throbber
Coded modulation scheme employing turbo
`
`codes
`
`
`
`
`
`
`
`P. Robertson and T. Worz
`
`
`
`Indexing terms: Convolutionul codes, Modulation coding
`
`
`
`
`
`
`
`
`
`The authors present a turbo coding scheme for bandwidth-
`
`
`
`
`
`
`
`
`
`efficient modulation that outperforms turbo coding with Gray
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`mapping by employing Ungerboeck codes as component codes.
`
`
`The scheme can be decoded iteratively and achieves very good bit
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`error rates at low signal to noise ratios after a small number of
`
`iterations. XPSK is used as an example. although the scheme can
`
`
`
`
`
`
`
`
`
`
`
`be extended to other constellations.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`turbo codes have been introduced [1]
`Intt‘0dm'ti0n.' Recently,
`
`
`
`
`
`
`
`
`
`
`
`
`which achieve good bit error rates (104 ~ 10 5) at a low SNR.
`
`
`
`
`
`
`
`
`
`
`
`
`They are of interest in a wide range of telecommunications appli-
`
`
`
`
`
`
`
`
`
`
`cations and are composed of two binary component codes. They
`
`
`
`
`
`
`
`originally
`proposed
`for binary modulation
`(BPSK).
`were
`
`
`
`
`
`
`
`
`
`Approaches have been undertaken to combine binary turbo codes
`
`
`
`
`
`
`
`
`
`with higher order modulation (e.g. SPSK,
`l6QAM) and Gray
`
`
`
`
`
`
`
`
`
`
`
`mapping [2]. In contrast, in our approach we have employed two
`
`
`
`
`
`
`
`
`
`
`Ungerboeck codes [3] in combination with TCM in their recursive
`
`
`
`
`
`
`
`
`
`
`systematic form as component codes in a structure similar to
`
`
`
`
`
`
`
`
`
`
`
`binary turbo codes. We use 8PSK as an example throughout this
`
`
`
`
`
`
`
`
`
`
`
`paper, although the method can easily be extended to other modu-
`
`
`
`
`
`
`
`
`
`
`
`
`lation formats (e.g.
`l6 and 64 QAM) with similar results. We will
`
`
`
`
`
`
`
`
`
`
`begin by presenting the encoder structure, followed by a brief
`
`
`
`
`
`
`
`
`
`description of the decoder and conclude with simulation results.
`
`
`
`
`
`
`
`
`
`
`
`
`Encoder: An important property of turbo codes is that they use
`
`
`
`
`
`
`
`
`
`recursive systematic component codes that are simple and have
`
`
`
`
`
`
`
`
`interleaving between two such component encoders, which results
`
`
`
`
`
`
`
`
`
`small error event probability. Ungerboeck codes were
`in a
`
`
`
`
`
`
`
`
`
`designed to provide high spectral and power efficiency through
`
`
`
`
`
`
`
`
`
`
`signal set expansion. The motivation for our approach was to
`
`
`
`
`
`
`
`
`
`replace the binary component codes
`in classical
`turbo code
`
`
`
`
`
`
`
`
`
`schemes with Ungerboeck codes and retain the advantages of
`both.
`
`
`
`
`
`
`
`Major differences to classical turbo codes are:
`
`
`
`
`
`
`
`
`
`
`
`
`
`(i) The interleaving now operates on pairs of bits (for SPSK)
`
`
`
`
`instead of single bits.
`
`
`
`
`
`
`
`
`
`
`
`
`
`(ii) To achieve the desired spectral efficiency of Zbit/symbol, the
`
`
`
`
`
`
`
`
`mandatory puncturing of parity information is not quite as
`
`
`
`
`
`
`
`
`straightforward as in the binary turbo coding case.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Let the size of the (pseudorandom) interleaver be N, also equal
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`to the number of SPSK symbols per block, and let the number of
`
`
`
`
`
`
`
`
`
`
`
`information bits transmitted per block be ZN. The encoder is illus-
`
`
`
`
`
`
`
`
`
`
`
`
`trated in Fig. 1, where we have chosen a short interleaving length
`N = 6.
`
`sequence of
`
`
`
`
`
`_ _-r1*=1b£'.t>9I:s_ _ _ ,
`!(di ,d2.d3.dz..%.de>=:
`
`'-.000HH00_0"___.'
