Message Passing Algorithm: A Tutorial Review
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 2, Issue 3
Abstract
This tutorial paper reviews the basics of error correcting codes like linear block codes and LDPC. The error correcting codes which are also known as channel codes enable to recover the original message from the message that has been corrupted by the noisy channel. These block codes can be graphically represented by factor graphs. We mention the link between factor graphs, graphical models like Bayesian networks, channel coding and compressive sensing. In this paper, we discuss an iterative decoding algorithm called Message Passing Algorithm that operates in factor graph, and compute the marginal function associated with the global function of the variables. This global function is factorized into many simple local functions which are defined by parity check matrix of the code. We also discuss the role of Message Passing Algorithm in Compressive Sensing reconstruction of sparse signal.
Authors and Affiliations
Kavitha Sunil
A Literature Survey on Data Privacy/ Protection Issues and Challenges in Cloud Computing
Cloud computing is a technique to deliver software, storage and processing. It increases system’s capability without changing the existing infrastructure, educating new people or taking license for the softwares....
Supervised WSD Using Master- Slave Voting Technique
Abstract: The Word sense disambiguation approaches contain number of methods such as stacking, voting, inthis paper we combined three approaches, Decision List as Master approach and Naïve Bayes, Adaboost aSlaves a...
Novel Hybrid k-D-Apriori Algorithm for Web Usage Mining
Abstract: The Web usage mining is a branch of web mining in which by clustering the datasets, frequently accessed patterns can be obtained for betterment of social portals, websites. The divisive analysis is one of the t...
IPv4 to IPv6 Transition Complaint Mediastreaming UsingARM 11
Abstract: Internet Protocol version 6 (IPv6) is the next version of Internet Protocol (IP) which is currently inthe transition phase from its predecessor, Internet Protocol version 4 (IPv4). With the number of IPv4...
Using Concept of Steganography and Visual Cryptography for Secured Data hiding
Abstract: The most advanced and updated Shamir Encryption algorithm is efficient enough to prevent and stop unauthorized and illegal access to the secured encoded data. It is best to solution to ensure reliability...