Next Article in Journal
Quantum Mechanical Approach to the Khintchine and Bochner Criteria for Characteristic Functions
Next Article in Special Issue
A Preprocessing Manifold Learning Strategy Based on t-Distributed Stochastic Neighbor Embedding
Previous Article in Journal
Security- and Reliability-Guaranteed Transmission Control of Time-Sensitive Physical Layer Security Systems
Previous Article in Special Issue
Weighted BATS Codes with LDPC Precoding
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Finite-Length Analysis for Spatially Coupled LDPC Codes Based on Base Matrix

School of Communication and Information Engineering, Xi’an University of Science and Technology, Xi’an 710054, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(7), 1041; https://doi.org/10.3390/e25071041
Submission received: 18 April 2023 / Revised: 3 July 2023 / Accepted: 8 July 2023 / Published: 11 July 2023

Abstract

:
Spatially coupled low density parity check (SC-LDPC) are prominent candidates for future communication standards due to their “threshold saturation” properties. To evaluate the finite-length performance of SC-LDPC codes, a general and efficient finite-length analysis from the perspective of the base matrix is proposed. We analyze the evolution of the residual graphs resulting at each iteration during the decoding process based on the base matrix and then derive the expression for the error probability. To verify the effectiveness of the proposed finite-length analysis, we consider the SC-LDPC code ensembles constructed by parallelly connecting multiple chains (PC-MSC-LDPC). The analysis results show that the predicted error probabilities obtained by using the derived expression for the error probability match the simulated error probabilities. The proposed finite-length analysis provides a useful engineering tool for practical SC-LDPC code design and for analyzing the effects of the code parameters on the performances.

1. Introduction

Spatially coupled low-density parity check (SC-LDPC) codes have been proven to improve the belief propagation (BP) thresholds up to the maximum a posterior (MAP) thresholds of the underlying LDPC block codes for the binary erasure channel (BEC) [1]. Afterwards, many new structures were proposed to achieve better thresholds or low-complexity/delay decoding, including designing the coupling pattern, eliminating small absorbing/trapping sets, introducing slight irregularities and so on [2,3,4]. In addition, most of the literature focused on applying the concept of spatial coupling on other error correction codes to improve the decoding thresholds, such as spatially coupled repeat-accumulate (SC-RA) codes, spatially coupled turbo codes (SC-TCs), spatially coupled precoded rateless codes and so on [5,6,7]. Moreover, spatial coupling need not be limited to forming a single chain, and more general structures formed by connecting multiple coupled chains were presented to improve the decoding thresholds [8,9,10]. Different from connecting multiple identical coupled chains, the SC-LDPC codes constructed by parallelly connecting multiple different chains (PC-MSC-LDPC) were proposed in [11], which showed that the thresholds of the PC-MSC-LDPC code ensembles with flexible rates are very close to Shannon limits over the BEC.
The studies stated above mainly focused on the asymptotic performance analysis of the SC-LDPC ensembles. To analyze the finite-length performances, a scaling law for predicting the error probability of the SC-LDPC codes over the BEC using the peeling decoder (PD) was proposed in [12], which extended the finite-length analysis for LDPC codes in [13]. At each iteration, if the variable node is not erased through the channel or connected to a degree-one check node, it will be recovered successfully and then removed from the decoding graph along with all its attached edges. This decoding process gives rise to a sequence of residual graphs. Therefore, the analysis of the PD process is equivalent to analyzing the evolution of the residual graphs, which can be transformed to analyze the evolution of the degree distributions (DDs) on the residual graphs. In [13], it was pointed out that the DDs on the residual graphs at any time converge to a multivariate Gaussian. As a result, by computing the mean and the variance of the DDs evolution during the PD process, the error probability can be estimated. Following this principle, a finite-length analysis for the loop ensemble constructed by connecting two identical coupled chains was presented in [14], which showed that connecting two coupled chains can result in better thresholds and improved finite-length performances.
These finite-length analyses focused on particular code structures, either the single SC-LDPC code ensemble or the loop ensemble. When the code structure is changed, these analyses will be either very complicated or invalid. According to the working principle of PD, it can be seen that the core of the finite-length analysis over the BEC is analyzing the DDs evolution of variable nodes and check nodes on the residual graph. The essence is to determine whether one variable/check node on the residual graph is removed or not according to the erasure probabilities computed by the received messages from the connected edges, which depends on the interconnections between the variable nodes and check nodes. Inspired by this, we proposed a general finite-length performance analysis from the perspective of the base matrix for SC-LDPC codes. We considered embedding the base matrix into analyzing the residual graph evolution during the decoding process. In particular, based on the base matrix, we derived the mean graph evolution and estimated the variance of the DDs on the residual graphs at each iteration to predict the error probabilities. To verify the effectiveness of the proposed finite-length analysis, we considered the PC-MSC-LDPC codes because they have special connection structures that cannot be analyzed by the existing analyses. Using this expression, we plot the predicted error probabilities for different PC-MSC-LDPC codes and also show the error probabilities by simulations. The comparison results show that the predicted error probabilities can fit the simulated ones well. Since this analysis is performed on the base matrix, it can be applied to other spatially coupled code ensembles defined by the base matrix, including the single SC-LDPC code ensemble and the loop ensemble. The analysis results of the conventional SC-LDPC codes demonstrate this statement.
This paper is organized as follows. In Section 2, we describe the SC-LDPC and PC-MSC-LDPC code ensembles using the base matrix. In Section 3, we analyze the graph evolution based on the base matrix, including the mean graph evolution and the variance estimation. In Section 4, we show and compare the results for different PC-MSC-LDPC codes and the conventional SC-LDPC codes. In Section 5, we conclude our work.

