亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? decoding.html

?? 關于LDPC編/譯碼的方針平臺。能隨機產生信源和模擬高斯信道。
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
<HTML><HEAD><TITLE> Decoding Received Blocks </TITLE></HEAD><BODY><H1> Decoding Received Blocks </H1>Transmitted codewords are decoded from the received data on the basisof the <I>likelihood</I> of the possible codewords, which is theprobability of receiving the data that was actually received if thecodeword is question were the one that was sent.  This softwarepresently deals only with memoryless channels, in which the noise isindependent from bit to bit.  For such a channel, the likelihoodfactorizes into a product of likelihoods for each bit.  For decoding purposes, all that matters is the relative likelihoodfor a bit to be 1 versus 0.  This is captured by the <I>likelihoodratio</I> in favour of a 1, which is P(data | bit is 1) / P(data |bit is 0).  <P>For a Binary Symmetric Channel with error probability <I>p</I>, the likelihood ratio in favour of a 1 bit is as follows:<BLOCKQUOTE>  If the received data was +1: (1-<I>p</I>) / <I>p</I><BR>  If the received data was -1: <I>p</I> / (1-<I>p</I>)</BLOCKQUOTE>For an Additive White Gaussian Noise channel, with signals of +1 for a 1 bitand or -1 for a 0 bit, and with noise standard deviation <I>s</I>, thelikelihood ratio in favour of a 1 bit when data <I>y</I> was received is<BLOCKQUOTE>  exp ( 2y / s<SUP><SMALL>2</SMALL></SUP> )</BLOCKQUOTE>For an Additive White Logistic Noise channel, the correspondinglikelihood ratio is<I>d</I><SUB><SMALL>1</SMALL></SUB>/<I>d</I><SUB><SMALL>0</SMALL></SUB>,where<I>d</I><SUB><SMALL>1</SMALL></SUB>=<I>e</I><SUB><SMALL>1</SMALL></SUB>/ (1+<I>e</I><SUB><SMALL>1</SMALL></SUB>)<SUP><SMALL>2</SMALL></SUP> and<I>d</I><SUB><SMALL>0</SMALL></SUB>=<I>e</I><SUB><SMALL>0</SMALL></SUB>/ (1+<I>e</I><SUB><SMALL>0</SMALL></SUB>)<SUP><SMALL>2</SMALL></SUP>,with <I>e</I><SUB><SMALL>1</SMALL></SUB>=exp(-(<I>y</I>-1)/<I>w</I>) and<I>e</I><SUB><SMALL>0</SMALL></SUB>=exp(-(<I>y</I>+1)/<I>w</I>).<BLOCKQUOTE> </BLOCKQUOTE><P>It is usual to consider codewords to be equally likely <I>apriori</I>.  This is reasonable if the source messages are all equallylikely (any source redundancy being ignored, or remove by apreliminary data compression stage), provided that the mapping fromsource messages to codewords is onto.  Decoding can then be done usingonly the parity check matrix defining the codewords, without referenceto the generator matrix defining the mapping from source messages tocodewords.  Note that the condition that this mapping be onto isn'ttrue with this software in the atypical case where the code is definedby a parity check matrix with redundant rows; see the discussion of <AHREF="dep-H.html">linear dependence in parity check matrices</A>.This minor complication is mostly ignored here, except by the exhaustiveenumeration decoding methods.