Professional Documents
Culture Documents
Adjahans Isit09
Adjahans Isit09
Adjahans Isit09
X
(0)
0 t
_
, (1)
where X
(0)
decoding failure}
d
v
n
dv
+
Prob{successful decoding}.
E{L
dv
()
successful decoding}
d
v
n
dv
.
(3)
1
Note that r
1
(y) and its derivative always vanish at y = 0.
When the decoding is successful, the residual graph is
empty, i.e., L
d
v
() = 0. As a result, E
_
L
d
v
()
successful
decoding} = 0, and (3) can be reformulated as follows:
P
(d
v
)
E
= Prob{decoding failure}.
E{L
dv
()
decoding failure}
d
v
n
dv
.
(4)
The problem of the computation of Prob{decoding failure}
has been addressed in [13]. Hence, to derive P
(d
v
)
E
, we will
focus on computation of E{L
d
v
()
| n
6/7
}
1
e
2
, (5)
where t
))
2
X
(0)
t
, (6)
with
1
= f
(00)
2
n
2/3
(1)
2
_
r
1
_
2
2
=
1
n
1/3
(1)
1
_
r
1
_
1
,
where
f
(00)
=
_
y
2
(y
)
(y
)
y
2
(y
)
2
(y
)
2
_
r
2
2
e
2
+
y
(y
)
(y
)
r
2
e
=
_
4
r
2
2
(
(y
)
2
r
2
x
(y
)r
2
+
(y
)x
))
2
(1)
2
( x
)
3
x
10
(2
(y
)
2
r
(y
)r
2
x
)
_
1/3
.
(7)
Note that e
(y
), y
(y
)
x
= 1 x
i
=
_
_
_
(y
) [y
1 +(1
(y
))] if i = 1
mji
(1)
i+j
_
j 1
i 1
__
m1
j 1
_
m
(
(y
))
j
otherwise
(8)
B. Scaling Approximations
It can be shown that () can be described as a two-sided
Brownian motion with a parabolic drift [13]:
(
) = (0) + B(
) +
2
2
, (9)
where B(
; i.e.,
sup
() 0
_
. (10)
Clearly,
=
1
( t
). (11)
It can be shown that [13]
L
d
v
(t) = L
d
v
(t
)
d
v
l
d
v
e
(t t
), (12)
where l
d
v
=
d
v
y
d
v
. As a result,
L
d
v
() = L
d
v
(t
)
d
v
l
dv
e
( t
)
= L
d
v
(t
)
d
v
l
dv
e
.
(13)
Consequently, one can show that [11]
E{L
d
v
()
decoding failure} = d
v
n
d
v
dv
d
v
l
dv
e
1
E{
decoding failure}.
(14)
Lets dene the conditional cumulative probability density
function of
as
F
decoding failure}.
(15)
It is not hard to see that
E{
decoding failure} =
_
0
1 F
decoding failure)d
_
0
decoding failure)d.
(16)
Dene
g() Prob{(
) > 0
}. (17)
From the denition of the conditional cumulative density
function, we have
F
decoding failure) =
Prob{
, decoding failure}
Prob{decoding failure}
=
1g()
Prob{decoding failure}
.
(18)
We will proceed by dividing the problem of computation of
g() into two cases. The rst case corresponds to scenarios
where 0, and the second case corresponds to scenarios
where > 0.
Case 1 ( 0). By the denition of g(),
g()= Prob{(
) > 0
}
=
_
0
Prob{(
) > 0
<
() = }P{() = }d,
(19)
where () has a Gaussian distribution [13]. We denote the
mean and the variance of () as follows:
() E{()}
2
() E{
2
()} E
2
{()}.
(20)
As a result,
P{() = } =
1
2()
e
(())
2
2
2
()
. (21)
One can show that
() = (0) +
2
2
2
() =
2
(0) +||.
(22)
Dene a process () as follows:
(
) (
)
= (0)
2
2
B(
).
(23)
It is not hard to see that B(
) B(
), where
B(
) > 0
<
() = } =
Prob{ (
) < 0
>
() = }.
(24)
The righthand side of Eq. (24) corresponds to the probability
that the maximum of a two-sided Brownian motion with a
parabolic drift is less than zero. This problem has been studied
in [14]. Adapting the results from [14] to our situation, we
have
Prob{(
) > 0
<
() = } = 2
2
3
e
3
+6
6
_
e
i
Ai(i2
1/3
)Bi(i2
1/3
+2
1/3
)Bi(i2
1/3
)Ai(i2
1/3
+2
1/3
)
Ai(i2
1/3
)
d.
(25)
where i =
1, and Ai(), and Bi(), are the Airy functions
dened on page 446, of [15]. Putting everything together, for
0, we have
g() =
2
2
3
2()
_
0
e
(())
2
2
2
()
+
6
3
6
_
e
i
Ai(i2
1/3
)Bi(i2
1/3
+2
1/3
)Bi(i2
1/3
)Ai(i2
1/3
+2
1/3
)
Ai(i2
1/3
)
dd.
(26)
Now lets focus on the second case, i.e., when 0.
Case 2 ( > 0). Since B(0) = 0, computation of g()
when > 0 requires a slightly different approach. Its not
hard to see that
g() =
_
0
P{(0) = }Prob{(
) > 0
< 0
(0) = }
Prob{(
) > 0 0 <
<
(0) = }d.
(27)
Pursuing steps similar to those used in the calculation of g()
in the rst case, one can easily show that
Prob{(
) > 0
< 0
(0) = } = 2
2
3
_
Ai(i2
1/3
)Bi(i2
1/3
+2
1/3
)Bi(i2
1/3
)Ai(i2
1/3
+2
1/3
)
Ai(i2
1/3
)
d,
(28)
and
P{(0) = } =
1
2(0)
e
((0))
2
2
2
(0)
. (29)
One can further see that
Prob{(
) > 0 0 <
<
(0) = } =
Prob{ (
) < 0 0 <
<
(0) = }.
(30)
Again using results from [14], we have
Prob{(
) > 0 0 <
<
(0) = } =
1
_
0
e
3
6
h 1
2
,
()d,
(31)
ISIT 2009, Seoul, Korea, June 28 - July 3, 2009
1826
where the function h1
2
,
() has the Laplace transform
H1
2
,
() =
_
0
e
h1
2
,
()d
= Ai
_
2
1/3
( +)
_
/Ai
_
2
1/3
_
.
(32)
Putting everything together, we deduce that, when > 0,
g() =
2
2
3
2(0)
_
0
e
((0))
2
2
2
(0)
_
1
_
0
e
3
6
h 1
2
,
()d
_
_
Ai(i2
1/3
)Bi(i2
1/3
+2
1/3
)Bi(i2
1/3
)Ai(i2
1/3
+2
1/3
)
Ai(i2
1/3
)
dd.
(33)
C. Bounds on the Bit Erasure Rate
Due to the complexity of the numerical evaluation of g(),
we further derived upper and lower bounds on g(). These
bounds can be employed in the computation of upper and
lower bounds on the scaling approximation to the bit erasure
rate. It can be shown that, for 0 [11],
1 Q(
(0)
(0)
)
1
(0)
e
(0)
2
2
(0)
g()
min
M>0
__
1 Q
_
(0, M)
(0)
_
(1 + M)
1/3
(0)
e
(0,M)
2
2
(0)
_
1
2
_
1 Q
_
(0,M)
(0)
__1
2
_
,
(34)
with
(0) =
2
(
)
R
1
+
1
2
2
2
(0) =
2
2
2
n
_
R
1
_
2
+||
(0, M) =
2
(
)
R
1
+
2
2
_
1 +
1
M
_
2
(0) =
2
2
2
n
_
R
1
_
2
+||.
(35)
where
R
1
2
(
x
)(
x
2
)+
(
x
)(12x
(
x
))
x
(
x
2
)
(1)
2
(y
(
x
)
2
+
(
)
2
2
(y
)(
)
2
((y
)
2
)(y
)
2
(
)
2
((y
)
2
)
(1)
2
(y
)
_
1
2
.
(36)
For 0, it can be shown that [11],
Prob{successful decoding} g()
Prob{successful decoding}
_
1Q(
()
()
)
_
1Q(
(0)
(0)
)
1
2 (0)
e
(0)
2
2
(0)
,
(37)
where the problem of the computation of Prob {successful
decoding} has been addressed in [13].
IV. NUMERICAL ANALYSIS
To empirically investigate the accuracy of the scaling
approximations, we performed Monte Carlo simulations of
random LDPC code ensembles of various lengths and degree
distributions over BECs.
In Figures 1 and 2, we compare the simulated bit erasure
rates of degree-3 and degree-9 variable nodes with the results
0.34 0.36 0.38 0.4 0.42 0.44 0.46
10
4
10
3
10
2
10
1
10
0
B
i
t
E
r
a
s
u
r
e
R
a
t
e
d
v
=3
Simulation Results
Scaling Approximation
Lower Bound
Upper Bound
n=1000 n=8000
n=2000 n=4000
Fig. 1. Bit erasure rate curves of degree-3 variable nodes of LDPC(n, (x) =
2
5
x
2
+
12
25
x
3
+
3
25
x
8
, (x) =
7
15
x
6
+
8
15
x
7
) codes when used over binary
erasure channel of erasure probability .
0.34 0.36 0.38 0.4 0.42 0.44 0.46
10
4
10
3
10
2
10
1
10
0
B
i
t
E
r
a
s
u
r
e
R
a
t
e
d
v
=9
Simulation Results
Scaling Approximation
Lower Bound
Upper Bound
n=1000 n=8000
n=4000 n=2000
Fig. 2. Bit erasure rate curves of degree-9 variable nodes of LDPC(n, (x) =
2
5
x
2
+
12
25
x
3
+
3
25
x
8
, (x) =
7
15
x
6
+
8
15
x
7
) codes when used over binary
erasure channel of erasure probability .
obtained from our scaling approximation, and both upper
and lower bounds for LDPC code ensembles with parameters
(x) =
2
5
x
2
+
12
25
x
3
+
3
25
x
8
and (x) =
7
15
x
6
+
8
15
x
7
. In each
graph, we present results for codes of length n = 1000, 2000,
4000, and 8000. Note that the simulation results are quite
close to the scaling approximation. Furthermore, by increasing
the code length, the upper and lower bounds also become very
close to the simulation results.
V. CONCLUDING REMARKS
In this paper, we investigated the UEP properties of nite-
length irregular LDPC codes in the waterfall region of the
peeling decoder. We introduced a scaling approach to compute
the bit erasure rate of variable nodes with a given degree over
BECs. Simulation results showed that, for a wide range of code
ISIT 2009, Seoul, Korea, June 28 - July 3, 2009
1827
lengths, scaling approximations provide a very close estimate
to the bit erasure rate. We further derived upper and lower
bounds on the scaling approximation to the bit erasure rate.
We showed that these bounds are quite tight, and by increasing
the length of the code, they become very close to the Monte
Carlo simulation results.
VI. ACKNOWLEDGEMENT
This research was supported by LG Electronics, the Center
for Wireless Communications at UCSD, and by the UC
Discovery program. Furthermore, the authors would like to
thank Prof. Patrick Fitzsimmons and Prof. R udiger Urbanke
for helpful discussions.
APPENDIX
PROOF OF LEMMA 1
In this appendix, we present the proof of Lemma 1. We start
by showing that with high probability, |X
(0)
t
| < n
2/3
.Then,
we show that, for any time t such that X
(0)
t
X
(0)
t
< n
2/3
,
with high probability we have |t t
| < n
6/7
. Combining
these two results, we deduce that for any time t, such that
|t t
| n
6/7
, with high probability X
(0)
t
is bounded away
from zero, which concludes the proof of the Lemma.
It can be shown that (see [[13], Lemma 4] for the proof)
Prob
_
|X
(0)
t
X
(0)
t
| n
7/12
_
2e
n
7/6
2
0
t
, (38)
where
0
is a positive constant and independent of n. Con-
sider the fact that
X
(0)
t
is of order O(
= O(n
1/2
) [13]. One can show that, for
values of n large enough,
Prob
_
|X
(0)
t
| n
2/3
_
2e
n
7/6
2
0
t
, (39)
which implies the fact that as n , the absolute value of
X
(0)
t
4
_
X
(0)
t
X
(0)
t
_
, (40)
where
4
is a positive constant. Let t
l
2
l
n
6/7
2/3
, where
is a positive constant. For the sake of simplicity, here we
will focus on the case t > t
can be treated
similarly. Then,
Prob{min
tn
6
7
2
3
Y
t
n
2
3
4
3
}
l=0
Prob{min
t
l
t <t
l+1
Y
t
n
2
3
4
3
},
(41)
or, equivalently,
Prob{min
tn
6
7
2
3
Y
t
n
2
3
4
3
}
l=0
Prob{min
t
l
t <t
l+1
Y
t
1
n
t
2
+
5
n
t
n
2
3
4
3
1
n
t
2
l
+
5
n
t
l+1
},
(42)
where
5
is a positive constant. Adapting a result on the
concentration properties of the X
(0)
t
from [[13], Eq. (2.27)],
we can rewrite (42) as
Prob{min
tn
6
7
2
3
Y
t
n
2
3
4
3
}
l=0
exp
_
2
t
l+1
_
n
2
3
4
3
1
n
t
2
l
+
5
n
t
l+1
_
2
_
,
(43)
where
1
and
2
are positive constants. After some algebraic
manipulations, one can show that
Prob{min
tn
6
7
2
3
Y
t
n
2
3
4
3
}
l=0
exp
_
2
n
4
7
2
l+1
_
2
2l
n
1
21
5
2
l+1
n
5
14
1/3
_
2
_
.
(44)
For n > max
_
1, (2
5
1/3
)
14/5
_
,
Prob{min
tn
6
7
2
3
Y
t
n
2
3
4
3
}
1
exp
_
2
n
4
7
2
_
1 n
1
21
2
5
n
5
14
1/3
_
2
_
+
l=1
exp
_
2
n
4
7
2
l+1
_
2
2l
1 2
l
_
2
_
.
(45)
Now it is not hard to show that there exist two positive
constants,
1
, and
2
, such that [11]
Prob{min
tn
6
7
2
3
Y
t
n
2
3
4
3
}
1
exp{
2
}. (46)
Note that
1
and
2
are not necessarily the same as
1
and
2
. Combining the results from (39), (40), and (46) concludes
the proof.
REFERENCES
[1] D. J. C. MacKay, Good error-correcting codes based on very sparse
matrices, IEEE Transactions on Information Theory, vol. 45, pp. 399
431, 1999.
[2] R. G. Gallager, Low Density Parity Check Codes, Monograph, M.I.T.
Press, 1963.
[3] V. Kumar and O. Milenkovic, On unequal error protection LDPC
codes based on Plotkin-type constructions, Global Telecommunications
Conference, vol. 1, pp. 493497, 2004.
[4] N. Rahnavard, and F. Fekri, New results on unequal error protection
using LDPC codes, IEEE Communication Letters, vol. 10, pp. 493
497, Jan. 2006.
[5] H. Pishro-Nik, N. Rahnavard, and F. Fekri, Nonuniform error cor-
rection using low-density parity-check codes, IEEE Transactions on
Information Theory, vol. 51, pp. 2702 2714, July 2005.
[6] N. Rahnavard, H. Pishro-Nik, and F. Fekri, Unequal error protection
using partially regular LDPC codes, IEEE Transactions on Communi-
cations, vol. 55, pp. 387 391, March 2007.
[7] A. Amraoui, A. Montanari, T. Richardson, R. Urbanke, Finite-length
scaling for iteratively decoded LDPC ensembles, arXiv:cs/0406050v1
[cs.IT] 26 Jun 2004 .
[8] A. Amraoui, R. Urbanke, and A. Montanari, Finite-length scaling of
irregular LDPC code ensembles, IEEE Information Theory Workshop,
2005.
[9] T. Richardson and R. Urbanke, Modern Coding Theory, Cambridge
University Press, 2008.
[10] M. Luby, M. Mitzenmacher, A. Shokrollahi, D. Spielman, and V.
Stemann, Practical loss-resilient codes, in Proceedings of the 29th
annual ACM Symposium on Theory of Computing, pp. 150 159, 1997.
[11] A. H. Djahanshahi, Joint Equalization and Decoding of Graph-
Based Codes in Multiple-Antenna Systems, PhD Thesis, University of
California - San Diego, In Preparation.
[12] A. Amraoui, A. Montanari, T. Richardson, R. Urbanke, Finite-
length scaling and nite-length shift for low-density parity-check codes,
arXiv:cs/0410019v1 [cs.IT] 10 Oct. 2004 .
[13] A. Amraoui, Asymptotic and nite-length optimization of LDPC codes,
PhD thesis,
Ecole Polytechnique F ed eration De Lausanne, 2006.
[14] P. Groeneboom, Brownian motion with a parabolic drift and Airy
functions, Probab. Theory Related Fields, vol. 81, pp. 79109, 1989.
[15] M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions,
Nat. Bur. Stand. 55, Washington, 1964.
ISIT 2009, Seoul, Korea, June 28 - July 3, 2009
1828