Constraint Satisfaction Through GBP-Guided Deliberate Bit Flipping
read more
Citations
A Deliberate Bit Flipping Coding Scheme for Data-Dependent Two-Dimensional Channels
References
A mathematical theory of communication
Low-Density Parity-Check Codes
Binary codes capable of correcting deletions, insertions, and reversals
Factor graphs and the sum-product algorithm
Related Papers (5)
Frequently Asked Questions (15)
Q2. What is the name of the new class of message-passing algorithm?
A new class of message-passing algorithm called generalized belief propagation (GBP) is introduced in [7] to solve the problem of computing marginal probability distributionson factor graphs with short cycles.
Q3. What is the problem of minimizing the number of deliberate bit flips for removing a?
The problem of minimizing the number of deliberate bit flips for removing a set of configurations from a 2-D array is an instance of a CSP, where variables are arranged into a 2-D array, and constraints are defined locally over a set of neighboring variables.
Q4. How many bits can be removed from a random 2-D pattern?
2. For the systematic BCH-[15, 5, 7] code (where the codewords are arranged into 3× 5 arrays and the first row is equipped with the user bits), in average it needs to flip 0.6563 bits/pattern to remove the forbidden configurations by the 2-D n.i.b. constraint.
Q5. What is the main cause of errors in the DBF scheme?
As an alternative coding scheme to address the non-linear effects of conventional 2-D constrained coding schemes, the authors present a deliberate bit flipping (DBF) coding scheme for data-dependent 2-D channels, where passing through channel specific patterns in inputs are the main cause of errors.
Q6. What is the purpose of this paper?
In this paper, the authors consider the problem of transmitting a binary message over a data-dependent communication channel and recovering it back at the receiver side.
Q7. What is the problem of minimizing the number of bit flips in a binary pattern?
Finding a binary pattern which satisfies a certain local constraints (which do not contain a predefined set of 2-D configurations), and has the minimum Hamming distance with the input binary pattern x via an exhaustive search can be computationally prohibitive for large patterns.
Q8. What is the probability of the input tiles inverting?
(4)Passing through the channel, colors of input tiles belong to F invert with probability αb, while colors of other tiles invert with probability αg.
Q9. What is the definition of a binary tiling of a rectangle?
The input pattern x can be considered as asquare binary tiling of a rectangle, where each information bit xi,j on the 2- D input pattern represents a colored tile (0 (1) refers to a white (black) tile).
Q10. What is the main obstacle for using the DBF method for removing harmful configurations?
the main obstacle for using the DBF method for removing harmful configurations is to keep the number of deliberate errors small enough not to overburden the decoder.
Q11. How do the authors minimize the number of bit flips in a DBF scheme?
Using a factor graph representation, the authors devise a constrained combinatorial formulation for minimizing the number of bit flips in the DBF scheme for removing a given set of configurations.
Q12. What is the function Dp over the tiles indexed by Pi,j?
For each tile xi,j , the authors define a functionDp : {0, 1}Pi,j × {0, 1}Pi,j → R[0,1] over the tiles tiles indexed by Pi,j ,Dp(xPi,j , x̂Pi,j ) ={ λwH(ePi,j )(1− λ)|Pi,j |−wH(ePi,j ), x̂Pi,j 6∈ F ,0, x̂Pi,j ∈ F , (11)where ePi,j = x̂Pi,j ⊕ xPi,j , and |Pi,j | indicates the number of tiles in Pi,j .
Q13. What is the problem of finding the minimum Hamming distance between the input and the received patterns?
For a given random input pattern, the problem originally is to find the pattern which does not contain any harmful configurations, and has the minimum Hamming distance with the given input pattern.
Q14. What is the UBER for a random 2-D pattern?
In fact, the authors compute the UBER under the assumptions that the channel only introduces errors in response to presences of 2-D isolated bit configurations, and removing these configurations make the channel noiseless.
Q15. How many bit flips are required to remove a 2-D isolated bit pattern?
through an example, the authors have presented uncorrectable bit-error rate results of incorporating DBF for removing 2-D isolated-bit configurations from 2-D patterns of certain size.