2. Construction of PC-MSC-LDPC Codes

2.1. SC-LDPC Codes

A ( J , K , L ) SC-LDPC coupled chain was constructed by coupling L disjoint and small ( J , K ) -regular LDPC protographs. Each protograph was placed at one position in order and each position was denoted by u, u = 1 , 2 , , L . Here, we considered a conventional fully connected coupling pattern to couple these L protographs. Specifically, let w = gcd ( J , K ) , which denotes the greatest common divisor of J and K. Then, there are J check nodes and K variable nodes at each position with J = J / w and K = K / w . To couple these L protographs, we spread J edges of each variable node at position u to all adjacent check nodes at position u + i , i = 0 , 1 , , w 1 . In turn, for each check node at position u, K edges will be connected to all nearby variable nodes at position u i , i = 0 , 1 , , w 1 . To terminate the coupled chain, w 1 extra positions only including additional check nodes will be added at the end.
A ( J , K , L ) SC-LDPC coupled chain can be viewed as a protograph and its associated incidence matrix B sc , called a base matrix, is defined in (1), where the submatrices B i , i = 0 , , w 1 are identical J × K all-one matrices. A ( J , K , L , M ) SC-LDPC code can be obtained by taking an “M-lifting” of the ( J , K , L ) coupled chain [15]. Specifically, the parity check matrix can be generated by replacing each one entry by one M × M random permutation matrix and each zero entry by one M × M all-zero matrix.
B sc = B 0 B 1 B 0 B 1 B w 1 B 0 B w 1 B 1 B w 1 J ( L + w 1 ) × K L .

2.2. PC-MSC-LDPC Codes

Consider C independent and unconnected coupled chains with the same coupling length L, where each chain has a different rate. The kth chain is denoted as B ( J k , K k , L ) and there are J k check nodes and K k variable nodes at each position, where J k = J k / w k , K k = K k / w k , w k = gcd ( J k , K k ) and k = 1 , 2 , , C . The base matrix is denoted as B sc , k and the size is J k ( L + w k 1 ) × K k L . Let a = min { K 1 , K 2 , , K C } and b = min { J 1 , J 2 , , J C } .
Then, connect these C chains parallelly by edge exchanges. Specifically, a variable nodes and b check nodes are randomly selected for each position u of every chain B ( J k , K k , L ) , where u = 1 , 2 , , L and k = 1 , 2 , , C . Next, break the edges between these selected a variable nodes and b check nodes at each position u of B ( J k , K k , L ) and simultaneously connect these broken edges to b check nodes at each position u of B ( J z , K z , L ) with z = ( k mod C ) + 1 . The construction process starts from k = 1 and stops until k = C . Take the uth position to illustrate this process in Figure 1, where the blue blank squares and red blank circles are the selected check nodes and variable nodes, respectively, and the red dash lines represent the exchange edges between two adjacent chains. The base matrix is
B pc = B sc , 1 L C L 1 B sc , 2 L 2 B sc , C 1 L C 1 B sc , C m × n ,
where B sc , k denotes the remaining matrix after removing the exchange edges from the base matrix B sc , k and L k represents the interconnections between the chain B ( J k , K k , L ) and B ( J z , K z , L ) , k = 1 , 2 , , C and z = ( k mod C ) + 1 . The size of L k is J z ( L + w z 1 ) × K k L . m = k = 1 C J k ( L + w k 1 ) and n = k = 1 C K k L . Denote the PC-MSC-LDPC code ensemble defined by this base matrix as P ( J 1 , K 1 , , J C , K C , L ) . Take an “M-lifting” operation on this base matrix and obtain the parity check matrix of a PC-MSC-LDPC code. Denote the PC-MSC-LDPC code as C ( J 1 , K 1 , , J C , K C , L , M ) . More details about the asymptotic performance analysis can be found in [11].
Example: Consider two coupled chains: B ( 3 , 6 , 8 ) and B ( 4 , 6 , 8 ) . Since K 1 = 2 , J 1 = 1 for B ( 3 , 6 , 8 ) and K 2 = 3 , J 2 = 2 for B ( 4 , 6 , 8 ) , we have a = 2 and b = 1 . Thus, we need to select two variable nodes and one check node at each position for B ( 4 , 6 , 8 ) . The connection structure of these two chains in parallel is shown in Figure 2, where the blue blank squares denote the selected one check node and the red blank circles are the selected two variable nodes. Specifically, at each position, we break the two edges between two variable nodes and one check node of B ( 3 , 6 , 8 ) and connect them to one selected check node of B ( 4 , 6 , 8 ) at the same position (shown in dash lines). Then, we break the two edges between these two selected variable nodes and one selected check node of B ( 4 , 6 , 8 ) , and connect them to one check node of B ( 3 , 6 , 8 ) (shown in red dash lines). The base matrix can be obtained by (2).