`
`
`_ _ _ _ _ _ _
`BPSK symbols
`i9.s.z.«.i.7]
`ro'§,‘7,‘sTa‘;
`""T'Tj seié-c"io'r' ‘ ' ‘
`I /):?#output
`:_ J
`
`
`
`
`
`
`even position to even position
`J“:
`
`
`
`
`
`odd position to odd position
`’_/6:‘~3:‘__1
`r
`‘ll,1l,0 ,oi,oo_1o.=(d3,d6,d5,d2,d, ,d,,)
`s5qTie'nc_e_o? ififobit pairs
`1 5,7,o,3,o,z."
`._ _ _ _ _ _ _ J
`sequence of
`SPSK symbols
`
`
`
`
`95m
`
`Fig. 1 Encoder shown for 8PSK with component ("odes memory three
`
`
`
`
`
`
`
`
`
`
`and example of interleaving with N 2 6 shown
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Underlined letters indicate that symbols or pairs of bits correspond to
`
`first encoder
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ELECTRONICS LETTERS 31stAugust 1995 Vol. 31
`
`
`
`
`
`No. 18
`
`Ericsson Exhibit 1027
`
`Ericsson v. IV
`
`lPR20l4—Ol 149
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`achieved by keeping only the largest term in each of the sums. By
`
`
`
`
`
`
`
`
`taking the logarithm above we obtain simplified detector (optimal
`
`
`
`
`
`
`
`
`
`
`for large average signal to noise ratios, SINR), which is
`0
`2
`2
`s,2>
`H1lI1‘I‘
`.—f
`lI1lIl‘T‘
`.A
`kZ:%fl,1,.l no)
`I < gzepifl nu)
`1
`
`This detector uses the Euclidean distances between the received
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`signal and the possible (faded) channel symbols only. In all the
`
`
`
`
`
`
`
`
`
`results below.
`this simplified front—end detector has been used
`
`
`
`
`
`
`
`
`
`throughout with small performance loss relative to the optimal
`case.
`
`
`Mk)
`
`s2
`fv»(k) 2|
`
`
`
`
`
`
`
`
`
`
`Performance examples.’ Both uncoded and coded (F lg. 2) schemes
`
`
`
`
`
`
`
`
`
`
`are considered and the bit error probabilities estimated by compu-
`
`
`
`
`
`
`
`
`
`
`ter simulations. Starting with the uncoded case, all schemes have
`
`
`
`
`
`
`
`
`
`
`
`the same power spectrum as BPSK, which serves as a reference.
`
`
`
`
`
`
`
`
`
`
`
`For large SYVR, the bit error probability behaves as FNR 1. The
`
`
`
`
`
`
`
`
`
`
`
`remaining three schemes have repetition codes resulting in 2, 3 or
`
`
`
`
`
`
`
`
`
`
`4bits, which are delayed and mapped into QPSK, SPSK and
`
`
`
`
`
`
`
`
`
`
`l6QAM signal sets, respectively.
`is found that
`the diversity
`It
`
`
`
`
`
`
`
`
`
`
`
`
`
`orders are cl, = 1, 2. 3 and 4. respectively, and that 37VR’“'° shows
`
`
`
`
`
`
`
`
`
`
`the asymptotic bit error rate. Note, however, that significant per-
`
`
`
`
`
`
`
`
`
`
`
`
`formance gains are obtained even at fairly large bit error rates. At
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the 103 level, 10dB of3'NR is saved with ti, :2. With an (n, k)
`
`
`
`
`
`
`
`
`
`
`
`
`i.e.
`block code, the diversity order is now of, : n/k,
`the inverse
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`code rate. In Fig. 2, two TCM schemes with eight states are also
`considered. The case with code rate 2/3 and SPSK is taken from
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[1] and represents state of the art for Zbit/channel use. The new
`
`
`
`
`
`
`
`
`
`
`
`system uses code rate 2/4 with l6QAM. This latter code was
`
`
`
`
`
`
`
`
`
`
`
`
`
`designed by hand and is probably not the best possible. In spite of
`
`
`
`
`
`
`
`
`
`
`
`
`
`this, an improvement of ~l dB of SW}? is observed as high as the
`
`20% error rate.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`C()m‘lu5i0r1.s‘.‘ Starting from the CBI concept due to Zehavi [1], a
`
`
`
`
`
`
`
`
`
`
`
`diversity increase is obtained in a very simple way by introducing
`
`
`
`
`
`
`
`
`
`
`more coded bits. To keep the power spectrum unchanged,
`the
`
`
`
`
`
`
`
`
`
`
`
`
`channel symbol set must be doubled for each new coded bit. Sig-
`
`
`
`
`
`
`
`
`
`
`nificant bit error rate improvements are demonstrated even at high
`
`
`
`
`
`
`
`
`error rates. The proposed simple suboptimal detector performs
`
`
`
`
`
`
`
`close to optimal, even at low SNTE.
