2014
DOI: 10.1109/tmag.2014.2321021
|View full text |Cite
|
Sign up to set email alerts
|

EXIT Chart Analysis of Nonbinary Protograph LDPC Codes for Partial Response Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…In this section, we try to design protograph code which is suitable for the improved M -ary DSCK system. Specific protograph codes can be carefully designed for the specific communication system to further boost the system performance [30]. Besides, P-EXIT algorithm is also a powerful tool to search the ideal codeword without complex simulations.…”
Section: Proposed Protograph Code For Improved M-ary Dcsk Systemmentioning
confidence: 99%
“…In this section, we try to design protograph code which is suitable for the improved M -ary DSCK system. Specific protograph codes can be carefully designed for the specific communication system to further boost the system performance [30]. Besides, P-EXIT algorithm is also a powerful tool to search the ideal codeword without complex simulations.…”
Section: Proposed Protograph Code For Improved M-ary Dcsk Systemmentioning
confidence: 99%
“…Proof of Lemma 3 Proof: In Case 1.1, the number of instances is the number of ways to choose 2 overlaps out of t {i1,i2} overlaps (the pattern has two c 1 − c 2 overlaps), which is given by (6). In Case 1.2, the number of instances is the number of ways to choose 1 overlap out of t {i1,i2} and 1 overlap out of t {i1+(r−e)γ,i2+(r−e)γ} , which is given by (7).…”
Section: Appendix a Proofs Of Pattern Pmentioning
confidence: 99%
“…Moreover, F k≥2 P1,1 is the sum of function B P1 in (7), with r = 1 and e = k, over all possible values of {i 1 , i 2 }. Here, {i 1 , i 2 } can take any distinct two values in the range from the start of R k to the end of R 1 , i.e., from (k − 1)γ to (m + 1)γ − 1 (see also Fig.…”
Section: B Proof Of Theoremmentioning
confidence: 99%
“…Based on the PEXIT algorithm and AWD, many contributions related to the design and analysis of protograph codes as well as their variants have been achieved for a variety of channel conditions [59]- [62], [66]- [80], [83], [88], [94]- [116]. Furthermore, the applications of protograph codes to other areas beyond channel coding, such as JSCC and JCPNC, have been extensively investigated [117]- [123].…”
Section: E Historical Development Of Protograph Codesmentioning
confidence: 99%
“…, 11) have been produced for PR channels based on the proposed rate-9/10 protograph code in the same paper. Inspired by the above-mentioned publications, non-binary protograph codes have already been investigated over PR channels in [116], where the infinite-length EXIT algorithm has also been extended to the non-binary domain in order to measure the convergence performance (i.e., decoding threshold) of non-binary protograph codes. Nonetheless, the authors in [116] have restricted their attention to the analysis aspect and have not provided any design results.…”
Section: Design Of Protograph Codes In Pr Channelsmentioning
confidence: 99%