3. Graph Evolution under Peeling Decoder

Following the PD working principle, we proposed a general finite-length analysis based on the base matrix to predict the error probabilities. Without a loss of generality, we considered the PC-MSC-LDPC codes transmitted over the BEC with erasure probability ϵ under PD.

3.1. Denotations of DDs

As described in Section 2, denote the check node at the ith row of the base matrix B as Type-i check node and the variable node at jth column as Type-j variable node, where 1 i m and 1 j n . The number of each type of check/variable node is M. The degrees of Type-i check node and Type-j variable node are dc i = j = 1 n B ( i , j ) and dv j = i = 1 m B ( i , j ) , respectively, where B ( i , j ) is the entry at the ith row and jth column of B .
To describe the graph evolution under PD, let l denote time and let it be normalized by τ = l / M . Since the PD peels off one variable node at each iteration from the decoding graph and there are ϵ M n variable nodes in total at the start of the decoding process, ϵ M n iterations are required on average in order to reach the empty graph and realize successful decoding, i.e., τ [ 0 , ϵ n ] .
Let V j ( l ) denote the number of the remaining Type-j variable nodes and R s , i ( l ) denote the number of edges connected to Type-i check nodes with degree s at time l, where 1 j n , 1 s dc i , 1 i m . V j ( l ) and R s , i ( l ) are defined as the DDs at time l.
Denote v j ( τ ) and r s , i ( τ ) as the normalized versions, where they can be obtained by normalizing V j ( l ) and R s , i ( l ) with M at normalized time τ .
v j τ = V j ( l ) M , r s , i τ = R s , i ( l ) M .
Since the expected values are required during the graph evolution, denote the expected values of v j ( τ ) and r s , i ( τ ) as v ^ j ( τ ) = E [ v j ( τ ) ] and r ^ s , i = E [ r s , i ( τ ) ] .