`
`© IEE 1995
`
`
`
`Electronics Letters Onlinc No: 19951057
`
`
`
`
`
`
`
`
`
`U. Hansson and T. Aulin (Chalmers University of Technology.
`
`
`
`
`Computer Engineering, Telecommunication Theory, S-412 96 Goteborg.
`
`
`
`
`
`
`Sweden)
`
`Email: tor@ce.chalmers.se
`
`
`19 June 1995
`
`
`
`
`
`
`
`
`
`
`
`
`References
`
`l
`
`3
`
`4
`
`1546
`
`
`
`
`
`
`
`
`ZEHAVl.E.:
`‘8—PSK trellis codes for a Rayleigh channel”, IEEE
`
`Trt1n.r., 1992, COM—40. pp. 873—884
`
`
`
`
`
`2 WlLSON,S.G., and LEUNG.Y.S.2 ‘Trellis-Coded phase modulation on
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Rayleigh channels’. Proc.
`l987 Int. Conf. Commun., Seattle. WA,
`
`
`USA. 7-10 June 1987, pp. 2l.3.l~2l.3.S
`
`
`
`
`
`
`
`S(‘HLEGEL.('., and COSTELLO. 1).:
`‘Bandwidth efficient coding for
`
`
`
`
`
`
`fading channels: Code construction and performance analysis’.
`
`
`
`
`
`
`
`
`IEEE J. Se]. Areas Commun., 1989, SAC-7, pp. 135(»l368
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`JELICIC. 111).. and ROY.S.:
`‘Design of trellis coded QAM for flat
`
`
`
`
`
`
`
`
`
`
`
`fading and AGWN channels’, IEEE Tl'ail.S‘., I994, VT-44, pp.
`l92—
`
`
`201
`
`
`
`
`
`
`‘Detection, estimation and modulation theory’
`5 VAN TREES, H.L.:
`
`
`
`
`
`
`
`
`
`(John Wiley & Sons, New York, l968), Part I
`
`
`
`

`
`mi
`{
`105k’
`
`tbs
`
`32
`
`
`
`
`
`
`
`
`
`
`
`
`
`Simulation results.’ As examples, we have used SPSK (with N :
`
`
`
`
`
`
`
`
`
`
`
`1024 and 5000) transmitted over an AWGN channel. The compo-
`
`
`
`
`
`
`
`
`
`
`
`nent code we used was the same as the Ungerboeck recursive
`
`
`
`
`
`
`
`
`
`eight—state code,‘ we found that optimising the ‘punctured’ mini-
`
`
`
`
`
`
`
`
`
`
`
`
`
`mum distance yielded the same code in this case. The bit error rate
`
`
`
`
`
`
`
`
`
`
`
`
`(BER) curves are shown in Fig. 3 for different numbers of itera-
`
`
`
`
`
`
`
`
`
`
`
`tions. Also shown is a Gray mapping scheme as presented in [2],
`
`
`
`
`
`
`
`
`
`
`
`
`that has the same complexity (number of trellis branches per infor-
`
`
`
`
`
`
`
`
`
`
`
`mation bit) as our four—iteration scheme and the same number of
`
`
`
`
`
`
`
`
`
`
`
`information bits per block; 2048. In all simulations, we used the
`
`
`
`
`
`
`
`
`symbol—by-symbol MAP algorithm [4]. Compared to TCM with
`
`
`
`
`
`
`
`
`
`
`64—state Ungerboeck codes, we achieve gains of 1.7 and 0.5dB
`
`
`
`
`
`
`
`
`
`
`
`
`compared to the Gray mapping scheme, at a BER of 104. The
`
`
`
`
`
`
`
`
`
`
`
`Shannon limit for 2bit/symbol and SPSK is at 2.9dB E,/N0.
`
`
`
`
`
`
`
`
`Cam:/usiuns: We have presented a novel bandwidth—efficient turbo
`
`
`
`
`
`
`
`
`
`coding scheme that employs Ungerboeck codes as component
`
`
`
`
`
`
`
`
`
`
`codes and combines the advantages of both schemes. The codes
`
`
`
`
`
`
`
`
`
`can be decoded iteratively and achieve very good performance
`after a small number of iterations.
`
`
`
`
`
`
`© IEE 1995
`
`
`Electronics Letters Online No: 19951064
`
`
`
`
`
`
`
`
`P. Robertson and T. Worz (Institute of Communi'cati0n.i' Technology.
`
`
`
`
`German Aerospace Research Esrablishineni (DLR), PO Box 1116, D-
`
`
`
`
`
`
`
`
`
`82230 Wess/frzg, Germany)
`
`
`
`
`5 July 1995
`
`
`
`
`
`
`
`
`
`
`References
`
`
`
`
`1
`
`
`
`‘Near Shannon
`BERROU. (1. GL/\VlEUX,A., and THITIMAJSHIMA,P.:
`
`
`
`
`
`
`
`
`
`
`
`
`
`limit errorcorreeting coding and decoding: T1irbo—codes’. Proc.
`ICC‘93. May 1993. PD. 1064-1070
`
`
`
`
`
`
`‘Turbo—codes and high
`2 GOFF,S.L., GLAVlEUX.A. and BERROU,C.:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`spectral efficiency modulation‘. Proc. lCC’93, May 1994, pp. 645—
`
`649
`
`
`
`
`
`‘Channel coding with multilevel/phase signals’.
`3 UNGERBOECK,G.:
`
`
`
`
`
`
`
`IEEE Trans, 1982, IT-28, pp. 55~67
`
`
`
`
`No. 18
`
`
`
`
`
`
`1547
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`11,) 2 (00, 01, ll, 10, 00,
`In our example, the sequence ((1,, dz,
`
`
`
`
`
`
`
`
`
`
`ll) of information bit pairs is encoded in an Ungerboeck style
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`encoder to yield the SPSK sequence (0, 2, 7, 5, I, 6). The informa-
`
`
`
`
`
`
`
`
`
`
`
`tion bit pairs are interleaved and encoded again. We de—interleave
`
`
`
`
`
`
`
`
`
`
`
`
`the output symbols of the second encoder to ensure that the order-
`
`
`
`
`
`
`
`
`
`
`
`ing of the two information bits partly defining each symbol corre-
`
`
`
`
`
`
`
`
`
`
`
`
`sponds to that of the first encoder. Finally, we transmit the first
`
`
`
`
`
`
`
`
`
`
`
`symbol of the first encoder,
`the second symbol of the second
`
`
`
`
`
`
`
`
`
`
`
`encoder, the third symbol of the first encoder, the fourth symbol
`
`
`
`
`
`
`
`
`
`
`
`
`of the second encoder etc. Thus each information bit pair is con-
`
`
`
`
`
`
`
`
`
`
`
`
`tained in only one SPSK symbol, and the parity bit is alternately
`chosen from the first and second encoder (bold, not—bold, bold,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`.,.). Furthermore, the kth information bit pair exactly determines
`
`
`
`
`
`
`
`
`
`
`
`
`
`two of the three bits of the kth symbol x,. Additionally. we need
`
`
`to ensure that the interleaving and alternate selection at the output
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`cause each symbol to appear once and only once at the encoder
`
`
`
`
`
`
`
`
`
`
`
`
`output. It is easily seen that the interleaver must map even posi-
`
`
`
`
`
`
`
`
`
`
`tions to even positions and odd positions to odd positions.
`
`Decoder: The iterative decoder is similar to that used for binary
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`turbo codes [1], except that there is a difference in the nature of
`
`
`
`
`
`
`
`
`
`
`
`
`the information passed from one encoder to the other, and in the
`
`
`
`
`
`
`
`
`
`
`
`
`treatment of the first decoding step. A further problem is the fact
`
`
`
`
`
`
`
`
`
`
`
`that each decoder alternately sees the noisy output symbol of its
`
`
`
`
`
`
`
`
`
`
`corresponding encoder and that of the other encoder. The infor-
`
`
`
`
`
`
`
`
`
`
`
`
`mation bits, ie the systematic bits that partly resulted in the map-
`
`
`
`
`
`
`
`
`
`
`
`
`
`ping of each of these symbols, are correct in the sense of being
`
`
`
`
`
`
`
`
`
`
`
`
`identical in the outputs of both encoders. However, this is not true
`
`
`
`
`
`
`
`
`
`
`
`
`of the parity bits, since these belong to the other encoder every
`
`
`
`
`
`
`
`
`
`
`
`other symbol. We have indexed these symbols with ‘*’ and some-
`
`
`
`
`
`times call these symbols ‘punctured’.