<P>Assuming equal <I>a priori</I> probabilities for codewords, theprobability of correctly decoding an entire codeword is minimized bypicking the codeword with the highest likelihood.  One might insteadwish to decode each bit to the value that is most probable.  Thisminimizes the bit error rate, but is not in general guaranteed to leada decoding for each block to the most probable complete codeword;indeed, the decoding may not be a codeword at all.  Minimizing the biterror rate seems nevertheless to be the most sensible objective,unless block boundaries have some significance in a wider context.<P>Optimal decoding by either criterion is infeasible for generallinear codes when messages are more than about 20 or 30 bits inlength.  The fundamental advantage of Low Density Parity Check codesis that good (though not optimal) decodings can be obtained by methodssuch as probability propagation, described next.<A NAME="prprp"><H2>Decoding by probability propagation</H2></A><P>The probability propagation algorithm was originally devised byRobert Gallager in the early 1960's and later reinvented by DavidMacKay and myself.  It can be seen as an instance of the sum-productalgorithm for inference on factor graphs, and as an instance of beliefpropagation in probabilistic networks.  See the <AHREF="refs.html">references</A> for details.  Below, I give a fairlyintuitive description of the algorithm.<P>The algorithm uses only the parity check matrix for the code, whosecolumns correspond to codeword bits, and whose rows correspond toparity checks, and the likelihood ratios for the bits derived from thedata.  It aims to find the probability of each bit of the transmittedcodeword being 1, though the results of the algorithm are in generalonly approximate.<P>The begin, information about each bit of the codeword derived fromthe received data for that bit alone is expressed as a <I>probabilityratio</I>, the probability of the bit being 1 divided by theprobability of the bit being 0.  This probability ratio is equal tothe likelihood ratio (see above) for that bit, since 0 and 1 areassumed to be equally likely <I>a priori</I>.  As the algorithmprogresses, these probability ratios will be modified to take accountof information obtained from other bits, in conjunction with therequirement that the parity checks be satisfied.  To avoid doublecounting of information, for every bit, the algorithm maintains aseparate probability ratio for each parity check that that bitparticipates in, giving the probability for that bit to be 1 versus 0based only on information derived from <I>other</I> parity checks,along with the data received for the bit.<P>For each parity check, the algorithm maintains separate<I>likelihood ratios</I> (analogous to, but distinct from, thelikelihood ratios based on received data), for every bit thatparticipates in that parity check.  These ratios give the probabilityof that parity check being satisfied if the bit in question is 1divided by the probability of the check being satisfied if the bit is0, taking account of the probabilities of each of the <I>other</I>bits participating in this check being 1, as derived from theprobability ratios for these bits with respect to this check.<P>The algorithm alternates between recalculating the likelihoodratios for each check, which are stored in the <B>lr</B> fields of theparity check matrix entries, and recalculating the probability ratiosfor each bit, which are stored in the <B>pr</B> fields of the entriesin the sparse matrix representation of the parity check matrix.  (Seethe documentation on <A HREF="mod2sparse.html#rep">representation ofsparse matrices</A> for details on these entries.)<P>Recalculating the likelihood ratio for a check with respect to somebit may appear time consuming, requiring that all possiblecombinations of values for the other bits participating in the checkbe considered.  Fortunately, there is a short cut.  One can calculate<BLOCKQUOTE> <I>t</I>  = product of [ 1 / (1+<I>p<SUB><SMALL>i</SMALL></SUB></I>)               - <I>p<SUB><SMALL>i</SMALL></SUB></I> /                       (1+<I>p<SUB><SMALL>i</SMALL></SUB></I>) ] = product of [ 2 / (1+<I>p<SUB><SMALL>i</SMALL></SUB></I>) - 1 ]</BLOCKQUOTE>where the product is over the probability ratios<I>p<SUB><SMALL>i</SMALL></SUB></I> for the other bits participatingin this check.  Factor <I>i</I> in this product is equal to probabilityof bit <I>i</I> being 0 minus the probability that it is 1.  The terms in the expansion of this product (in the first form above) correspond to possible combinations of values for the other bits, with the result that <I>t</I> will be the probability of the check being satisfied if the bit in question is 0 minus the probability if the bit in question is 1.  The likelihood ratio for this check with respect to the bit in question can then be calculated as (1-<I>t</I>)/(1+<I>t</I>).<P>For a particular check, the product above differs for differentbits, with respect to which we wish to calculate a likelihood ratio,only in that for each bit the factor corresponding to that bit is leftout.  We can calculate all these products easily by ordering the bitsarbitrarily, computing running products of the factor for the firstbit, the factors for the first two bits, etc., and also runningproducts of the factor for the last bit, the factors for the last twobits, etc.  Multiplying the running product of the factors up to<I>i</I>-1 by the running product of the factors from <I>i</I>+1 ongives the product needed for bit <I>i</I>.  The second form of the factors above is used, as it requires less computation, and is stillwell defined even if some ratios are infinite.<P>To recalculate the probability ratio for a bit with respect to acheck, all that is need is to multiply together the likelihood ratiofor this bit derived from the received data (see above), and thecurrent values of the likelihood ratios for all the <I>other</I>checks that this bit participates in, with respect to this bit.  Tosave time, these products are computed by combining forward and backward products, similarly to the method used for likelihood ratios.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
一区二区三区在线观看网站| 秋霞av亚洲一区二区三| 亚洲精品视频在线观看免费| 麻豆91小视频| 日韩视频123| 91免费版pro下载短视频| 欧美激情中文不卡| 欧美岛国在线观看| 欧美日韩日日夜夜| 欧美午夜精品理论片a级按摩| 91亚洲精品久久久蜜桃网站 | 久久精品久久99精品久久| 91精品国产综合久久久久久久久久| 2023国产精华国产精品| 久久久久久**毛片大全| 欧美国产97人人爽人人喊| 国产精品国模大尺度视频| 亚洲裸体在线观看| 亚洲国产精品久久久久婷婷884 | 亚洲乱码国产乱码精品精可以看| 亚洲人成网站色在线观看| 午夜激情综合网| 久久精品国产一区二区| 成人在线视频一区| 在线看国产一区| 精品少妇一区二区三区在线播放 | www.久久精品| 欧美午夜影院一区| 精品久久久久久综合日本欧美| 国产三级一区二区| 亚洲资源在线观看| 国产尤物一区二区在线| 一本一本久久a久久精品综合麻豆| 欧美在线一区二区| 久久免费午夜影院| 午夜视黄欧洲亚洲| 国产a级毛片一区| 欧美日韩国产首页在线观看| 久久网站热最新地址| 亚洲免费三区一区二区| 精品一区二区三区免费观看| 91日韩一区二区三区| 精品国产免费视频| 亚洲成av人片在线| av一本久道久久综合久久鬼色| 欧美网站大全在线观看| 国产午夜亚洲精品羞羞网站| 日韩国产欧美一区二区三区| 成人sese在线| 26uuu久久天堂性欧美| 亚洲午夜久久久久中文字幕久| 国产高清不卡二三区| 欧美欧美午夜aⅴ在线观看| 国产农村妇女毛片精品久久麻豆| 香蕉影视欧美成人| 色综合天天综合给合国产| 日韩写真欧美这视频| 亚洲与欧洲av电影| 99久久精品免费看国产免费软件| 欧美刺激脚交jootjob| 亚洲第四色夜色| 色偷偷久久人人79超碰人人澡| 国产精品美女久久久久高潮| 麻豆久久久久久久| 在线一区二区三区| 精品国产凹凸成av人导航| 日韩免费视频线观看| 午夜a成v人精品| 欧美久久久久中文字幕| 亚洲一区二区三区在线| 91色综合久久久久婷婷| 亚洲一卡二卡三卡四卡无卡久久 | 樱花影视一区二区| av在线免费不卡| 亚洲欧洲一区二区在线播放| 丁香天五香天堂综合| 国产欧美一区二区精品忘忧草 | 亚洲一区免费在线观看| 在线亚洲一区观看| 午夜精品福利久久久| 欧美日韩综合不卡| 日韩激情在线观看| 日韩一区二区在线免费观看| 日韩国产精品久久久久久亚洲| 欧美日韩日日摸| 蜜桃在线一区二区三区| 久久久久久久久97黄色工厂| 高清不卡在线观看av| 国产精品久久久一本精品| 99麻豆久久久国产精品免费优播| 国产精品黄色在线观看| 欧洲精品视频在线观看| 午夜视黄欧洲亚洲| 26uuu国产电影一区二区| 国产老妇另类xxxxx| 国产精品对白交换视频| 在线视频你懂得一区二区三区| 国产色产综合产在线视频| 亚洲欧美激情小说另类| 色老汉一区二区三区| 亚洲国产日韩在线一区模特| 日韩午夜电影av| www.亚洲在线| 亚洲一区二区三区免费视频| 538在线一区二区精品国产| 九九国产精品视频| 亚洲欧美自拍偷拍| 91精品国产日韩91久久久久久| 国产传媒一区在线| 一区二区三区四区激情| 91精品国产全国免费观看| 成人综合在线观看| 日本网站在线观看一区二区三区| 久久久久久夜精品精品免费| 色综合久久中文综合久久牛| 美女精品自拍一二三四| 国产精品成人一区二区艾草| 欧美另类久久久品| 99视频国产精品| 国产一区二区三区在线观看精品| 亚洲视频一区在线| 26uuu精品一区二区 | 亚洲精品日韩一| 欧美videos中文字幕| 成人av综合一区| 蜜臀精品久久久久久蜜臀| 成人欧美一区二区三区1314 | 国产精品久久久一本精品| 日韩一卡二卡三卡| 欧美在线免费播放| 91免费在线视频观看| 精品伊人久久久久7777人| 亚洲成人午夜影院| 亚洲色图另类专区| 中文字幕不卡一区| 国产人妖乱国产精品人妖| 日韩精品专区在线影院重磅| 欧美丰满一区二区免费视频| 在线区一区二视频| 91视频观看视频| 99国产精品久久久久久久久久| 国产在线精品一区二区三区不卡| 天堂av在线一区| 亚洲一二三四在线观看| 亚洲人精品午夜| 国产精品的网站| 亚洲欧洲美洲综合色网| 国产欧美一区视频| 日本一二三四高清不卡| 国产欧美一区二区三区网站| 26uuu久久天堂性欧美| 欧美成人国产一区二区| 精品国产免费视频| 久久久久久免费网| 欧美激情中文字幕| 中文字幕亚洲精品在线观看| 国产精品久久久爽爽爽麻豆色哟哟| 久久免费看少妇高潮| 亚洲国产精品高清| 中文在线一区二区| 亚洲手机成人高清视频| 亚洲激情图片一区| 天天色综合天天| 免费观看一级特黄欧美大片| 免费观看一级欧美片| 国产乱国产乱300精品| 不卡区在线中文字幕| 91亚洲国产成人精品一区二三| 色偷偷成人一区二区三区91| 欧美体内she精高潮| 日韩视频永久免费| 国产亚洲综合av| 国产精品伦理一区二区| 亚洲欧美日韩电影| 日欧美一区二区| 粉嫩高潮美女一区二区三区| 色综合天天综合给合国产| 5858s免费视频成人| 久久色成人在线| 亚洲精品日产精品乱码不卡| 亚洲成人午夜影院| 国产精品一区在线| 91丨九色丨尤物| 日韩一区二区三区高清免费看看| 国产视频一区在线观看| 亚洲资源在线观看| 国产福利91精品| 欧美日韩成人综合天天影院 | 日韩福利电影在线| 这里只有精品视频在线观看| 国产精品的网站| 日韩精品一区二区三区在线播放| 日韩欧美一级片| 亚洲欧美一区二区三区孕妇| 日日噜噜夜夜狠狠视频欧美人| 成人美女视频在线观看18| 在线电影欧美成精品| 国产精品国产三级国产有无不卡| 奇米一区二区三区| 91福利在线免费观看|