3.2. Mean Graph Evolution

Initialization Step: The number of the correctly received Type-j variable nodes is ( 1 ϵ ) M after passing the BEC with erasure probability ϵ . At l = 0 , PD removes all these correctly received variable nodes along with their attached edges from the decoding graph. The expected number of Type-j variable nodes is given by
E [ V j ( 0 ) ] = ϵ M , 1 j n ,
and the normalized version is v ^ j ( 0 ) = E [ v j ( 0 ) ] = E [ V j ( 0 ) ] / M .
At l = 0 , since PD removed all correctly received variable nodes along with their attached edges from the decoding graph, the check nodes on the residual graph will lose edges and the degree will be decreased. If the degree of a Type-i check node with degree dc i is decreased to s, it means that a total of dc i s edges of this check node are connected to the correctly received variable nodes. Therefore, the expected value of R s , i ( 0 ) is
E [ R s , i ( 0 ) ] = s M dc i s ϵ s ( 1 ϵ ) dc i s , 1 i m .
At the right side of Equation (5), the former part s M represents the total number of edges connected to Type-i check nodes with degree s and the latter part is the probability that the degree of a Type-i check node is s. The normalized version is r ^ s , i ( 0 ) = E [ r s , i ( 0 ) ] = E [ R s , i ( 0 ) ] / M .
Evolution Step: At time l, one degree-one check node is randomly selected and then removed along with its connected variable node and all connected edges. A new residual graph is produced.
The mean graph evolution is determined by the expected values of r r , i ( τ ) and v j ( τ ) , which can be obtained by solving the following differential equations:
v ^ j ( τ ) τ = E [ v j ( τ ) ] τ = E [ V j ( l ) ] l = E V j ( l + 1 ) V j ( l ) R q , p ( l ) , V t ( l ) , q , p , t ,
r ^ s , i ( τ ) τ = E [ r s , i ( τ ) ] τ = E [ R s , i ( l ) ] l = E R s , i ( l + 1 ) R s , i ( l ) R q , p ( l ) , V t ( l ) , q , p , t ,
where 1 i m , 1 s dc i , 1 j n , and they have unique solutions. As pointed out in [13], when M , any samples of v j ( τ ) and r s , i ( τ ) follow v ^ j ( τ ) and r ^ s , i ( τ ) closely. The solutions of Equations (6) and (7) are given as follows.
Solution of Equation (6): At time l, assume the removed degree-one check node to be a Type-c check node, which is chosen randomly from all degree-one check nodes on the residual graph with uniform probability p c ( l ) .
p c ( l ) = R 1 , c ( l ) i = 1 m R 1 , i ( l ) .
Then, the variable node connected to this removed Type-c degree-one check will be removed. Denote the probability that this variable node is a Type-j variable node as λ c , j ( l ) .
λ c , j ( l ) = V j ( l ) B pc ( c , j ) u = 1 n V u ( l ) B pc ( c , u ) ,
where the denominator represents the total number of variable nodes connected to Type-c check nodes.
Since a Type-j variable node with probability λ c , j ( l ) is removed, the variation for the variable nodes is
E [ V j ( l + 1 ) V j ( l ) | p c ( l ) ] = λ c , j ( l ) .
Solution of Equation (7): At time l, if this Type-j variable node connected to the removed Type-c degree-one check node is removed, all the attached edges will be deleted, which results in every connected check node losing one edge. Then, denote the probability that a Type-i check node loses one edge as ξ c , i ( l ) and, specifically, ξ c , c ( l ) = 1 .
ξ c , i ( l ) = j = 1 n B pc ( i , j ) λ c , j ( l ) .
Since a Type-c check node with degree one and an edge connected to it are removed, the variation in the check nodes for the case i = c can be calculated as
E [ R s , c ( l + 1 ) R s , c ( l ) | p c ( l ) ] = 1 , s = 1 0 , o t h e r s .
For the case i c , the graph loses one edge with probability ξ c , i ( l ) . This lost edge is connected to a degree-s check node with probability
R s , i ( l ) q = 1 dc i R q , i ( l ) .
As a result, the graph will lose s edges of Type-i check nodes with degree s and gain s 1 edges of the Type-i check nodes with degree s 1 . The expected graph evolution is
E [ R s , i ( l + 1 ) R s , i ( l ) | p c ( l ) ] = s ξ c , i ( l ) R s + 1 , i ( l ) R s , i ( l ) q = 1 dc i R q , i ( l ) ,
where R s + 1 , i ( l ) = 0 for s = dc i .
Since the fraction of degree-one check nodes on the graph determines the successful decoding, we only consider the variation in the degree-one check nodes. In conclusion, by using Equations (10) and (14), the expected graph evolutions can be derived.
On the variable node side, we can obtain
E [ V j ( l + 1 ) V j ( l ) ] = p = 1 m λ c , j ( l ) p c ( l ) .
On the degree-one check node side, we can obtain
E [ R 1 , i ( l + 1 ) R 1 , i ( l ) ] = p c ( l ) + ( R 2 , i ( l ) R 1 , i ( l ) q = 1 d c i R q , i ( l ) ) ( p ( l ) ξ i T ( l ) p i ( l ) ) ,
where p ( l ) = [ p 1 ( l ) p 2 ( l ) · · · p m ( l ) ] and ξ i ( l ) = [ ξ 1 , i ( l ) ξ 2 , i ( l ) · · · ξ m , i ( l ) ] .
Decoding Criteria: To ensure the successful decoding, the total number of degree-one check nodes must be kept positive until the whole graph is peeled off. Therefore, the BP threshold can be defined as the maximum ϵ to ensure that the mean fraction of degree-one check nodes r ^ 1 ( τ ) is strictly positive for any τ [ 0 , ϵ n ] .
r ^ 1 ( τ ) = i = 1 m r ^ 1 , i ( τ ) = i = 1 m E [ r 1 , i ( τ ) ] .

3.3. Variance Estimation

After describing the expected evolution of the random process r 1 ( τ ) , we need to compute the variance of r 1 ( τ ) for estimating the error probability of the PC-MSC-LDPC codes. As pointed out in [12], for sufficiently large M, the distribution of r 1 ( τ ) can converge to a Gaussian distribution with mean r ^ 1 ( τ ) in Equation (17) and variance δ 1 ( τ ) in Equation (18). Therefore, we can estimate the variance empirically around the mean value using a large set of samples of r 1 ( τ ) at time τ .
Var [ r 1 ( τ ) ] = E [ ( r 1 ( τ ) r ^ 1 ( τ ) ) 2 ] = 1 M i = 1 m t = 1 m δ 1 i , 1 t = δ 1 ( τ ) M .