`
`
`
`f
`§S‘i§'y°”§i°=§K
`_5y_m_b9'§
`i9.3.7.4.1
`”‘ fig?" N7,
`I, \ ‘/\
`V. JJ 1‘;
`L7_- ZL 3_.£1 _
`
`r‘ ; ' T '' '
`:7. 7.1.3.0741
`
`
`decoder
`
`
`
`e.a
`e
`inlerleover
`(tJ—priori)
`
`
`
`
`
`

`
`e and 5
`
`
`
`(ecinds)'.6 lgirrjd
`Culpl-ll
`
`
`95!/2
`Fig. 2 Complete decoder
`
`
`
`
`
`
`
`
`
`
`
`* denotes ‘puncturec‘ symbols for corresponding component decoder
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`it can be shown that the
`In the binary turbo coding scheme,
`
`
`
`
`
`
`
`
`
`
`
`output of the component decoder can be split into three additive
`
`
`
`
`
`
`
`
`
`
`parts: when in the logarithmic or log-likelihood ratio domain, the
`
`
`
`
`
`
`
`
`systematic component 5, the a priari component a and the extrinsic
`
`
`
`
`
`
`
`
`
`
`
`
`component 2. Here we can only split the output into two different
`
`
`
`
`
`
`
`
`components: a priori and extrinsic and systematic (e&.r). Each
`
`
`
`
`
`
`
`
`
`
`
`component decoder must now pass the second component to the
`
`
`
`
`
`
`
`
`
`
`
`next decoder. The complete iterative decoder is depicted in Fig. 2
`
`
`
`
`
`
`
`
`
`
`
`where the first decoder sees a ‘punctured’ symbol (output by the
`
`
`
`
`
`
`
`
`
`second encoder: ‘*«mode’), i.e. the corresponding symbol from the
`
`
`
`
`
`
`
`
`
`
`first encoder was not transmitted. The first decoder now ignores
`
`
`
`
`
`
`
`
`
`
`
`
`this symbol, indicated by the position of the upper switch, as far
`
`
`
`
`
`
`
`
`
`
`
`
`as the direct channel input is concerned. The only input for this
`
`
`
`
`
`
`
`
`
`
`step in the trellis is the a priari information a from the other
`
`
`
`
`
`
`
`
`
`
`
`decoder, which contains the systematic information 3. The output
`
`
`
`
`
`
`
`
`
`
`
`
`of the first decoder is the sum of this a priori information a and
`
`
`
`
`
`
`
`
`
`
`
`
`the newly computed extrinsic information e. The latter is given to
`
`
`
`
`
`
`
`
`
`the second decoder as its a priori
`information. The variables
`
`
`
`
`
`
`
`
`
`
`passed between our decoders are vectors of four log—likelihoods;
`
`
`
`
`
`
`
`
`
`one for each possible information group value. The second
`
`
`
`
`
`
`
`
`
`
`symbol
`decoder, however,
`sees
`that was generated by its
`a
`
`
`
`
`
`
`
`
`
`encoder, hence it can compute e&s which is used as the a priori
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`input a of the first decoder in the next iteration. The setting of the
`
`
`
`
`
`ELECTRONICS LETTERS 31st August 1995 Vol. 31
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`switches will alternate from one pair of bits to another, but not
`
`
`
`
`
`
`
`from one decoding iteration to the next.
`
`
`
`
`
`
`
`
`
`
`
`The above does not apply to the first decoding of the first
`
`
`
`
`
`
`
`
`
`
`decoder if it is in ‘*-mode’ because no (1 priori information from
`
`
`
`
`
`
`
`
`
`the second decoder is available. In this case the a priori informa-
`
`
`
`
`
`
`
`
`
`
`
`
`tion must be calculated from the received symbol by calculating
`
`
`
`
`
`
`
`
`
`the probability of the information group :11, taking into account
`
`
`
`
`
`
`
`
`
`
`the unknown parity output bit of the other encoder. This calcula-
`
`
`
`
`
`
`
`
`tion is indicated by ‘metric s’ in Fig. 2.
`
`
`
`‘Fm I
`
`T0‘:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`5
`
`.-.—wm1

`
`K
`Lu
`
`-4
`
`..l_L.J.Lu|
`
`__
`1
`
`i
`48
`
`
`
`i
`Al»
`
`...4
`
`
`
`.
`
`_i__. _i
`3-6
`
`.
`
`
`
`
`
`
`. 1..
`1._.__i
`4-0
`
`E5/N0,dB
`
`Fig. 3 TTCM for SPSK, 2 bit/symbol
`
`
`
`
`
`
`
`
`
`
`A N = 5000 (10000 bits), 18 iterations
`
`
`
`ON:
`5000 ([0000 bits), 4 iterations
`
`
`
`
`
`
`
`
`EN:
`1024 (2048 bits). 4 iterations
`
`
`
`
`
`
`<>N=
`
`
`
`
`
`2048 bits, Gray mapping, 4 iterations

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket