2014
DOI: 10.1109/tcomm.2014.2382126
|View full text |Cite
|
Sign up to set email alerts
|

Density Evolution for the Design of Non-Binary Low Density Parity Check Codes for Slepian-Wolf Coding

Abstract: International audienceIn this paper, we investigate the problem of designing good non-binary LDPC codes for Slepian-Wolf coding. The design method is based on Density Evolution which gives the asymptotic error probability of the decoder for given code degree distributions. Density Evolution was originally introduced for channel coding under the assumption that the channel is symmetric. In Slepian-Wolf coding, the correlation channel is not necessarily symmetric and the source distribution has to be taken into … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
12
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 35 publications
1
12
0
Order By: Relevance
“…Extrinsic information transfer chart (EXIT) tool has attracted great attention in the design of LDPC codes in wireless systems [25]- [28]. In this section, symbol-wise extrinsic information transfer (SEXIT) chart [24], [29]- [32] is employed to optimized the concatenated non-binary LDPC code to further improve the system performance when IDD-aided receiver is used. Before we proceed to the computation of SEXIT, it is needed to give a description of the method to model the a-priori information and the method to evaluation the average mutual information (AMI) [33].…”
Section: Sexit Chart Based Analysis and Optimizationmentioning
confidence: 99%
“…Extrinsic information transfer chart (EXIT) tool has attracted great attention in the design of LDPC codes in wireless systems [25]- [28]. In this section, symbol-wise extrinsic information transfer (SEXIT) chart [24], [29]- [32] is employed to optimized the concatenated non-binary LDPC code to further improve the system performance when IDD-aided receiver is used. Before we proceed to the computation of SEXIT, it is needed to give a description of the method to model the a-priori information and the method to evaluation the average mutual information (AMI) [33].…”
Section: Sexit Chart Based Analysis and Optimizationmentioning
confidence: 99%
“…A similar expression was considered in [14], [17] in the case of an asymmetric communication channel, and asymmetric VN and CN mappings, but without deviations in the decoder. In the expression of p( ) e in ( 8), the second term comes from the case where the APP decision gives…”
Section: A Error Probability Evaluationmentioning
confidence: 99%
“…In this equation, the parameter b 0, is associated to channel output β 0 = 0 while the parameter b 1, is associated to channel output β 0 = 1. The Gallager B CN update given in (17) does not change.…”
Section: A Asymmetric Parameters In the Gallager B Decodermentioning
confidence: 99%
“…In the binary matrix multiplication of (1), additions correspond to XOR operations and multiplications correspond to AND operations. Once it receives syndrom c m , the decoder produces an estimatex n of x n by applying the Belief Propagation algorithm (BP) to c m and the side information vector y n [8], [16].…”
Section: A Ldpc Codes For Slepian-wolf Source Codingmentioning
confidence: 99%