4. Performance Analysis and Results

We first show the mean value r ^ 1 ( τ ) for the PC-MSC-LDPC code ensemble P ( 3 , 6 , 3 , 9 , 8 ) with different ϵ and M = 500 in Figure 3a. For ϵ = 0.37 , we also plot a set of 10 simulated decoding trajectories to confirm that they indeed concentrate around the predicted mean evolution. From Figure 3a, we can clearly observe that the local minimum decreases as ϵ increases and will be close to zero at the BP threshold ϵ = 0.4064 computed by the density evolution in [11], which also coincides with the definition of the BP threshold in Section 3.2. The time at this local minimum was defined as the critical point and denoted as τ .
In order to associate the error probability with ϵ , we considered a first-order Taylor expansion around the threshold ϵ for r ^ 1 ( τ ) at τ .
r ^ 1 ( τ ) r ^ 1 ( τ ) | ϵ + γ ( ϵ ϵ ) + O ( ( ϵ ϵ ) 2 ) .
We plot r ^ 1 ( τ ) / ( ϵ ϵ ) for the ensemble P ( 3 , 6 , 3 , 9 , 8 ) in Figure 3b. The approximately constant values can be observed for different ϵ at τ , which indicates that it is reasonable to remove the high-order components in Equation (19). Using r ^ 1 ( τ ) | ϵ = 0 , we can obtain γ r ^ 1 ( τ ) / ( ϵ ϵ ) , which can characterize the expected number of degree-one check nodes for a given ϵ at the critical point τ .
Then, we extended the analysis to the case of L = 50 and plot the mean value r ^ 1 ( τ ) of the ensemble P ( 3 , 6 , 3 , 9 , 50 ) with M = 500 in Figure 4a, which also includes a set of 10 simulated decoding trajectories for ϵ = 0.35 to verify the accuracy of the mean evolution. Different from the ensemble P ( 3 , 6 , 3 , 9 , 8 ) , we can observe that the local minimum appears not only at one critical point but also for a period of time. This phase is named as a steady phase and the critical point τ can be any time during this phase. At this steady phase, the expected number of degree-one check nodes is almost constant, which confirms the conclusion in [1] that the decoding waves travel away from the boundaries toward the center of the coupled chain at a constant speed. We also plot r ^ 1 ( τ ) / ( ϵ ϵ ) for the ensemble P ( 3 , 6 , 3 , 9 , 50 ) in Figure 4b. The approximately constant values can be observed for different ϵ at τ .
As pointed out in [12], the fraction of degree-one check nodes at τ dominates the code performance, so we only need to estimate the variance Var [ r 1 ( τ ) ] at τ . Specifically, we produced a set of 10 2 samples of r 1 ( τ ) for each ϵ by using one randomly generated code from the PC-MSC-LDPC ensemble under the PD. For the ensemble P ( 3 , 6 , 3 , 9 , 8 ) , the estimated δ 1 ( τ ) for different ϵ and M is listed in Table 1.
Since r 1 ( τ ) converges to a Gaussian distribution [13], the error probability at τ can be obtained.
P = Q r ^ 1 ( τ ) Var [ r ^ 1 ( τ ) ] = Q γ ( ϵ ϵ ) δ 1 ( τ ) / M .
Using Equation (20), we show the predicted error probabilities (dash lines) for different PC-MSC-LDPC codes in Figure 5 and also plot the simulated ones (solid lines) for comparisons. The results show that the predicted error probabilities are consistent with the simulated error probabilities but small gaps can be observed for relatively small M. They are caused due to two reasons. One is the deviation between the mean value r ^ 1 ( τ ) and the true mean value of the process r 1 ( τ ) , but it deviates from the true mean value of the process r 1 ( τ ) by less than M 1 / 6 . As M , any sample of r 1 ( τ ) follows r ^ 1 ( τ ) closely. The other is the negligence of the decoding failure at τ τ caused by the small cycles or stopping sets in the graph. This effect is more severe for smaller values of M. However, since the SC-LDPC code ensemble has a linear growth of minimum distance with block length n M , the codes with small cycles or low-weight stopping sets can hardly be found for sufficiently large M. Therefore, when M increases to a few thousands, the effects on the prediction accuracy will be small enough to be ignored.
Next, we extended the analysis to the case of connecting three different chains and considered the ensemble P ( 3 , 6 , 3 , 9 , 3 , 12 , 15 ) . The mean value r ^ 1 ( τ ) with M = 200 and different ϵ is plotted in Figure 6. Similar results can be observed that, when approaching the threshold ϵ = 0.3114 , the r ^ 1 ( τ ) values gradually decrease to approximately zero. In Table 2, the δ 1 ( τ ) values are calculated for the codes generated from the ensemble P ( 3 , 6 , 3 , 9 , 3 , 12 , 15 ) . The predicted error probabilities and the simulated ones for these codes are shown in Figure 7. The comparison results show that these two curves can match well and that the accuracy of the prediction gets better as M becomes larger. For comparison, the finite length performance bounds obtained by Equation (290) in [16] for different codelengths along with the BP threshold and Shannon limit are also plotted in Figure 7, from which we can observe that the gaps between the error probability curves and performance bounds are almost equal to the gap between the BP threshold and Shannon limit. It is known that the finite-length performance is consistent with the BP threshold. By increasing the coupling length, the BP threshold can be improved to be close to the Shannon limit, which can result in the error probabilities approaching the finite-length performance bounds.
Finally, we applied the analysis to the conventional SC-LDPC code C ( 3 , 6 , 8 , 700 ) . The mean value r ^ 1 ( τ ) with different ϵ and plot r ^ 1 ( τ ) / ( ϵ ϵ ) is shown in Figure 8. It can be observed that the local minimum values decrease when increasing ϵ to the BP threshold ϵ = 0.5212 and that they are small enough to be close to zero at ϵ = 0.52 . In addition, the approximately constant γ can be observed at the critical point as expected. Following similar steps, we computed and list the δ 1 ( τ ) values for different ϵ in Table 3. Using Equation (20), the predicted error probability for C ( 3 , 6 , 8 , 700 ) can be plotted in Figure 9. It was shown that the predicted performance using this error probability expression can fit well with the simulated performance, which can demonstrate the effectiveness of the proposed finite-length analysis for other SC-LDPC code ensembles.

5. Conclusions

This paper proposed a general finite-length analysis from the perspective of the base matrix over the BEC and applied it to the PC-MSC-LDPC code ensembles to verify the effectiveness. The results show that the predicted error probabilities obtained by using the derived error probability expression are consistent with the simulated error probabilities and that the accuracy of the prediction will be further improved when M increases. Since the proposed analysis is performed on the base matrix, it can be generalized to any spatially coupled ensembles defined by the base matrix, such as SC-RA codes and spatially coupled generalized LDPC codes. Finite-length performance analysis provides a useful engineering tool for practical code design and analyzing the effects of the code parameters on the performances.

Author Contributions

Conceptualization, Y.L.; methodology, Y.L.; software, S.S.; validation, S.S.; formal analysis, Y.L. and S.S.; writing—original draft preparation, Y.L. and S.S.; writing—review and editing, Y.L. and Y.Z.; funding acquisition, B.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (No. U19B2015, No. 62271386, No. 61801371).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
SC-LDPCSpatially coupled low-density parity check
BPBelief propagation
MAPMaximum a posterior
BECBinary erasure channel
SC-RAspatially coupled repeat-accumulate
SC-TCsspatially coupled turbo codes
PC-MSC-LDPCParallelly connecting multiple SC-LDPC
PDPeeling decoder
DDsDegree distributions

References

  1. Kudekar, S.; Richardson, T.J.; Urbanke, R.L. Threshold saturation via spatial coupling: Why convolutional LDPC ensembles perform so well over the BEC. IEEE Trans. Inf. Theory 2011, 57, 803–834. [Google Scholar] [CrossRef] [Green Version]
  2. Schmalen, L.; Aref, V. Spatially Coupled LDPC Codes with Non-uniform Coupling for Improved Decoding Speed. In Proceedings of the IEEE Information Theory Workshop (ITW), Visby, Sweden, 25–28 August 2019; pp. 1–5. [Google Scholar]
  3. Naseri, S.; Banihashemi, A.H. Construction of Time Invariant Spatially Coupled LDPC Codes Free of Small Trapping Sets. IEEE Trans. Commun. 2021, 69, 3485–3501. [Google Scholar] [CrossRef]
  4. Amiri, B.; Reisizadeh, A.; Kliewer, J.; Dolecek, L. Optimized array-based spatially-coupled LDPC Codes: An absorbing set approach. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Hong Kong, China, 14–19 June 2015; pp. 51–55. [Google Scholar]
  5. Johnson, S.; Lechner, G. Spatially Coupled Repeat-Accumulate Codes. IEEE Commun. Lett. 2013, 17, 373–376. [Google Scholar] [CrossRef]
  6. Yang, C.; Zhao, S.; Ma, X. Hybrid Coupled Serially Concatenated Codes. IEEE Trans. Commun. 2022, 70, 4301–4315. [Google Scholar] [CrossRef]
  7. Sakata, K.; Kasai, K.; Sakaniwa, K. Spatially-coupled precoded rateless codes with bounded degree achieve the capacity of BEC under BP decoding. In Proceedings of the IEEE International Symposium on Information Theory, Honolulu, HI, USA, 29 June–4 July 2014; pp. 521–525. [Google Scholar]
  8. Truhachev, D.; Mitchell, D.G.M.; Lentmaier, M.; Costello, D.J. New codes on graphs constructed by connecting spatially coupled chains. In Proceedings of the Information Theory and Applications Workshop, San Diego, CA, USA, 5–10 February 2012; pp. 392–397. [Google Scholar]
  9. Olmos, P.M.; Mitchell, D.G.M.; Truhachev, D.; Costello, D.J. Continuous transmission of spatially coupled LDPC code chains. IEEE Trans. Commun. 2017, 65, 5097–5109. [Google Scholar] [CrossRef]
  10. Truhachev, D.; Mitchell, D.G.M.; Lentmaier, M. Code design based on connecting spatially coupled graph chains. IEEE Trans. Inf. Theory 2019, 65, 5604–5617. [Google Scholar] [CrossRef]
  11. Liu, Y.; Li, Y.; Chi, Y. Spatially coupled LDPC codes constucted by parallelly connecting multiple chains. IEEE Commun. Lett. 2015, 19, 1472–1475. [Google Scholar] [CrossRef]
  12. Olmos, P.M.; Urbanke, R. A scaling law to predict the finite-length performance of spatially-coupled LDPC codes. IEEE Trans. Inf. Theory 2015, 61, 3164–3184. [Google Scholar] [CrossRef] [Green Version]
  13. Amraoui, A.; Montanari, A.; Richardson, T.; Urbanke, R. Finite-length scaling for iteratively decoded LDPC ensembles. IEEE Trans. Inf. Theory 2009, 55, 473–498. [Google Scholar] [CrossRef] [Green Version]
  14. Olmos, P.M.; Mitchell, D.G.M.; Truhachev, D.; Costello, D.J. A finite length performance analysis of LDPC codes constructed by connecting spatially coupled chains. In Proceedings of the IEEE Information Theory Workshop (ITW), Seville, Spain, 9–13 September 2013; pp. 1–5. [Google Scholar]
  15. Mitchell, D.G.M.; Lentmaie, M.; Costello, D.J. Spatially coupled LDPC codes constructed from protographs. IEEE Trans. Inf. Theory 2015, 62, 4866–4889. [Google Scholar] [CrossRef] [Green Version]
  16. Polyanskiy, Y.; Vincent, P.; Sergio, V. Channel coding rate in the finite blocklength regime. IEEE Trans. Inf. Theory 2010, 56, 2307–2350. [Google Scholar] [CrossRef]
Figure 1. The connection structure at the uth position of the code ensemble P ( J 1 , K 1 , , J C , K C , L ) .
Figure 1. The connection structure at the uth position of the code ensemble P ( J 1 , K 1 , , J C , K C , L ) .
Entropy 25 01041 g001
Figure 2. The connection structure of two chains B ( 3 , 6 , 8 ) and B ( 4 , 6 , 8 ) in parallel.
Figure 2. The connection structure of two chains B ( 3 , 6 , 8 ) and B ( 4 , 6 , 8 ) in parallel.
Entropy 25 01041 g002
Figure 3. (a) Plot r ^ 1 ( τ ) for the ensemble P ( 3 , 6 , 3 , 9 , 8 ) with M = 500 and different ϵ . The decoding trajectories are included for ϵ = 0.37 . The symbols in each line correspond to the critical points for each ϵ . (b) Plot r ^ 1 ( τ ) / ( ϵ ϵ ) with the threshold ϵ = 0.4064 .
Figure 3. (a) Plot r ^ 1 ( τ ) for the ensemble P ( 3 , 6 , 3 , 9 , 8 ) with M = 500 and different ϵ . The decoding trajectories are included for ϵ = 0.37 . The symbols in each line correspond to the critical points for each ϵ . (b) Plot r ^ 1 ( τ ) / ( ϵ ϵ ) with the threshold ϵ = 0.4064 .
Entropy 25 01041 g003
Figure 4. (a) Plot r ^ 1 ( τ ) for the ensemble P ( 3 , 6 , 3 , 9 , 50 ) with M = 500 and different ϵ . The decoding trajectories are included for ϵ = 0.35 . The symbols in each line correspond to the critical points for each ϵ . (b) Plot r ^ 1 ( τ ) / ( ϵ ϵ ) with the threshold ϵ = 0.3819 .
Figure 4. (a) Plot r ^ 1 ( τ ) for the ensemble P ( 3 , 6 , 3 , 9 , 50 ) with M = 500 and different ϵ . The decoding trajectories are included for ϵ = 0.35 . The symbols in each line correspond to the critical points for each ϵ . (b) Plot r ^ 1 ( τ ) / ( ϵ ϵ ) with the threshold ϵ = 0.3819 .
Entropy 25 01041 g004
Figure 5. Simulated error probabilities (solid lines) and predicted error probabilities using the expression in Equation (20) (dash lines) for the different PC-MSC-LDPC codes. The rate and the codelength of C ( 3 , 6 , 3 , 9 , 50 , 500 ) are 0.584 and 125,000. The rate of the other three codes is 0.5 and the codelengths are 8000, 20,000 and 40,000 respectively.
Figure 5. Simulated error probabilities (solid lines) and predicted error probabilities using the expression in Equation (20) (dash lines) for the different PC-MSC-LDPC codes. The rate and the codelength of C ( 3 , 6 , 3 , 9 , 50 , 500 ) are 0.584 and 125,000. The rate of the other three codes is 0.5 and the codelengths are 8000, 20,000 and 40,000 respectively.
Entropy 25 01041 g005
Figure 6. (a) Plot r ^ 1 ( τ ) for the ensemble P ( 3 , 6 , 3 , 9 , 3 , 12 , 15 ) with M = 200 and ϵ from 0.29 to 0.31 . A set of 10 empirical trajectories for ϵ = 0.29 are included. The symbols in each line correspond to the critical points for each ϵ . (b) Plot r ^ 1 ( τ ) / ( ϵ ϵ ) with the threshold ϵ = 0.3114 .
Figure 6. (a) Plot r ^ 1 ( τ ) for the ensemble P ( 3 , 6 , 3 , 9 , 3 , 12 , 15 ) with M = 200 and ϵ from 0.29 to 0.31 . A set of 10 empirical trajectories for ϵ = 0.29 are included. The symbols in each line correspond to the critical points for each ϵ . (b) Plot r ^ 1 ( τ ) / ( ϵ ϵ ) with the threshold ϵ = 0.3114 .
Entropy 25 01041 g006
Figure 7. Simulated error probabilities (solid lines) and predicted error probabilities (dash lines) for the codes C ( 3 , 6 , 3 , 9 , 3 , 12 , 15 , 200 ) and C ( 3 , 6 , 3 , 9 , 3 , 12 , 15 , 500 ) . The rate is 0.6222 and the codelengths are 27,000 and 67,500 respectively. The solid lines from left to right are the performance bounds for codelength = 27,000 and codelength = 67,500 in order. BP threshold (vertical dash line) and Shannon limit (vertical solid line) are also included.
Figure 7. Simulated error probabilities (solid lines) and predicted error probabilities (dash lines) for the codes C ( 3 , 6 , 3 , 9 , 3 , 12 , 15 , 200 ) and C ( 3 , 6 , 3 , 9 , 3 , 12 , 15 , 500 ) . The rate is 0.6222 and the codelengths are 27,000 and 67,500 respectively. The solid lines from left to right are the performance bounds for codelength = 27,000 and codelength = 67,500 in order. BP threshold (vertical dash line) and Shannon limit (vertical solid line) are also included.
Entropy 25 01041 g007
Figure 8. (a) Plot r ^ 1 ( τ ) for the code C ( 3 , 6 , 8 , 700 ) , where ϵ varies from 0.49 to 0.52 . The symbols in each line correspond to the critical points for each ϵ . (b) Plot r ^ 1 ( τ ) / ( ϵ ϵ ) with the BP threshold ϵ = 0.5212 .
Figure 8. (a) Plot r ^ 1 ( τ ) for the code C ( 3 , 6 , 8 , 700 ) , where ϵ varies from 0.49 to 0.52 . The symbols in each line correspond to the critical points for each ϵ . (b) Plot r ^ 1 ( τ ) / ( ϵ ϵ ) with the BP threshold ϵ = 0.5212 .
Entropy 25 01041 g008
Figure 9. Simulated error probability and predicted error probability for the code C ( 3 , 6 , 8 , 700 ) . The rate is 0.375 and the codelength is 11,200. The blue solid line is the performance bound for codelength=11,200. BP threshold (vertical dash line) and Shannon limit (vertical solid line) are also included.
Figure 9. Simulated error probability and predicted error probability for the code C ( 3 , 6 , 8 , 700 ) . The rate is 0.375 and the codelength is 11,200. The blue solid line is the performance bound for codelength=11,200. BP threshold (vertical dash line) and Shannon limit (vertical solid line) are also included.
Entropy 25 01041 g009
Table 1. The values of δ 1 ( τ ) for the ensemble P ( 3 , 6 , 3 , 9 , 8 ) .
Table 1. The values of δ 1 ( τ ) for the ensemble P ( 3 , 6 , 3 , 9 , 8 ) .
δ 1 ( τ ) ϵ = 0.385 ϵ = 0.39 ϵ = 0.395 ϵ = 0.40
M = 2000.35260.32220.25480.1509
M = 5000.55270.47960.42580.3031
δ 1 ( τ ) ϵ = 0.393 ϵ = 0.394 ϵ = 0.395 ϵ = 0.40
M = 10000.61740.60190.59780.4991
Table 2. The values of δ 1 ( τ ) for the ensemble P ( 3 , 6 , 3 , 9 , 3 , 12 , 15 ) .
Table 2. The values of δ 1 ( τ ) for the ensemble P ( 3 , 6 , 3 , 9 , 3 , 12 , 15 ) .
δ 1 ( τ ) ϵ = 0.295 ϵ = 0.30 ϵ = 0.305 ϵ = 0.31
M = 2000.47770.41460.19880.0094
M = 5000.79720.77110.53940.0275
Table 3. The values of δ 1 ( τ ) for the code C ( 3 , 6 , 8 , 700 ) .
Table 3. The values of δ 1 ( τ ) for the code C ( 3 , 6 , 8 , 700 ) .
δ 1 ( τ ) ϵ = 0.52 ϵ = 0.515 ϵ = 0.51 ϵ = 0.505 ϵ = 0.50 ϵ = 0.495
M = 7000.04220.13720.16940.24320.28250.3069
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, Y.; Sun, S.; Zhang, Y.; Wang, B. Finite-Length Analysis for Spatially Coupled LDPC Codes Based on Base Matrix. Entropy 2023, 25, 1041. https://doi.org/10.3390/e25071041

AMA Style

Liu Y, Sun S, Zhang Y, Wang B. Finite-Length Analysis for Spatially Coupled LDPC Codes Based on Base Matrix. Entropy. 2023; 25(7):1041. https://doi.org/10.3390/e25071041

Chicago/Turabian Style

Liu, Yang, Sha Sun, Yuzhi Zhang, and Bin Wang. 2023. "Finite-Length Analysis for Spatially Coupled LDPC Codes Based on Base Matrix" Entropy 25, no. 7: 1041. https://doi.org/10.3390/e25071041

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop