code as a Counter Counter from 0 to 5 m=k+= Absolute Value Counter Rank Modulation Counter 4
15 Gray Code as a Counter Counter from 0 to 5 m=k+= Absolute Value Counter Rank Modulation Counter 5
16 Gray Code as a Counter Counter from 0 to 5 m=k+= Absolute Value Counter Rank Modulation Counter 6
17 Gray Code as a Counter Counter from 0 to 5 m=k+= Absolute Value Counter 4 Rank Modulation Counter 7
18 Gray Code as a Counter Counter from 0 to 5 m=k+= Absolute Value Counter 5 Rank Modulation Counter 8
19 Gray Code as a Counter Counter from 0 to 5 m=k+= Absolute Value Counter 0 Rank Modulation Counter 9
20 m=k+= Universal cycle Universal Cycles for k-permutations* A sequence (u,u,,u N ), N= m!/(m-k)! Each k-permutation is represented by exactly one (u i+,u i+,,u i+k ) * F. Chung, P. Diaconis, and R. Graham, Universal cycles for combinatorial structures, 99 B.W. Jackson, Universal cycles for k-subsets and k-permutations, 99 J. Robert Johnson, Universal cycles for permutations, 008 F. Ruskey and A. Williams, An explicit universal cycle for the (n )-permutations of an n-set, 009 0
21 Universal Cycles for k-permutations m=k+=
22 Example: m=4, k=
23 Example: m=4, k=
24 Construction of Gray Code Theorem: There exists a Gray code for k-partial rank modulation, for all 0<k<m. For a given permutation, the next pushto-the-top operation can be decided in time O(k log(k)) on average. 4
25 Partial Rank Modulation: Summary Reduce decoding complexity k-permutations out of m cells Gray code of partial rank modulation Given permutation size m, what can we do if we have more than m cell levels? 5
26 Variation II: Bounded Rank Modulation Permutation size m Maximum cell level D>m 6
27 Bounded Rank Modulation: Example 8 cells; cell levels {,,,4,5,6}; permutation size 4; , , 4 Only 4 levels needed Can we do better? , 4, 4 overlap All 6 levels needed 7
28 Computing the Capacity Cell levels {,,,4,5,6,7,8,9,0} ; 8 cells; permutation size cap = log(4! ) / 8 = cap = log(4! (4 ) ) / 8 = cap = log(4! 4 )/ 8 = 57. 8
29 Overlap Increases Capacity Theorem: cap(m,d,v=)>cap(m,d,v=0), for given m>, D>m+ m : permutation size D: maximum cell level v: overlap 9
30 Encoding Max level D=4, size m=, overlap v= message permutation cell level ()=, ()=0 00/000 Convolutional Rate = :4 000/0 00/00 00/00 0/00 0/00 /0 000/000 00/00 00/00 0/00 0/00 /0 000/000 00/00 00/00 0/00 0/00 /000 II I III 00/000 0/0 00/000 0/0 0/0 0
31 Decoding Max level D=4, size m=, overlap v= cell level permutation message First Two Permutation Bits Permutation Sequence Information Sequence Equal Not equal
32 Summary Partial rank modulation Less sorting iterations Smaller permutation size Gray code Bounded rank modulation Given permutation size & maximal cell level Overlap and capacity Encoder and decoder
33 Open Problems Partial rank modulation Error-correcting codes using lower levels as redundancy Efficient mapping between permutations and values Gap distributions after push-to-the-top Bounded rank modulation Exact optimal overlap values for m<d< Error-correcting codes Efficient encoding/decoding
34 Thank you! 4
Error-Correcting Codes for Rank Modulation
ISIT 008, Toronto, Canada, July 6-11, 008 Error-Correcting Codes for Rank Modulation Anxiao (Andrew) Jiang Computer Science Department Texas A&M University College Station, TX 77843, U.S.A. ajiang@cs.tamu.edu
More informationCombined Permutation Codes for Synchronization
ISITA2012, Honolulu, Hawaii, USA, October 28-31, 2012 Combined Permutation Codes for Synchronization R. Heymann, H. C. Ferreira, T. G. Swart Department of Electrical and Electronic Engineering Science
More informationAn improvement to the Gilbert-Varshamov bound for permutation codes
An improvement to the Gilbert-Varshamov bound for permutation codes Yiting Yang Department of Mathematics Tongji University Joint work with Fei Gao and Gennian Ge May 11, 2013 Outline Outline 1 Introduction
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 6, JUNE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 6, JUNE 2009 2659 Rank Modulation for Flash Memories Anxiao (Andrew) Jiang, Member, IEEE, Robert Mateescu, Member, IEEE, Moshe Schwartz, Member, IEEE,
More informationComputing and Communications 2. Information Theory -Channel Capacity
1896 1920 1987 2006 Computing and Communications 2. Information Theory -Channel Capacity Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Communication
More informationLDPC Codes for Rank Modulation in Flash Memories
LDPC Codes for Rank Modulation in Flash Memories Fan Zhang Electrical and Computer Eng. Dept. fanzhang@tamu.edu Henry D. Pfister Electrical and Computer Eng. Dept. hpfister@tamu.edu Anxiao (Andrew) Jiang
More informationMaking Error Correcting Codes Work for Flash Memory
Making Error Correcting Codes Work for Flash Memory Part III: New Coding Methods Anxiao (Andrew) Jiang Department of Computer Science and Engineering Texas A&M University Tutorial at Flash Memory Summit,
More informationPermutation Codes Correcting a Single Burst Deletion I: Unstable Deletions
Permutation Codes Correcting a Single Burst Deletion I: Unstable Deletions Yeow Meng Chee, Van Khu Vu, and Xiande Zhang School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore
More informationError Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria
Error Control Coding Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Topics Introduction The Channel Coding Problem Linear Block Codes Cyclic Codes BCH and Reed-Solomon
More informationUniversal Cycles for Permutations Theory and Applications
Universal Cycles for Permutations Theory and Applications Alexander Holroyd Microsoft Research Brett Stevens Carleton University Aaron Williams Carleton University Frank Ruskey University of Victoria Combinatorial
More informationOn uniquely k-determined permutations
On uniquely k-determined permutations Sergey Avgustinovich and Sergey Kitaev 16th March 2007 Abstract Motivated by a new point of view to study occurrences of consecutive patterns in permutations, we introduce
More informationPartitions and Permutations
Chapter 5 Partitions and Permutations 5.1 Stirling Subset Numbers 5.2 Stirling Cycle Numbers 5.3 Inversions and Ascents 5.4 Derangements 5.5 Exponential Generating Functions 5.6 Posets and Lattices 1 2
More informationOn uniquely k-determined permutations
Discrete Mathematics 308 (2008) 1500 1507 www.elsevier.com/locate/disc On uniquely k-determined permutations Sergey Avgustinovich a, Sergey Kitaev b a Sobolev Institute of Mathematics, Acad. Koptyug prospect
More informationBasics of Error Correcting Codes
Basics of Error Correcting Codes Drawing from the book Information Theory, Inference, and Learning Algorithms Downloadable or purchasable: http://www.inference.phy.cam.ac.uk/mackay/itila/book.html CSE
More informationPermutation arrays under the Chebyshev distance
1 Permutation arrays under the Chebyshev distance Torleiv Kløve, Fellow, IEEE, Te-Tsung Lin, Shi-Chun Tsai, Member, IEEE and Wen-Guey Tzeng Member, IEEE Abstract An (n,d) permutation array (PA) is a subset
More informationCoding for the Slepian-Wolf Problem With Turbo Codes
Coding for the Slepian-Wolf Problem With Turbo Codes Jan Bajcsy and Patrick Mitran Department of Electrical and Computer Engineering, McGill University Montréal, Québec, HA A7, Email: {jbajcsy, pmitran}@tsp.ece.mcgill.ca
More informationCOMM901 Source Coding and Compression Winter Semester 2013/2014. Midterm Exam
German University in Cairo - GUC Faculty of Information Engineering & Technology - IET Department of Communication Engineering Dr.-Ing. Heiko Schwarz COMM901 Source Coding and Compression Winter Semester
More informationMath 3012 Applied Combinatorics Lecture 2
August 20, 2015 Math 3012 Applied Combinatorics Lecture 2 William T. Trotter trotter@math.gatech.edu The Road Ahead Alert The next two to three lectures will be an integrated approach to material from
More informationIEEE C /02R1. IEEE Mobile Broadband Wireless Access <http://grouper.ieee.org/groups/802/mbwa>
23--29 IEEE C82.2-3/2R Project Title Date Submitted IEEE 82.2 Mobile Broadband Wireless Access Soft Iterative Decoding for Mobile Wireless Communications 23--29
More informationThe ternary alphabet is used by alternate mark inversion modulation; successive ones in data are represented by alternating ±1.
Alphabets EE 387, Notes 2, Handout #3 Definition: An alphabet is a discrete (usually finite) set of symbols. Examples: B = {0,1} is the binary alphabet T = { 1,0,+1} is the ternary alphabet X = {00,01,...,FF}
More informationECOM 4311 Digital System Design using VHDL. Chapter 9 Sequential Circuit Design: Practice
ECOM 4311 Digital System Design using VHDL Chapter 9 Sequential Circuit Design: Practice Outline 1. Poor design practice and remedy 2. More counters 3. Register as fast temporary storage 4. Pipelined circuit
More informationIntro to coding and convolutional codes
Intro to coding and convolutional codes Lecture 11 Vladimir Stojanović 6.973 Communication System Design Spring 2006 Massachusetts Institute of Technology 802.11a Convolutional Encoder Rate 1/2 convolutional
More informationECE 4400:693 - Information Theory
ECE 4400:693 - Information Theory Dr. Nghi Tran Lecture 1: Introduction & Overview Dr. Nghi Tran (ECE-University of Akron) ECE 4400:693 Information Theory 1 / 26 Outline 1 Course Information 2 Course Overview
More informationAnalog to digital and digital to analog converters
Analog to digital and digital to analog converters A/D converter D/A converter ADC DAC ad da Number bases Decimal, base, numbers - 9 Binary, base, numbers and Oktal, base 8, numbers - 7 Hexadecimal, base
More informationFrom Fountain to BATS: Realization of Network Coding
From Fountain to BATS: Realization of Network Coding Shenghao Yang Jan 26, 2015 Shenzhen Shenghao Yang Jan 26, 2015 1 / 35 Outline 1 Outline 2 Single-Hop: Fountain Codes LT Codes Raptor codes: achieving
More informationPattern Avoidance in Poset Permutations
Pattern Avoidance in Poset Permutations Sam Hopkins and Morgan Weiler Massachusetts Institute of Technology and University of California, Berkeley Permutation Patterns, Paris; July 5th, 2013 1 Definitions
More informationMitigating Inter-Cell Coupling Effects in MLC NAND Flash via Constrained Coding
Mitigating Inter-Cell Coupling Effects in MLC NAND Flash via Constrained Coding Amit Berman and Yitzhak Birk {bermanam@tx, birk@ee}.technion.ac.il Technion Israel Institute of Technology August, 2010 August
More informationA Bit of network information theory
Š#/,% 0/,94%#(.)15% A Bit of network information theory Suhas Diggavi 1 Email: suhas.diggavi@epfl.ch URL: http://licos.epfl.ch Parts of talk are joint work with S. Avestimehr 2, S. Mohajer 1, C. Tian 3,
More informationEfficient Codes using Channel Polarization!
Efficient Codes using Channel Polarization! Bakshi, Jaggi, and Effros! ACHIEVEMENT DESCRIPTION STATUS QUO - Practical capacity achieving schemes are not known for general multi-input multi-output channels!
More informationCS1802 Week 9: Probability, Expectation, Entropy
CS02 Discrete Structures Recitation Fall 207 October 30 - November 3, 207 CS02 Week 9: Probability, Expectation, Entropy Simple Probabilities i. What is the probability that if a die is rolled five times,
More informationLow Complexity List Successive Cancellation Decoding of Polar Codes
Low Complexity List Successive Cancellation Decoding of Polar Codes Congzhe Cao, Zesong Fei School of Information and Electronics Beijing Institute of Technology Beijing, China Email: 5, feizesong@bit.edu.cn
More informationTiling Problems. This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane
Tiling Problems This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane The undecidable problems we saw at the start of our unit
More information#A13 INTEGERS 15 (2015) THE LOCATION OF THE FIRST ASCENT IN A 123-AVOIDING PERMUTATION
#A13 INTEGERS 15 (2015) THE LOCATION OF THE FIRST ASCENT IN A 123-AVOIDING PERMUTATION Samuel Connolly Department of Mathematics, Brown University, Providence, Rhode Island Zachary Gabor Department of
More informationContemplation of Synchronous Gray Code Counter and its Variants using Reversible Logic Gates
Contemplation of Synchronous Gray Code Counter and its Variants using Reversible Logic Gates Rakshith Saligram Dept. of Electronics and Communication B M S College Of Engineering Bangalore, India rsaligram@gmail.com
More informationPunctured vs Rateless Codes for Hybrid ARQ
Punctured vs Rateless Codes for Hybrid ARQ Emina Soljanin Mathematical and Algorithmic Sciences Research, Bell Labs Collaborations with R. Liu, P. Spasojevic, N. Varnica and P. Whiting Tsinghua University
More informationGSM Network and Services
GSM Network and Services Channel coding - from source data to radio bursts 1 Channel coding Wireless transmission of bits in a mobile environment is not very reliable. The bit error rate (BER) is typically
More informationComputer Science 1001.py. Lecture 25 : Intro to Error Correction and Detection Codes
Computer Science 1001.py Lecture 25 : Intro to Error Correction and Detection Codes Instructors: Daniel Deutch, Amiram Yehudai Teaching Assistants: Michal Kleinbort, Amir Rubinstein School of Computer
More informationModule 3 Greedy Strategy
Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main
More informationFPGA Implementation of Viterbi Algorithm for Decoding of Convolution Codes
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 4, Issue 5, Ver. I (Sep-Oct. 4), PP 46-53 e-issn: 39 4, p-issn No. : 39 497 FPGA Implementation of Viterbi Algorithm for Decoding of Convolution
More informationDesign Rules, Technology File, DRC / LVS
Design Rules, Technology File, DRC / LVS Prof. Dr. Peter Fischer VLSI Design: Design Rules P. Fischer, TI, Uni Mannheim, Seite 1 DESIGN RULES Rules in one Layer Caused by manufacturing limits (lithography,
More informationarxiv: v1 [math.co] 30 Nov 2017
A NOTE ON 3-FREE PERMUTATIONS arxiv:1712.00105v1 [math.co] 30 Nov 2017 Bill Correll, Jr. MDA Information Systems LLC, Ann Arbor, MI, USA william.correll@mdaus.com Randy W. Ho Garmin International, Chandler,
More informationMidterm practice super-problems
Midterm practice super-problems These problems are definitely harder than the midterm (even the ones without ), so if you solve them you should have no problem at all with the exam. However be aware that
More informationCounting in Algorithms
Counting Counting in Algorithms How many comparisons are needed to sort n numbers? How many steps to compute the GCD of two numbers? How many steps to factor an integer? Counting in Games How many different
More informationLossy Compression of Permutations
204 IEEE International Symposium on Information Theory Lossy Compression of Permutations Da Wang EECS Dept., MIT Cambridge, MA, USA Email: dawang@mit.edu Arya Mazumdar ECE Dept., Univ. of Minnesota Twin
More informationCooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates
Cooperative Broadcast for Maximum Network Lifetime Ivana Maric and Roy Yates Wireless Multihop Network Broadcast N nodes Source transmits at rate R Messages are to be delivered to all the nodes Nodes can
More informationChapter 3 Convolutional Codes and Trellis Coded Modulation
Chapter 3 Convolutional Codes and Trellis Coded Modulation 3. Encoder Structure and Trellis Representation 3. Systematic Convolutional Codes 3.3 Viterbi Decoding Algorithm 3.4 BCJR Decoding Algorithm 3.5
More informationEECS 473 Advanced Embedded Systems. Lecture 14 Wireless in the real world
EECS 473 Advanced Embedded Systems Lecture 14 Wireless in the real world Team status updates Team Alert (Home Alert) Team Fitness (Fitness watch) Team Glasses Team Mouse (Control in hand) Team WiFi (WiFi
More informationHeuristic Search with Pre-Computed Databases
Heuristic Search with Pre-Computed Databases Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Abstract Use pre-computed partial results to improve the efficiency of heuristic
More informationMultitree Decoding and Multitree-Aided LDPC Decoding
Multitree Decoding and Multitree-Aided LDPC Decoding Maja Ostojic and Hans-Andrea Loeliger Dept. of Information Technology and Electrical Engineering ETH Zurich, Switzerland Email: {ostojic,loeliger}@isi.ee.ethz.ch
More informationProducts of Universal Cycles
Products of Universal Cycles Persi Diaconis Ron Graham Abstract Universal cycles are generalizations of de Bruijn cycles to combinatorial patterns other than binary strings. We show how to construct a
More informationThe Complexity of Sorting with Networks of Stacks and Queues
The Complexity of Sorting with Networks of Stacks and Queues Stefan Felsner Institut für Mathematik, Technische Universität Berlin. felsner@math.tu-berlin.de Martin Pergel Department of Applied Mathematics
More informationLatin squares and related combinatorial designs. Leonard Soicher Queen Mary, University of London July 2013
Latin squares and related combinatorial designs Leonard Soicher Queen Mary, University of London July 2013 Many of you are familiar with Sudoku puzzles. Here is Sudoku #043 (Medium) from Livewire Puzzles
More informationFast Sorting and Pattern-Avoiding Permutations
Fast Sorting and Pattern-Avoiding Permutations David Arthur Stanford University darthur@cs.stanford.edu Abstract We say a permutation π avoids a pattern σ if no length σ subsequence of π is ordered in
More informationInterference: An Information Theoretic View
Interference: An Information Theoretic View David Tse Wireless Foundations U.C. Berkeley ISIT 2009 Tutorial June 28 Thanks: Changho Suh. Context Two central phenomena in wireless communications: Fading
More informationOrganizing Gray Code States for Maximum Error Tolerance
Organizing Gray Code States for Maximum Error Tolerance NICHOLAS HARKIOLAKIS School of Electrical and Computer Engineering National Technical University of Athens 9 Iroon Politechniou St., 57 8 Athens
More informationClasses of permutations avoiding 231 or 321
Classes of permutations avoiding 231 or 321 Nik Ruškuc nik.ruskuc@st-andrews.ac.uk School of Mathematics and Statistics, University of St Andrews Dresden, 25 November 2015 Aim Introduce the area of pattern
More informationLecture 9b Convolutional Coding/Decoding and Trellis Code modulation
Lecture 9b Convolutional Coding/Decoding and Trellis Code modulation Convolutional Coder Basics Coder State Diagram Encoder Trellis Coder Tree Viterbi Decoding For Simplicity assume Binary Sym.Channel
More informationFrequency-Hopped Spread-Spectrum
Chapter Frequency-Hopped Spread-Spectrum In this chapter we discuss frequency-hopped spread-spectrum. We first describe the antijam capability, then the multiple-access capability and finally the fading
More informationChapter 3 PRINCIPLE OF INCLUSION AND EXCLUSION
Chapter 3 PRINCIPLE OF INCLUSION AND EXCLUSION 3.1 The basics Consider a set of N obects and r properties that each obect may or may not have each one of them. Let the properties be a 1,a,..., a r. Let
More informationCoding Techniques and the Two-Access Channel
Coding Techniques and the Two-Access Channel A.J. Han VINCK Institute for Experimental Mathematics, University of Duisburg-Essen, Germany email: Vinck@exp-math.uni-essen.de Abstract. We consider some examples
More information6.004 Computation Structures Spring 2009
MIT OpenCourseWare http://ocw.mit.edu 6.004 Computation Structures Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. Welcome to 6.004! Course
More informationSolutions to Exercises on Page 86
Solutions to Exercises on Page 86 #. A number is a multiple of, 4, 5 and 6 if and only if it is a multiple of the greatest common multiple of, 4, 5 and 6. The greatest common multiple of, 4, 5 and 6 is
More informationDiscrete Mathematics and Probability Theory Spring 2018 Ayazifar and Rao Midterm 2 Solutions
CS 70 Discrete Mathematics and Probability Theory Spring 2018 Ayazifar and Rao Midterm 2 Solutions PRINT Your Name: Oski Bear SIGN Your Name: OS K I PRINT Your Student ID: CIRCLE your exam room: Pimentel
More informationECE Advanced Communication Theory, Spring 2007 Midterm Exam Monday, April 23rd, 6:00-9:00pm, ELAB 325
C 745 - Advanced Communication Theory, Spring 2007 Midterm xam Monday, April 23rd, 600-900pm, LAB 325 Overview The exam consists of five problems for 150 points. The points for each part of each problem
More informationLow Power Design Part I Introduction and VHDL design. Ricardo Santos LSCAD/FACOM/UFMS
Low Power Design Part I Introduction and VHDL design Ricardo Santos ricardo@facom.ufms.br LSCAD/FACOM/UFMS Motivation for Low Power Design Low power design is important from three different reasons Device
More informationSelective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks. Andrea E.F. Clementi Angelo Monti Riccardo Silvestri
Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks Andrea E.F. Clementi Angelo Monti Riccardo Silvestri Introduction A radio network is a set of radio stations that are able
More informationDigital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?
Digital Transmission using SECC 6.02 Spring 2010 Lecture #7 How many parity bits? Dealing with burst errors Reed-Solomon codes message Compute Checksum # message chk Partition Apply SECC Transmit errors
More informationAdvanced channel coding : a good basis. Alexandre Giulietti, on behalf of the team
Advanced channel coding : a good basis Alexandre Giulietti, on behalf of the T@MPO team Errors in transmission are fowardly corrected using channel coding e.g. MPEG4 e.g. Turbo coding e.g. QAM source coding
More informationAdaptive communications techniques for the underwater acoustic channel
Adaptive communications techniques for the underwater acoustic channel James A. Ritcey Department of Electrical Engineering, Box 352500 University of Washington, Seattle, WA 98195 Tel: (206) 543-4702,
More informationTHE use of balanced codes is crucial for some information
A Construction for Balancing Non-Binary Sequences Based on Gray Code Prefixes Elie N. Mambou and Theo G. Swart, Senior Member, IEEE arxiv:70.008v [cs.it] Jun 07 Abstract We introduce a new construction
More information09-2 EE 4770 Lecture Transparency. Formatted 12:49, 19 February 1998 from lsli
09-1 09-1 Displacement and Proximity Displacement transducers measure the location of an object. Proximity transducers determine when an object is near. Criteria Used in Selection of Transducer How much
More informationNear-Optimal Radio Use For Wireless Network Synch. Synchronization
Near-Optimal Radio Use For Wireless Network Synchronization LANL, UCLA 10th of July, 2009 Motivation Consider sensor network: tiny, inexpensive embedded computers run complex software sense environmental
More informationON THE PERMUTATIONAL POWER OF TOKEN PASSING NETWORKS.
ON THE PERMUTATIONAL POWER OF TOKEN PASSING NETWORKS. M. H. ALBERT, N. RUŠKUC, AND S. LINTON Abstract. A token passing network is a directed graph with one or more specified input vertices and one or more
More informationEEE 309 Communication Theory
EEE 309 Communication Theory Semester: January 2016 Dr. Md. Farhad Hossain Associate Professor Department of EEE, BUET Email: mfarhadhossain@eee.buet.ac.bd Office: ECE 331, ECE Building Part 05 Pulse Code
More informationEEE 309 Communication Theory
EEE 309 Communication Theory Semester: January 2017 Dr. Md. Farhad Hossain Associate Professor Department of EEE, BUET Email: mfarhadhossain@eee.buet.ac.bd Office: ECE 331, ECE Building Types of Modulation
More informationStaircases, dominoes, and the growth rate of Av(1324)
Staircases, dominoes, and the growth rate of Av(1324) Robert Brignall Joint work with David Bevan, Andrew Elvey Price and Jay Pantone TU Wien, 28th August 2017 Permutation containment 101 1 3 5 2 4 4 1
More informationClosed Almost Knight s Tours on 2D and 3D Chessboards
Closed Almost Knight s Tours on 2D and 3D Chessboards Michael Firstein 1, Anja Fischer 2, and Philipp Hungerländer 1 1 Alpen-Adria-Universität Klagenfurt, Austria, michaelfir@edu.aau.at, philipp.hungerlaender@aau.at
More informationInformation Theory and Communication Optimal Codes
Information Theory and Communication Optimal Codes Ritwik Banerjee rbanerjee@cs.stonybrook.edu c Ritwik Banerjee Information Theory and Communication 1/1 Roadmap Examples and Types of Codes Kraft Inequality
More informationSingle Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors
Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate
More informationChapter 1 Coding for Reliable Digital Transmission and Storage
Wireless Information Transmission System Lab. Chapter 1 Coding for Reliable Digital Transmission and Storage Institute of Communications Engineering National Sun Yat-sen University 1.1 Introduction A major
More informationLecture 3 Cellular Systems
Lecture 3 Cellular Systems I-Hsiang Wang ihwang@ntu.edu.tw 3/13, 2014 Cellular Systems: Additional Challenges So far: focus on point-to-point communication In a cellular system (network), additional issues
More informationphotons photodetector t laser input current output current
6.962 Week 5 Summary: he Channel Presenter: Won S. Yoon March 8, 2 Introduction he channel was originally developed around 2 years ago as a model for an optical communication link. Since then, a rather
More informationMultilevel RS/Convolutional Concatenated Coded QAM for Hybrid IBOC-AM Broadcasting
IEEE TRANSACTIONS ON BROADCASTING, VOL. 46, NO. 1, MARCH 2000 49 Multilevel RS/Convolutional Concatenated Coded QAM for Hybrid IBOC-AM Broadcasting Sae-Young Chung and Hui-Ling Lou Abstract Bandwidth efficient
More informationarxiv: v1 [math.co] 7 Aug 2012
arxiv:1208.1532v1 [math.co] 7 Aug 2012 Methods of computing deque sortable permutations given complete and incomplete information Dan Denton Version 1.04 dated 3 June 2012 (with additional figures dated
More informationLecture 18 - Counting
Lecture 18 - Counting 6.0 - April, 003 One of the most common mathematical problems in computer science is counting the number of elements in a set. This is often the core difficulty in determining a program
More informationXenon 1902g-bf. Battery-Free Wireless Scanner FAQs BATTERY-FREE ALERTS. Why don t I see any alerts? Why don t alerts happen while I am scanning?
Xenon 1902g-bf Battery-Free Wireless Scanner FAQs BATTERY-FREE ALERTS Why don t I see any alerts? Alerts only happen when the following conditions have been met: The discharge level specified for a given
More informationYale University Department of Computer Science
LUX ETVERITAS Yale University Department of Computer Science Secret Bit Transmission Using a Random Deal of Cards Michael J. Fischer Michael S. Paterson Charles Rackoff YALEU/DCS/TR-792 May 1990 This work
More informationMULTILEVEL RS/CONVOLUTIONAL CONCATENATED CODED QAM FOR HYBRID IBOC-AM BROADCASTING
MULTILEVEL RS/CONVOLUTIONAL CONCATENATED CODED FOR HYBRID IBOC-AM BROADCASTING S.-Y. Chung' and H. Lou Massachusetts Institute of Technology Cambridge, MA 02139. Lucent Technologies Bell Labs Murray Hill,
More informationNON-OVERLAPPING PERMUTATION PATTERNS. To Doron Zeilberger, for his Sixtieth Birthday
NON-OVERLAPPING PERMUTATION PATTERNS MIKLÓS BÓNA Abstract. We show a way to compute, to a high level of precision, the probability that a randomly selected permutation of length n is nonoverlapping. As
More information6. FUNDAMENTALS OF CHANNEL CODER
82 6. FUNDAMENTALS OF CHANNEL CODER 6.1 INTRODUCTION The digital information can be transmitted over the channel using different signaling schemes. The type of the signal scheme chosen mainly depends on
More informationNew Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length
New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length Yusuke Naito Mitsubishi Electric Corporation Kan Yasuda NTT Secure latform Laboratories 1 Sponge Based
More informationArea and Energy-Efficient Crosstalk Avoidance Codes for On-Chip Buses
Area and Energy-Efficient Crosstalk Avoidance Codes for On-Chip Buses Srinivasa R. Sridhara, Arshad Ahmed, and Naresh R. Shanbhag Coordinated Science Laboratory/ECE Department University of Illinois at
More informationVHDL based Design of Convolutional Encoder using Vedic Mathematics and Viterbi Decoder using Parallel Processing
IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 01 July 2016 ISSN (online): 2349-784X VHDL based Design of Convolutional Encoder using Vedic Mathematics and Viterbi Decoder
More informationMITOCW watch?v=-qcpo_dwjk4
MITOCW watch?v=-qcpo_dwjk4 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To
More informationEE521 Analog and Digital Communications
EE521 Analog and Digital Communications Questions Problem 1: SystemView... 3 Part A (25%... 3... 3 Part B (25%... 3... 3 Voltage... 3 Integer...3 Digital...3 Part C (25%... 3... 4 Part D (25%... 4... 4
More informationUNIT-III ASYNCHRONOUS SEQUENTIAL CIRCUITS TWO MARKS 1. What are secondary variables? -present state variables in asynchronous sequential circuits 2. What are excitation variables? -next state variables
More informationChapter 6 Passband Data Transmission
Chapter 6 Passband Data Transmission Passband Data Transmission concerns the Transmission of the Digital Data over the real Passband channel. 6.1 Introduction Categories of digital communications (ASK/PSK/FSK)
More informationDigital Television Lecture 5
Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during
More informationDepartment of Electronics and Communication Engineering 1
UNIT I SAMPLING AND QUANTIZATION Pulse Modulation 1. Explain in detail the generation of PWM and PPM signals (16) (M/J 2011) 2. Explain in detail the concept of PWM and PAM (16) (N/D 2012) 3. What is the
More informationThe Capability of Error Correction for Burst-noise Channels Using Error Estimating Code
The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June
More information