-
Codes approaching the Shannon limit with polynomial complexity per information bit
Abstract: We consider codes for channels with extreme noise that emerge in various low-power applications. Simple LDPC-type codes with parity checks of weight 3 are first studied for any dimension $m\rightarrow\infty.$ These codes form modulation schemes: they improve the original channel output for any $SNR>$ $-6$ dB (per information bit) and gain $3$ dB over uncoded modulation as $SNR$ grows. However, the… ▽ More
Submitted 25 January, 2021; originally announced January 2021.
Comments: 18 pages, 3 figures
-
Numerical and analytical bounds on threshold error rates for hypergraph-product codes
Abstract: We study analytically and numerically decoding properties of finite rate hypergraph-product quantum LDPC codes obtained from random (3,4)-regular Gallager codes, with a simple model of independent X and Z errors. Several non-trival lower and upper bounds for the decodable region are constructed analytically by analyzing the properties of the homological difference, equal minus the logarithm of the… ▽ More
Submitted 13 June, 2018; v1 submitted 5 April, 2018; originally announced April 2018.
Comments: 14 pages, 5 figures
Journal ref: Phys. Rev. A 97, 062320 (2018)
-
An elementary description of polarization process
Abstract: We analyze successive cancellation (SC) decoder by using two random functions. The first function is related to the likelihoods of 0 and 1 in each code position, while the second gives the difference between their posterior probabilities. We then study the second power moments of both functions. We show that these moments are being squared in channel transformations, while their product tends to 0… ▽ More
Submitted 23 May, 2020; v1 submitted 21 June, 2017; originally announced June 2017.
Comments: The paper employs wrong equation (14) in Section 5. This equation is then used in Sections 6 and 7. In particular, Theorem 1 of Section 6 contains incorrect proof
-
arXiv:1703.05307 [pdf, ps, other]
On decoding algorithms for polar codes
Abstract: We survey the known list decoding algorithms for polar codes and compare their complexity. Index terms: Polar codes; Reed-Muller codes; successive cancellation decoding.
Submitted 17 March, 2017; v1 submitted 14 March, 2017; originally announced March 2017.
Comments: 4 pages, 2 figures
-
arXiv:1703.05306 [pdf, ps, other]
Recursive Decoding and Its Performance for Low-Rate Reed-Muller Codes
Abstract: Recursive decoding techniques are considered for Reed-Muller (RM) codes of growing length $n$ and fixed order $r.$ An algorithm is designed that has complexity of order $n\log n$ and corrects most error patterns of weight up to $n(1/2-\varepsilon)$ given that $\varepsilon$ exceeds $n^{-1/2^{r}}.$ This improves the asymptotic bounds known for decoding RM codes with nonexponential complexity.
Submitted 14 March, 2017; originally announced March 2017.
Journal ref: IEEE Trans. Info. Theory, vol. 50, pp. 811-823, 2004
-
arXiv:1703.05305 [pdf, ps, other]
Soft decision decoding of Reed-Muller codes: recursive lists
Abstract: Recursive list decoding is considered for Reed-Muller (RM) codes. The algorithm repeatedly relegates itself to the shorter RM codes by recalculating the posterior probabilities of their symbols. Intermediate decodings are only performed when these recalculations reach the trivial RM codes. In turn, the updated lists of most plausible codewords are used in subsequent decodings. The algorithm is fur… ▽ More
Submitted 14 March, 2017; originally announced March 2017.
Journal ref: IEEE Trans. Info. Theory, vol. 52, no. 3, pp. 1260-1266, 2006
-
Recursive List Decoding for Reed-Muller Codes
Abstract: We consider recursive decoding for Reed-Muller (RM) codes and their subcodes. Two new recursive techniques are described. We analyze asymptotic properties of these algorithms and show that they substantially outperform other decoding algorithms with nonexponential complexity known for RM codes. Decoding performance is further enhanced by using intermediate code lists and permutation procedures. Fo… ▽ More
Submitted 14 March, 2017; originally announced March 2017.
Journal ref: "Information, Coding and Mathematics", ed. M. Blaum, P. Farrell, and H.C.A. van Tilborg, Kluwer, Boston, 2002, pp. 279-298
-
arXiv:1703.05303 [pdf, ps, other]
Recursive decoding of Reed-Muller codes
Abstract: New soft- and hard decision decoding algorithms are presented for general Reed-Muller codes $\left\{\genfrac{}{}{0pt}{}{m}{r}\right\} $ of length $2^{m}$ and distance $2^{m-r}$. We use Plotkin $(u,u+v)$ construction and decompose code $\left\{\genfrac{}{}{0pt}{}{m}{r}\right\} $ onto subblocks $u\in\left\{\genfrac{}{}{0pt}{}{m-1}{r}\right\} $ and… ▽ More
Submitted 14 March, 2017; originally announced March 2017.
Journal ref: Proc. 37th Allerton Conf. on Commun., Control, and Computing, Monticello, IL, USA, 1999, pp. 61-69
-
arXiv:1703.05302 [pdf, ps, other]
Recursive constructions and their maximum likelihood decoding
Abstract: We consider recursive decoding techniques for RM codes, their subcodes, and newly designed codes. For moderate lengths up to 512, we obtain near-optimum decoding with feasible complexity.
Submitted 14 March, 2017; originally announced March 2017.
Journal ref: Proc. 38th Allerton Conf. Communication, Control, and Computing, Monticello, IL, USA, 2000, pp. 71-80
-
arXiv:1702.04886 [pdf, ps, other]
Polar codes with a stepped boundary
Abstract: We consider explicit polar constructions of blocklength $n\rightarrow\infty$ for the two extreme cases of code rates $R\rightarrow1$ and $R\rightarrow0.$ For code rates $R\rightarrow1,$ we design codes with complexity order of $n\log n$ in code construction, encoding, and decoding. These codes achieve the vanishing output bit error rates on the binary symmetric channels with any transition error p… ▽ More
Submitted 16 February, 2017; originally announced February 2017.
Comments: This article has been submitted to ISIT 2017
-
Distance verification for classical and quantum LDPC codes
Abstract: The techniques of distance verification known for general linear codes are re-applied to quantum stabilizer codes. Then distance verification is addressed for classical and quantum LDPC codes. New complexity bounds for distance verification with provable performance are derived using the average weight spectra of the ensembles of LDPC codes. These bounds are expressed in terms of the erasure-corre… ▽ More
Submitted 22 November, 2016; originally announced November 2016.
Comments: 16 pages, 2 figures
-
Distance verification for LDPC codes
Abstract: The problem of finding code distance has been long studied for the generic ensembles of linear codes and led to several algorithms that substantially reduce exponential complexity of this task. However, no asymptotic complexity bounds are known for distance verification in other ensembles of linear codes. Our goal is to re-design the existing generic algorithms of distance verification and derive… ▽ More
Submitted 8 May, 2016; originally announced May 2016.
Comments: 5 pages, 1 figure, to appear in Proceedings of ISIT 2016 - IEEE International Symposium on Information Theory, Barcelona
-
Numerical Techniques for Finding the Distances of Quantum Codes
Abstract: We survey the existing techniques for calculating code distances of classical codes and apply these techniques to generic quantum codes. For classical and quantum LDPC codes, we also present a new linked-cluster technique. It reduces complexity exponent of all existing deterministic techniques designed for codes with small relative distances (which include all known families of quantum LDPC codes)… ▽ More
Submitted 2 May, 2014; originally announced May 2014.
Comments: 5 pages, 1 figure, to appear in Proceedings of ISIT 2014 - IEEE International Symposium on Information Theory, Honolulu
-
Linked-Cluster Technique for Finding the Distance of a Quantum LDPC Code
Abstract: We present a linked-cluster technique for calculating the distance of a quantum LDPC code. It offers an advantage over existing deterministic techniques for codes with small relative distances (which includes all known families of quantum LDPC codes), and over the probabilistic technique for codes with sufficiently high rates.
Submitted 7 February, 2013; originally announced February 2013.
Comments: 5.5 pages
-
arXiv:0912.3245 [pdf, ps, other]
Structured Error Recovery for Codeword-Stabilized Quantum Codes
Abstract: Codeword stabilized (CWS) codes are, in general, non-additive quantum codes that can correct errors by an exhaustive search of different error patterns, similar to the way that we decode classical non-linear codes. For an n-qubit quantum code correcting errors on up to t qubits, this brute-force approach consecutively tests different errors of weight t or less, and employs a separate n-qubit meas… ▽ More
Submitted 8 March, 2010; v1 submitted 16 December, 2009; originally announced December 2009.
Comments: 13 pages, 9 eps figures
Journal ref: Phys. Rev. A 81, 052337 (2010)
-
arXiv:cs/0612073 [pdf, ps, other]
On the Fingerprinting Capacity Under the Marking Assumption
Abstract: We address the maximum attainable rate of fingerprinting codes under the marking assumption, studying lower and upper bounds on the value of the rate for various sizes of the attacker coalition. Lower bounds are obtained by considering typical coalitions, which represents a new idea in the area of fingerprinting and enables us to improve the previously known lower bounds for coalitions of size t… ▽ More
Submitted 20 February, 2008; v1 submitted 14 December, 2006; originally announced December 2006.
Comments: final version, 12 pages, 2 figures, to appear in IEEE Trans. on Inform. Theory - Special Issue on Information-theoretic Security, Jun 2008, simplified proofs in Sections II and III, changes in Theorem 4.1
-
arXiv:cs/0406039 [pdf, ps, other]
Long Nonbinary Codes Exceeding the Gilbert - Varshamov Bound for any Fixed Distance
Abstract: Let A(q,n,d) denote the maximum size of a q-ary code of length n and distance d. We study the minimum asymptotic redundancy ρ(q,n,d)=n-log_q A(q,n,d) as n grows while q and d are fixed. For any d and q<=d-1, long algebraic codes are designed that improve on the BCH codes and have the lowest asymptotic redundancy ρ(q,n,d) <= ((d-3)+1/(d-2)) log_q n known to date. Prior to this work, codes of fixe… ▽ More
Submitted 23 June, 2004; v1 submitted 21 June, 2004; originally announced June 2004.
Comments: Submitted to IEEE Trans. on Info. Theory