Reliability Level List Based Direct Target Codeword Identification Algorithm for Binary BCH Codes
|
|
|
- Asher Sims
- 9 years ago
- Views:
Transcription
1 Reliability Level List Based Direct Target Codeword Identification Algorithm for Binary BCH Codes B.YAMUNA, T.R.PADMANABHAN 2 Department of ECE, 2 Department of IT Amrita Vishwa Vidyapeetham. Amrita School of Engineering Amrita Nagar, Coimbatore- 2 INDIA [email protected] Abstract: - In BCH coded schemes the reliability information available with the demodulated bits can be effectively used for soft decision decoding (SDD) to improve signal to noise ratio performance. Chase algorithms, their adaptations, and modifications available for SDD trade complexity for performance to different levels. A new iterative algorithm Reliability Level List based Direct Target Codeword Identification Algorithm (DTCI) - is proposed in the paper; the algorithm yields the best that is possible with SDD. The concept of reliability level list (RLL) introduced in the paper is central to the application of the algorithm. At every stage of the iterative process followed, the algorithm uses the reliability information of the bits and identifies the next most likely candidate word to be examined. This ensures that the correct decoded codeword is identified through the shortest number of steps. Detailed simulation studies with different BCH codes amply bring out the effectiveness and superiority of the algorithm. Key-Words: - BCH codes, Reliability based decoding, Soft decision decoding, Probability of error. Introduction Channel coding techniques which combat channel impairments are an integral part of digital wireless communication systems. The fact that Hard Decision Decoding (HDD) discards information regarding the reliability of the received bit has been its bane. If the number of errors exceeds d min, the decoding is not unique. Approaches where we choose reliability information in the received bit sequence to go beyond HDD and identify codewords in a more meaningful manner comprehensively, constitute Soft Decision Decoding (SDD). Chase and Forney [-2] are the forerunners of reliability based SDD algorithms which use reliability information along with the hard decision decoded sequence to refine the decoding process. Fossorier et al. proposed a soft decoding scheme based on processing of the most reliable positions [3]. Of these, Chase algorithms have been of great interest to many researchers; its adaptations are available for binary linear error-correcting block codes []. These refinements have basically been multidimensional in nature in the sense that they exploit available computing power to improve performance, allow transmission through feeble channels (channels with low SNR values), exploit channel capacity to the utmost subject to specific performance criteria, and so on. The class of Chase algorithms decodes using the reliability values obtained from the demodulator and running subsequent trials of codeword estimation using suitable test patterns. The trials are run on a conventional (algebraic) decoding algorithm. These algorithms are all based on processing of the least reliable bits so that in each trial, different combinations of the least reliable received bits are processed and the decoder output is the candidate word with the best soft decision metric. These algorithms have a decoding radius of (d min -), d min being the minimum Hamming distance. Variations of Chase algorithms essentially focus on reducing the number of trials and hence the complexity involved in decoding to the codeword. Chana et al. have proposed an interesting SDD algorithm for binary cyclic codes which performs permutation decoding over a fixed number of least reliable positions of the received word []. A reliability based soft decision decoding algorithm for binary cyclic block codes that identifies the codeword with minimal effort has been proposed recently []. In this paper, the reliability based soft decision decoding algorithm has been extended for decoding binary BCH codes over the Additive E-ISSN: Issue, Volume 2, June 203
2 White Gaussian Noise (AWGN) channel with Binary Phase-Shift Keying (BPSK) signaling. Performance wise the proposed algorithm has an edge over the class of Chase algorithms. In the proposed algorithm the reliability of information obtained from the demodulator is used in computing the error probability and hence estimating all possible patterns of (d min -) errors and even beyond. The error probability calculated from the reliability information is used to decide on the occurrence of single error, double errors, triple errors etc., and hence decode from amongst the 2 n possible words. The procedure is structured to yield the target codeword with minimal number of trials. The rest of the paper is organized as follows: Section 2 discusses the preliminaries of soft decision decoding and the Chase algorithms, Section 3 presents the proposed Direct Target Codeword Identification (DTCI) algorithm, Section discusses the simulation results and Section forms the conclusion. 2 Preliminaries For an (n,k) binary BCH code the message sequence of length k is encoded into an n-bit length codeword C using conventional encoding techniques. The code bits C i = C C 2..C n are fed to data modulator which converts the bit stream to the appropriate wave form (BPSK modulated) for transmission through the channel. This signal may be corrupted by the channel. Let the received signal be represented as r = (r 0, r, r 2.r n- ). From the r i values, a binary sequence Z i is generated based on the hard-decision rule: Z i = 0 for r i < 0 for r i 0 () The magnitude of r i can be used as a reliability measure of the hard-decision decoded bit and decoding decision regarding the error position could be made. The larger the r i the more reliable the hard decision regarding the bit value and less likely that the bit is in error. The Chase algorithms use a test vector T which is added to the received word to form the distorted word and seek the codeword by scanning around the distorted word within a radius of d min [2]. The three Chase algorithms differ in the number and pattern of test vectors T (and hence the number of trials) needed to decode to the closest codeword. Hence the scope of Chase algorithms is limited to a Hamming sphere of radius d min - about the received word with the exception of Chase III which decodes some patterns of errors beyond d min -. For Chase I algorithm the set T consists of all binary vectors of length n which contain exactly d min ones. (i.e., all possible patterns of errors up to d min -). For Chase II algorithm the set T consists of every combination of s, which are located in the d min least reliable positions. For Chase III algorithm the set T consists of all binary vectors of length n which contain ones in the i least reliable positions and zeros elsewhere, where i = 0, 2,,..., d min -, if d min is odd and i =0,, 3,,..., d min -,if d min is even. The main drawback of Chase I algorithm is the large number of test patterns involved in the trials. n C d min 2 numbers of test patterns which run through the entire length of n bits are invoked in the algorithm. The test pattern generation does not use the reliability information; the latter is used to derive an analog weight which decides the selection of the error pattern from amongst the set of error patterns obtained. Chase II algorithm generates distorted words with min 2 d test patterns all of them focused on the least reliable end. Chase III algorithm uses d min + test patterns for the search. But with these two unlike with Chase I only a restricted number of error patterns up to d min - are decoded. The decoding limit of Chase algorithms for a specific case of (,) binary BCH code with d min = is given in Figure. From Figure it is seen that in Chase I all the distorted words - C 2 in numberlie within a Hamming sphere of radius d min = 2. These on decoding using conventional algebraic decoding method identify all the codewords within a Hamming sphere of radius d min - around Z i (Figure a), these being the candidate codewords. All possible 0 to error patterns are included here. It is seen that Chase II uses four test patterns ( min 2 d ) - all zero pattern and three patterns with all combinations of s in the least two d min reliable positions. All the candidate codewords lie within Hamming spheres of radius d min - here d min = 2 - around the corresponding distorted words - that is within the envelope of these spheres as represented in Figure E-ISSN: Issue, Volume 2, June 203
3 b. It is evident from the figure that all these candidate codewords lie within a Hamming sphere of radius d min - and form a subset of those in Chase I. It is pertinent to point out here that the simplification from Chase I to Chase II has left out some of the candidate codewords within the Hamming sphere of radius d min - (Figure b). If one of the left out candidate words were to have a lower value of the metric, Chase II would have decoded wrongly. One can see from the figure that the search is restricted to patterns of 2 errors, all 3 error cases where one of the errors is in any one of the two least reliable bit positions, and all error cases where two of the errors are in the two least reliable bit positions in the received word. It is seen that Chase III uses three test patterns ( d min + ) - all zero pattern, a pattern of two s and another of four s from the least reliable end. All the candidate codewords lie within Hamming spheres of radius d min - here d min = 2 - around the corresponding distorted words- that is within the envelope of these 3 spheres as shown in Figure c. It is evident from the figure that all these candidate codewords do not lie within a Hamming sphere of radius d min -; in this respect Chase III stands apart from both Chase I and Chase II. From the figure we find that the search is restricted to all patterns of 2 errors, all error cases when two of the errors are in the two least reliable bit positions, all error cases where four of the errors are in the four least reliable bit positions in the received word. Though it corrects up to d min - errors in any of the positions, Chase I algorithm is of limited interest due to the extensive search involved. Chase II and Chase III algorithms are simpler by one or two orders. The simplicity is achieved by a trade-off in the error pattern decoded as has been explained above. The same is true of Generalized Minimum Distance (GMD) [] (Essentially Chase III is the same as GMD vis-à-vis binary codes) as well as a number of other modifications [8] and generalizations [9] for bounded distance decoding. Hamming sphere of radius 2 around Z i (a) Chase I (b) Chase II Legend Received word Hamming sphere of radius around Z i Envelopes of Hamming spheres of radii 2 ( c ) Chase III Distorted word at d = from received word Distorted word at d = 2 from received word Distorted word at d = from received word Figure Decoding Bounds of Chase Decoding Algorithms: In each case the enclosures in thick lines represent the scan range. While decoding, with these classes of algorithms the focus is on optimizing a metric in terms of bits at the least reliable end; others optimize a metric defined in terms of bits at the most reliable end [0] to identify the target codeword. By providing different trade-offs between error performance and complexity these algorithms play a significant role in soft decision decoding. However the fact remains that there is a clear need for an algorithm which can use the reliability information in a structured manner and with minimal effort identify the most reliable codeword. Such an algorithm is evolved in the sequel. E-ISSN: Issue, Volume 2, June 203
4 3 Direct target codeword identification algorithm A new class of algorithm that uses soft information from the channel directly as an index for estimating the error positions is proposed here. The novelty of the algorithm lies in the following: All the patterns of errors that are guaranteed to be decoded by Chase algorithm I are successfully decoded by using an approach that eliminates the need for running repeated trials on conventional decoder. This approach is much simpler as brought out through the case studies. The algorithm decodes all patterns of errors up to d min - which are beyond the decoding limits of Chase II and Chase III algorithms. There exists the possibility of Chase III erroneously declaring a less reliable candidate codeword as the target codeword which is avoided here. This has been brought out through an illustrative example. The algorithm also has an edge over the class of Chase algorithms by being able to decode beyond their upper bound of d min -. Every hard decision represented by () has a probability associated with it. For the AWGN channel it is given by mi Q = m i σ e 2π 2 x 2 dx (2) σ 2 being the variance of the noise and r i = m i is the reliability value of bit i. In the proposed algorithm the received word is decoded by successive scanning done from the least reliable end. At every step the probability of error as given by (2) is used as the index for selecting the next candidate word that is to be examined. The steps involved in the algorithm are explained through an illustrative example of a (, ) binary BCH code. Example - I 30eh is the transmitted code word. With σ = 0.8, the received word obtained is 8cch. There are errors at bit positions,,,. As before let r i = m i be the reliability value of bit i. The bits are assigned integer reliability indices k from to in the ascending order of magnitude m i as in Table. Chase I decodes the codeword with an extensive search as explained earlier. Chase II fails to decode this error pattern. The possible distorted words are 8cch, 80ch, 88ch, and 8ch. Algebraic decoding of these four distorted words results in decoding failure. With Chase III the three possible distorted words are 8cch, 80ch and 8eh. Algebraic decoding of these four distorted words also results in decoding failure. If Table Reliability magnitude and index for Example - I i m i k mi Q = m i σ e 2π 2 x 2 dx represents the probability that the i th bit with k as the reliability index is received wrongly then let mi q i[ = Q (3) E-ISSN: Issue, Volume 2, June 203
5 mi pi[ = Q () where p i [ is the probability that the i th bit with k as the reliability index is received correctly. The index i representing the bit position being superfluous here has been left out in the rest of the discussion. All the 2 terms in the expansion of the product k= ( p [ + q[ ) together represent the probability space of the candidate word of bits. These 2 elements of this space have their own associated probability of being the target codeword. All the possible 2 codewords are included in this set of 2 each with its own probability. The list formed with all the terms in the expansion of the above expression arranged in descending order of magnitude is called as Reliability Level List (RLL) here. For any given k value q[ 0. and hence p[ 0.. Hence the term p[ k= representing the probability that all bits are received without error has the largest magnitude and is at the top of RLL. k= p[ = (-0.002) (-0.009) (-0.03) (-0.08) (-0.09) ( ) (-0.023) (-0.083) ( ) (-0.293) (-0.308) (-0.309) (-0.300) (-0.) (- 0.22) = The corresponding word being the most reliable of all the words deserves examination first; the word here is the received word (8cch) itself. The examination can be carried out directly by dividing the word by the generator polynomial of the code. A zero remainder implies the word to be a codeword and the search stops here. This not being the case here the search has to be continued with the next entry in the RLL. q [] being the maximum amongst all the q [ values, the product q [] [ k = 2 p = has the second largest magnitude; it is the second entry in the RLL indicating that the word with the bit for which k = that is b being in error is the next one to be examined. The word is 88ch which is not a codeword. The third entry in the RLL is the product q [2] p [] p [ =. 0 - k = 3 The corresponding word to be examined is 8ch taking b (since i = for k =2) to be in error. Since this is not a codeword, the fourth entry in RLL is to be examined: It is decided by the larger of the two of the products:. q [3]p[2]p[] the probability that bit for k = 3 (b )is in error. 2. p [3]q[2]q[] the probability that bits for k = 2 and k = (b and b ) are in error. If q[3]p[2]p[] > p[3]q[2]q[], this entry in RLL is q[3]p[2]p[] p [, else it is k = p[3]q[2]q[] p [. k = The dual process of identifying the next most probable word to be examined that is the next entry in the RLL and dividing it by the generator polynomial to ascertain whether it is a codeword is continued until the codeword the target codeword itself is identified. This completes successful decoding and RLL formation need not be continued further. The progress of the decoding process is summarized in Table 2. The salient features of the proposed algorithm can be summarized as follows:. Once a codeword has been identified further scan is not needed because subsequent codewords if identified will be less reliable than the earlier one. 2. The search has shown the bits b, b, b and b to be in error and the identified target codeword - 30eh - is the transmitted codeword itself. 3. The RLL entry at any stage can be represented k= as the product f p[. The term p[ in k= this product being a constant, one need to compute only the factor f at each stage to decide the next entry in RLL and the corresponding word to be examined; use of the factor f in place of the full probability value simplifies the computations [].. In fact the magnitude of f associated with a word decides the position of the word in the RLL. For a candidate codeword the f value represents its metric. In turn from amongst a set of candidate codewords the one with the maximum value of f represents the target codeword. The values of f are also given in Table 2.. The candidate codewords identified by E-ISSN: Issue, Volume 2, June 203
6 applying Chase I algorithm are given in Table 3 along with their respective f values. Despite the extensive search, Chase I also zeros on to 30eh as the target codeword, its value of the metric being the smallest.. Though Chase I will successfully decode here, Chase II and Chase III fail. S.N o Table 2 RLL Decoding Sequence index for Example - I Bits error in K Error Probability None f 8,, x , 2, 0. x , 2, 3.33 x , 3,. x ,3 3,. x , 3,.3 x , 3,.99 x ,,,2, 2,,3,2, 0.3 x x ,, ,,,2, 3 x ,, ,,,2, 9. x , 2, ,,,2, ,, ,3, , 2, ,3 2, ,,,3, 30,,3,3, 3,, 2,3, 32,,3 2,3, 33,,,3, 3,,,3, 3,, 2,3, 3,, 2,3, 2. x x x x x x x x ,, ,,,,2, 3, x E-ISSN: Issue, Volume 2, June 203
7 38,,,3,2, 3, 39,,,,2, 3, 0,,,,2, 3, x x x ,3, x ,, 0. x 0-3,, x 0-3,, x 0-3,, x 0 -,, x 0 -,,3,, 8,,3 2,, 9,,,, 0,,,.,3,,, 2,3,,, 3,, 2,,,, 2,,,3, 2,, x x x x x x x x x ,,3 3,, x ,,,, 8,, 2,, 9,, 3,, 0,, 3,,,3, 3,, 2,3, 3,, 3,, 3,,,,,3,2,,,,,,2,,,,,,2,, x x x x 0-3` x 0-3` x 0-3` x 0-3` x ` 9.33 x x x 0-8,,3, 9,,3,,2,,,2,, 0,,,3 2,3,,,,,,2,, x x x x x ,,, 2,3,,,,, 2,3,, x x E-ISSN: Issue, Volume 2, June 203
8 ,,3,,,3,,,, 2,3,, 2,3,, 2,3,,.2 x x x Direct Target Codeword Identification Algorithm (DTCI) The procedure evolved through the illustrative example above can be cast as a structured algorithm; we call this the Direct Target Codeword Identification Algorithm (DTCI). The step by step procedure is as follows:. Let {r i }, {m i }, and {b i } represent the sets of received signal values, their magnitudes, and the corresponding bit values. 2. Compute the set {Q(m i )} where m i σ mi 2 x 2 Q = e dx 2π is the probability of the i th bit being in error. m 3. Arrange the set { Q i } in descending order of magnitude and assign integer values k to them such that k = for the bit with the largest value of m Q i, k =2, for the next and so on until k = n, for the bit with the smallest value of Q.. Let {q[} be the rearranged set of numbers in step (3) above. Compute s[ as q[ s[ = q[ and form the set {s[}.. The first three entries of the Reliability Level List (RLL) are, s[], and s[2] respectively in that order. The corresponding candidate words to be examined are {b i }, {b i } with b i[] complemented, and {b i } with b i[2] complemented respectively. Examine each in the same order; if any of them is a codeword, it is the target codeword. This completes decoding. Note that the indices i[] and i[2] here stand for the bit indices corresponding to k = and k =2.. If none of the above is the target codeword, the next entry in the RLL is to be decided; it is s[3] if s[3]>s[]s[2] and the candidate word is {b i } with b i[3] complemented; else the RLL entry is s[]s[2] m i and the candidate word is {b i } with b i[] and b i[2] complemented. Examine the candidate word; if it is a codeword, it is the target codeword and decoding is complete.. If decoding is not completed in step (), the next entry in RLL is to be identified; If the previous entry was s[]s[2], this one is s[3] and the candidate word is {b i } with b i[3] complemented; else it is the larger of s[] and s[]s[2]. Correspondingly the candidate word is {b i } with b i[] complemented or {b i } with b i[] and b i[2] complemented as the case may be. Examine the candidate word; if it is a codeword, it is the target codeword and decoding is complete. Proceed as above always deciding the next entry in RLL, forming the candidate word by complementing the selected bits and checking whether it is a codeword the target codeword the one with the maximum value of f the metric. Candidate code words Table 3 Chase I Decoding results for Example - I Hamming distance from 8cch f Analog metric value ac8h cfh d8ch eh cdh ch cch A few illustrative examples are considered here to bring out the effectiveness of the algorithm. Example - II This is a hypothetical case of a (, ) code with 30eh as the transmitted code word and 3eh at a Hamming distance of 3 from it as the received word; the errors are in b, b, and b 8. The bit indices and the corresponding reliability indices assigned to each of them are given in Table. E-ISSN: Issue, Volume 2, June 203
9 Table Reliability magnitude and index for Example II Bit index (i) Reliability index (k) Chase I decodes this properly but Chase II fails. Chase III uses the three T vectors- the received word, the received word with b i[] and b i[2] complemented, and the received word with b i[], b i[2], b i[3], and b i[] complemented. The Hamming spheres around the corresponding distorted words 3eh, 3dh, and 39h are scanned to identify candidate codewords; the word 39h is identified as the only candidate codeword and erroneously returned as the target codeword. The s values for the first few least reliable bits are reproduced in Table ; selected and relevant segments of the RLL are shown in Table. Applying the proposed algorithm, the word 30eh - is the first candidate codeword identified and it is returned as the target codeword. Incidentally the codeword 39h with f = is not the target codeword, since its reliability is less than that of 30eh for which f = S.No S.No Table s values for Example - II Bit index i k s [ Table Partial RLL for Example - II Bits in error ,,8,, ,,8 3,, ,,8,, Example - III A (3, ) binary BCH code with d min = and t = d min = 3 is taken. The message ab30h has been encoded as 98ad2h and transmitted over an AWGN channel with σ = 0.8. Details of an erroneously received word are reproduced in Table. k f E-ISSN: Issue, Volume 2, June 203
10 Table Reliability magnitude, index and s values for Example - III S.No Bit index i m i k s [ S.No Table 8 Partial RLL for Example -III Bits in error ,,,2, ,,28,2, ,,,20 3,,0, Selected and relevant segments of the RLL are shown in Table 8. Applying the proposed algorithm, the word 98ad2h with f = is the first candidate codeword identified and it is returned as the target codeword. This is returned after 33 entries in the RLL have been checked. Example - IV Similar results were obtained with (2, ) code, once again bringing out the efficacy of the proposed method. A (2, ) binary BCH code with d min = 2 and t = d min = 0 is taken. The message h has been encoded as {32a90,8009a2b,8e22e3,bae9ch} and transmitted over an AWGN channel with σ = 0.. k f E-ISSN: Issue, Volume 2, June 203
11 Details of the bits in an erroneously received word are reproduced in Table 9. The received word Z = {22a90,a0380e2b,8e222,f2a9ch}; the error pattern e = {00000,20300,80,0800h}; K values in error:,2,3,2,8,2,,,3,,30,,2. Table 9 Reliability magnitude, index and s values for Example - IV S.No Bit index i m i K s [ proposed algorithm. Plots of Block Error Rate with conventional hard decision decoding, RLL decoding and Chase-2 decoding for about 000 transmissions for (,) and (3,) BCH codes are given in Figure 2 and Figure 3 respectively. For RLL the reliability index k is used as a threshold for error correction. In Figure 2 and Figure 3, a threshold value of and ( = d min -) are used. However the performance of RLL can be improved by increasing the threshold (the error correcting capability). The same is shown in Figure as plots of BLER versus threshold values (>) for (,) code for some representative SNR values. SNR in db BLER HDD RLL Chase Figure 2. Comparision of Block Error Rate between RLL, HDD, Chase-2 for (,) BCH code The numbers in the y axis represent the respective log value. SNR in db BLER HDD RLL Chase Chase II and Chase III algorithms fail to decode this received word and the proposed Direct Target Codeword Identification Algorithm identifies the target codeword with the f value as which is the transmitted codeword. Simulation Results Extensive simulations were carried out with (, ), (3, ), and (2, ) BCH codes using the Figure 3. Comparision of Block Error Rate between RLL, HDD, Chase-2 for (3,) BCH code The numbers in the y axis represent the respective log value. min/ 2 The implementation of Chase-2 calls for 2 d [] number of algebraic decodings for all values of min/ 2 SNR. With 2 d algebraic decodings, the complexity of Chase-2 decoding is made orders higher by the Berlekamp Massey algorithm having multiplicative complexity O(t 2 ), and Chien search E-ISSN: Issue, Volume 2, June 203
12 requiring O(tn) multiplications [2]. BLER Threshold 9 3 SNR = 0 db SNR =. db SNR = 2.0 db SNR =. db Average Decoding Complexity SNR = 0 db SNR =. db SNR = 2.0 db SNR =. db Threshold Figure. Plot of Block Error Rate versus Threshold value (>) for (,) code With RLL, the algebraic decoding is simplified to division by the generator polynomial. Since the evaluation of RLL entry differs with the noise level the RLL complexity varies with SNR. With this as the basis for complexity measure, the plot of average decoding complexity for (,) code for a representative threshold value of is given in Figure. It can be noted that complexity here is substantially lower than that of implementation of algebraic decoding using say Berlekamp algorithm and Chien search [2]. A similar study has been carried out for different threshold values with other codes as well. The study shows that with increase in the threshold value for performance improvement, the complexity increases significantly at very low noise levels. Plots of average decoding complexity versus threshold (>) for the (,) code at representative SNR values are shown in Figure. Average Decoding Complexity SNR in db RLL Complexity Figure. Complexity curve of (,) BCH code for a threshold value of Figure. Average decoding complexity versus threshold (>) for (,) BCH code. Conclusion A new algorithm for soft decoding of binary codes is evolved in the paper. It uses soft information and achieves extended error correcting radius. The superiority of the algorithm lies in the number of errors and patterns of errors corrected even under low SNR conditions. The concept of the structured RLL that has been introduced in the paper is central to the proposed soft decoding algorithm; it enables identification of the target codeword with minimal search. The need for identifying a number of candidate codewords and selecting the most reliable one from amongst them as with the class of Chase algorithms and their modified versions is obviated. Detailed simulations carried out bring out the effectiveness of the approach. Significantly the algorithm yields the best that is possible with SDD based approaches. The simulation results have been summarized in the paper and a few representative cases presented to illustrate the superiority of the approach. All soft decision algorithms are equally effective at high SNR conditions and the decisive factor in the preference of one or another is the effectiveness under low SNR conditions. Communication schemes of recent interest which target low SNR channels can benefit from algorithms of the type presented here. Non-binary BCH codes especially Reed Solomon Codes are in wide use either in stand alone or in concatenated schemes in various applications. After Guruswami and Sudan s novel algorithm [3] of list decoding of Reed Solomon codes many E-ISSN: Issue, Volume 2, June 203
13 significant developments [] have come up. The seminal work of Kotter [] has spurred interest in soft decision decoding strategies for decoding Reed Solomon Codes beyond the conventional decoding radius. In this scenario the extension of the concept of RLL and its use for soft decoding of non-binary codes can be of real potential. References: [] G. D. Forney, Jr., Generalized Minimum Distance Decoding, IEEE Transactions on Information Theory, Vol. 2, 9, pp [2] David Chase, A Class of Algorithms for Decoding Block Codes With Channel Measurement Information, IEEE Transactions on Information Theory, Vol. 8, 92, pp [3] Marc P. C. Fossorier, and Shu Lin, Soft- Decision Decoding of Linear Block Codes based on Ordered Statistics, IEEE Transactions on Information Theory, Vol., 99, pp [] Jos.H.Weber, Low Complexity Chase-Like Bounded-Distance Decoding Algorithms GLOBECOM, 2003, pp [] Idriss Chana, Hamid Allouch, and Mostafa Belkasmi, An Efficient New Soft Decision Decoding Algorithm for Binary Cyclic Codes, International Conference on Multimedia Computing and Systems, 20. [] B.Yamuna, T.R.Padmanabhan, A Reliability Level List based SDD algorithm for binary Cyclic Block codes, International Journal of Computers, Communication and Control, Vol., No.2, 202, pp [] Eran Fishler, Ofer Amrani, and Yair Be ery, Geometrical and Performance Analysis of GMD and Chase Decoding Algorithms, IEEE Transactions on Information Theory, Vol., 999, pp [8] Jos H. Weber, Marc P.C. Fossorier, Limited- Trial Chase-Like Algorithms achieving Bounded-Distance Decoding, IEEE Transactions on Information Theory, Vol. 0, 200, pp [9] Marc P. C. Fossorier, and Shu Lin, Chase-Type and GMD Coset Decodings, IEEE Transactions on Commuications, Vol. 8, 2000, pp [0] WenyiJin and Marc.P.C.Fossorier, Reliability-Based Soft-Decision Decoding with Multiple Biase, IEEE Transactions on Information Theory, Vol. 3, 200, pp [] Toshimitsu Kaneko, Toshihisa Nishijima,Hiroshige Inazumi and Shigeichi Hirasawa, An efficient Maximum- likelihood- Decoding algorithm for linear Block codes with algebraic decoder, IEEE Transactions on Information Theory, Vol. 0,No.2, 99, pp [2] Schipani D, Elia M, Rosenthal J, On the decoding complexity of cyclic codes up to BCH bound, IEEE International Symposium on Information Theory Proceedings (ISIT), 20. pp [3] Robert J. McEliece, The Guruswami-Sudan decoding algorithm for Reed-Solomon codes, Interplanetary Network Progress Report (NASA), 2003, pp [] Jing Jiang, Krishna R. Narayanan, Algebraic Soft-Decision Decoding of Reed Solomon Codes Using Bit-Level Soft Information, IEEE Transactions on Information Theory, Vol., pp, 2008, [] Ralf Koetter, Alexander Vardy, Algebraic Soft-Decision Decoding of Reed Solomon Codes, IEEE Transactions on Information Theory, Vol. 9, 2003, pp E-ISSN: Issue, Volume 2, June 203
Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System
Digital Modulation David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh http://www.tele.pitt.edu/tipper.html Typical Communication System Source
Coding and decoding with convolutional codes. The Viterbi Algor
Coding and decoding with convolutional codes. The Viterbi Algorithm. 8 Block codes: main ideas Principles st point of view: infinite length block code nd point of view: convolutions Some examples Repetition
Notes 11: List Decoding Folded Reed-Solomon Codes
Introduction to Coding Theory CMU: Spring 2010 Notes 11: List Decoding Folded Reed-Solomon Codes April 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami At the end of the previous notes,
Reed-Solomon Codes. by Bernard Sklar
Reed-Solomon Codes by Bernard Sklar Introduction In 1960, Irving Reed and Gus Solomon published a paper in the Journal of the Society for Industrial and Applied Mathematics [1]. This paper described a
ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING
Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA
230358 - BMAC - Basic Mathematics for Algebraic Coding Theory with Applications to Cryptography
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 743 - MA IV - Department of Applied Mathematics IV MASTER'S
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUMBER OF REFERENCE SYMBOLS
PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUM OF REFERENCE SYMBOLS Benjamin R. Wiederholt The MITRE Corporation Bedford, MA and Mario A. Blanco The MITRE
Performance of Quasi-Constant Envelope Phase Modulation through Nonlinear Radio Channels
Performance of Quasi-Constant Envelope Phase Modulation through Nonlinear Radio Channels Qi Lu, Qingchong Liu Electrical and Systems Engineering Department Oakland University Rochester, MI 48309 USA E-mail:
CODED SOQPSK-TG USING THE SOFT OUTPUT VITERBI ALGORITHM
CODED SOQPSK-TG USING THE SOFT OUTPUT VITERBI ALGORITHM Daniel Alam Department of Electrical Engineering & Computer Science University of Kansas Lawrence, KS 66045 [email protected] Faculty Advisor: Erik Perrins
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
Adaptive Linear Programming Decoding
Adaptive Linear Programming Decoding Mohammad H. Taghavi and Paul H. Siegel ECE Department, University of California, San Diego Email: (mtaghavi, psiegel)@ucsd.edu ISIT 2006, Seattle, USA, July 9 14, 2006
Coding Theorems for Turbo-Like Codes Abstract. 1. Introduction.
Coding Theorems for Turbo-Like Codes Dariush Divsalar, Hui Jin, and Robert J. McEliece Jet Propulsion Laboratory and California Institute of Technology Pasadena, California USA E-mail: [email protected],
Chapter 1 Introduction
Chapter 1 Introduction 1. Shannon s Information Theory 2. Source Coding theorem 3. Channel Coding Theory 4. Information Capacity Theorem 5. Introduction to Error Control Coding Appendix A : Historical
Data Link Layer Overview
Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,
Teaching Convolutional Coding using MATLAB in Communication Systems Course. Abstract
Section T3C2 Teaching Convolutional Coding using MATLAB in Communication Systems Course Davoud Arasteh Department of Electronic Engineering Technology, LA 70813, USA Abstract Convolutional codes are channel
A Practical Scheme for Wireless Network Operation
A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving
N O T E S. A Reed Solomon Code Magic Trick. The magic trick T O D D D. M A T E E R
N O T E S A Reed Solomon Code Magic Trick T O D D D. M A T E E R Howard Community College Columbia, Maryland 21044 [email protected] Richard Ehrenborg [1] has provided a nice magic trick that can be
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
The Analysis of DVB-C signal in the Digital Television Cable Networks
The Analysis of DVB-C signal in the Digital Television Cable Networks Iulian UDROIU (1, Nicoleta ANGELESCU (1,Ioan TACHE (2, Ion CACIULA (1 1- "VALAHIA" University of Targoviste, Romania 2- POLITECHNICA
DVB-T BER MEASUREMENTS IN THE PRESENCE OF ADJACENT CHANNEL AND CO-CHANNEL ANALOGUE TELEVISION INTERFERENCE
DVB-T MEASUREMENTS IN THE PRESENCE OF ADJACENT CHANNEL AND CO-CHANNEL ANALOGUE TELEVISION INTERFERENCE M. Mª Vélez ([email protected]), P. Angueira, D. de la Vega, A. Arrinda, J. L. Ordiales UNIVERSITY
BER Performance Analysis of SSB-QPSK over AWGN and Rayleigh Channel
Performance Analysis of SSB-QPSK over AWGN and Rayleigh Channel Rahul Taware ME Student EXTC Department, DJSCOE Vile-Parle (W) Mumbai 056 T. D Biradar Associate Professor EXTC Department, DJSCOE Vile-Parle
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor
SECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341 Multinode Cooperative Communications in Wireless Networks Ahmed K. Sadek, Student Member, IEEE, Weifeng Su, Member, IEEE, and K.
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
Introduction to Algebraic Coding Theory
Introduction to Algebraic Coding Theory Supplementary material for Math 336 Cornell University Sarah A. Spence Contents 1 Introduction 1 2 Basics 2 2.1 Important code parameters..................... 4
Nonlinear Multi-Error Correction Codes for Reliable NAND Flash Memories
1 Nonlinear Multi-Error Correction Codes for Reliable NAND Flash Memories Zhen Wang, Student Member, IEEE, Mark Karpovsky, Fellow, IEEE, and Ajay Joshi, Member, IEEE Abstract Multi-level cell (MLC NAND
Lezione 6 Communications Blockset
Corso di Tecniche CAD per le Telecomunicazioni A.A. 2007-2008 Lezione 6 Communications Blockset Ing. Marco GALEAZZI 1 What Is Communications Blockset? Communications Blockset extends Simulink with a comprehensive
Sheet 7 (Chapter 10)
King Saud University College of Computer and Information Sciences Department of Information Technology CAP240 First semester 1430/1431 Multiple-choice Questions Sheet 7 (Chapter 10) 1. Which error detection
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan
Digital Video Broadcasting By Satellite
Digital Video Broadcasting By Satellite Matthew C. Valenti Lane Department of Computer Science and Electrical Engineering West Virginia University U.S.A. Apr. 2, 2012 ( Lane Department LDPCof Codes Computer
Research on the UHF RFID Channel Coding Technology based on Simulink
Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed
MOST error-correcting codes are designed for the equal
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 3, MARCH 2007 387 Transactions Letters Unequal Error Protection Using Partially Regular LDPC Codes Nazanin Rahnavard, Member, IEEE, Hossein Pishro-Nik,
Hardware Implementation for Error Correction Using Software-Defined Radio Platform
European Journal of Scientific Research ISSN 1450-216X Vol.38 No.2 (2009), pp.337-350 EuroJournals Publishing, Inc. 2009 http://www.eurojournals.com/ejsr.htm Hardware Implementation for Error Correction
Adaptive Equalization of binary encoded signals Using LMS Algorithm
SSRG International Journal of Electronics and Communication Engineering (SSRG-IJECE) volume issue7 Sep Adaptive Equalization of binary encoded signals Using LMS Algorithm Dr.K.Nagi Reddy Professor of ECE,NBKR
Sequential Decoding of Binary Convolutional Codes
Sequential Decoding of Binary Convolutional Codes Yunghsiang S. Han Graduate Institute of Communication, National Taipei University Taiwan E-mail: [email protected] Y. S. Han Sequential Decoding of
The finite field with 2 elements The simplest finite field is
The finite field with 2 elements The simplest finite field is GF (2) = F 2 = {0, 1} = Z/2 It has addition and multiplication + and defined to be 0 + 0 = 0 0 + 1 = 1 1 + 0 = 1 1 + 1 = 0 0 0 = 0 0 1 = 0
Implementing Digital Wireless Systems. And an FCC update
Implementing Digital Wireless Systems And an FCC update Spectrum Repacking Here We Go Again: The FCC is reallocating 600 MHz Frequencies for Wireless Mics 30-45 MHz (8-m HF) 174-250 MHz (VHF) 450-960 MHz
Enhancing the SNR of the Fiber Optic Rotation Sensor using the LMS Algorithm
1 Enhancing the SNR of the Fiber Optic Rotation Sensor using the LMS Algorithm Hani Mehrpouyan, Student Member, IEEE, Department of Electrical and Computer Engineering Queen s University, Kingston, Ontario,
Parametric Comparison of H.264 with Existing Video Standards
Parametric Comparison of H.264 with Existing Video Standards Sumit Bhardwaj Department of Electronics and Communication Engineering Amity School of Engineering, Noida, Uttar Pradesh,INDIA Jyoti Bhardwaj
An Adaptive Decoding Algorithm of LDPC Codes over the Binary Erasure Channel. Gou HOSOYA, Hideki YAGI, Toshiyasu MATSUSHIMA, and Shigeichi HIRASAWA
2007 Hawaii and SITA Joint Conference on Information Theory, HISC2007 Hawaii, USA, May 29 31, 2007 An Adaptive Decoding Algorithm of LDPC Codes over the Binary Erasure Channel Gou HOSOYA, Hideki YAGI,
Data Storage 3.1. Foundations of Computer Science Cengage Learning
3 Data Storage 3.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List five different data types used in a computer. Describe how
A WEB BASED TRAINING MODULE FOR TEACHING DIGITAL COMMUNICATIONS
A WEB BASED TRAINING MODULE FOR TEACHING DIGITAL COMMUNICATIONS Ali Kara 1, Cihangir Erdem 1, Mehmet Efe Ozbek 1, Nergiz Cagiltay 2, Elif Aydin 1 (1) Department of Electrical and Electronics Engineering,
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin
Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:
Chapter 3 Data Storage Objectives After studying this chapter, students should be able to: List five different data types used in a computer. Describe how integers are stored in a computer. Describe how
IN current film media, the increase in areal density has
IEEE TRANSACTIONS ON MAGNETICS, VOL. 44, NO. 1, JANUARY 2008 193 A New Read Channel Model for Patterned Media Storage Seyhan Karakulak, Paul H. Siegel, Fellow, IEEE, Jack K. Wolf, Life Fellow, IEEE, and
Capacity Limits of MIMO Channels
Tutorial and 4G Systems Capacity Limits of MIMO Channels Markku Juntti Contents 1. Introduction. Review of information theory 3. Fixed MIMO channels 4. Fading MIMO channels 5. Summary and Conclusions References
JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
Non-Data Aided Carrier Offset Compensation for SDR Implementation
Non-Data Aided Carrier Offset Compensation for SDR Implementation Anders Riis Jensen 1, Niels Terp Kjeldgaard Jørgensen 1 Kim Laugesen 1, Yannick Le Moullec 1,2 1 Department of Electronic Systems, 2 Center
(2) (3) (4) (5) 3 J. M. Whittaker, Interpolatory Function Theory, Cambridge Tracts
Communication in the Presence of Noise CLAUDE E. SHANNON, MEMBER, IRE Classic Paper A method is developed for representing any communication system geometrically. Messages and the corresponding signals
A New Digital Communications Course Enhanced by PC-Based Design Projects*
Int. J. Engng Ed. Vol. 16, No. 6, pp. 553±559, 2000 0949-149X/91 $3.00+0.00 Printed in Great Britain. # 2000 TEMPUS Publications. A New Digital Communications Course Enhanced by PC-Based Design Projects*
How To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
A Performance Study of Wireless Broadband Access (WiMAX)
A Performance Study of Wireless Broadband Access (WiMAX) Maan A. S. Al-Adwany Department of Computer & Information Engineering, College of Electronics Engineering University of Mosul Mosul, Iraq [email protected]
Complexity-bounded Power Control in Video Transmission over a CDMA Wireless Network
Complexity-bounded Power Control in Video Transmission over a CDMA Wireless Network Xiaoan Lu, David Goodman, Yao Wang, and Elza Erkip Electrical and Computer Engineering, Polytechnic University, Brooklyn,
Adaptive Cut Generation Algorithm for Improved Linear Programming Decoding of Binary Linear Codes
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 10, OCTOBER 2012 6581 Adaptive Cut Generation Algorithm for Improved Linear Programming Decoding of Binary Linear Codes Xiaojie Zhang, Student Member,
How To Understand The Quality Of A Wireless Voice Communication
Effects of the Wireless Channel in VOIP (Voice Over Internet Protocol) Networks Atul Ranjan Srivastava 1, Vivek Kushwaha 2 Department of Electronics and Communication, University of Allahabad, Allahabad
Notes on Factoring. MA 206 Kurt Bryan
The General Approach Notes on Factoring MA 26 Kurt Bryan Suppose I hand you n, a 2 digit integer and tell you that n is composite, with smallest prime factor around 5 digits. Finding a nontrivial factor
Multihopping for OFDM based Wireless Networks
Multihopping for OFDM based Wireless Networks Jeroen Theeuwes, Frank H.P. Fitzek, Carl Wijting Center for TeleInFrastruktur (CTiF), Aalborg University Neils Jernes Vej 12, 9220 Aalborg Øst, Denmark phone:
E190Q Lecture 5 Autonomous Robot Navigation
E190Q Lecture 5 Autonomous Robot Navigation Instructor: Chris Clark Semester: Spring 2014 1 Figures courtesy of Siegwart & Nourbakhsh Control Structures Planning Based Control Prior Knowledge Operator
Efficient Recovery of Secrets
Efficient Recovery of Secrets Marcel Fernandez Miguel Soriano, IEEE Senior Member Department of Telematics Engineering. Universitat Politècnica de Catalunya. C/ Jordi Girona 1 i 3. Campus Nord, Mod C3,
PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION
PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION Introduction In the previous chapter, we explored a class of regression models having particularly simple analytical
A simple criterion on degree sequences of graphs
Discrete Applied Mathematics 156 (2008) 3513 3517 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Note A simple criterion on degree
PERFORMANCE ANALYSIS OF HIGH RESOLUTION IMAGES USING INTERPOLATION TECHNIQUES IN MULTIMEDIA COMMUNICATION SYSTEM
PERFORMANCE ANALYSIS OF HIGH RESOLUTION IMAGES USING INTERPOLATION TECHNIQUES IN MULTIMEDIA COMMUNICATION SYSTEM Apurva Sinha 1, Mukesh kumar 2, A.K. Jaiswal 3, Rohini Saxena 4 Department of Electronics
Analysis of Compression Algorithms for Program Data
Analysis of Compression Algorithms for Program Data Matthew Simpson, Clemson University with Dr. Rajeev Barua and Surupa Biswas, University of Maryland 12 August 3 Abstract Insufficient available memory
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
Weakly Secure Network Coding
Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this
Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics:
Voice Transmission --Basic Concepts-- Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics: Amplitude Frequency Phase Voice Digitization in the POTS Traditional
INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2
ISSN 2277-2685 IJESR/June 2014/ Vol-4/Issue-6/333-337 Y. Naveena et al./ International Journal of Engineering & Science Research INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena
The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT
The Effect of Network Cabling on Bit Error Rate Performance By Paul Kish NORDX/CDT Table of Contents Introduction... 2 Probability of Causing Errors... 3 Noise Sources Contributing to Errors... 4 Bit Error
RN-coding of Numbers: New Insights and Some Applications
RN-coding of Numbers: New Insights and Some Applications Peter Kornerup Dept. of Mathematics and Computer Science SDU, Odense, Denmark & Jean-Michel Muller LIP/Arénaire (CRNS-ENS Lyon-INRIA-UCBL) Lyon,
RN-Codings: New Insights and Some Applications
RN-Codings: New Insights and Some Applications Abstract During any composite computation there is a constant need for rounding intermediate results before they can participate in further processing. Recently
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
Modified Golomb-Rice Codes for Lossless Compression of Medical Images
Modified Golomb-Rice Codes for Lossless Compression of Medical Images Roman Starosolski (1), Władysław Skarbek (2) (1) Silesian University of Technology (2) Warsaw University of Technology Abstract Lossless
Jitter Measurements in Serial Data Signals
Jitter Measurements in Serial Data Signals Michael Schnecker, Product Manager LeCroy Corporation Introduction The increasing speed of serial data transmission systems places greater importance on measuring
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
Khalid Sayood and Martin C. Rost Department of Electrical Engineering University of Nebraska
PROBLEM STATEMENT A ROBUST COMPRESSION SYSTEM FOR LOW BIT RATE TELEMETRY - TEST RESULTS WITH LUNAR DATA Khalid Sayood and Martin C. Rost Department of Electrical Engineering University of Nebraska The
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,
Sphere-Bound-Achieving Coset Codes and Multilevel Coset Codes
820 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 46, NO 3, MAY 2000 Sphere-Bound-Achieving Coset Codes and Multilevel Coset Codes G David Forney, Jr, Fellow, IEEE, Mitchell D Trott, Member, IEEE, and Sae-Young
A Survey of the Theory of Error-Correcting Codes
Posted by permission A Survey of the Theory of Error-Correcting Codes by Francis Yein Chei Fung The theory of error-correcting codes arises from the following problem: What is a good way to send a message
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National
SOLVING POLYNOMIAL EQUATIONS
C SOLVING POLYNOMIAL EQUATIONS We will assume in this appendix that you know how to divide polynomials using long division and synthetic division. If you need to review those techniques, refer to an algebra
RADIO FREQUENCY INTERFERENCE AND CAPACITY REDUCTION IN DSL
RADIO FREQUENCY INTERFERENCE AND CAPACITY REDUCTION IN DSL Padmabala Venugopal, Michael J. Carter*, Scott A. Valcourt, InterOperability Laboratory, Technology Drive Suite, University of New Hampshire,
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 2, FEBRUARY 2002 359 Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel Lizhong Zheng, Student
Implementation of Modified Booth Algorithm (Radix 4) and its Comparison with Booth Algorithm (Radix-2)
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 6 (2013), pp. 683-690 Research India Publications http://www.ripublication.com/aeee.htm Implementation of Modified Booth
Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks
Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks Mostafa Dehghan, Dennis L. Goeckel, Majid Ghaderi, and Zhiguo Ding Department of Electrical and Computer Engineering, University
Factoring Polynomials
Factoring Polynomials Hoste, Miller, Murieka September 12, 2011 1 Factoring In the previous section, we discussed how to determine the product of two or more terms. Consider, for instance, the equations
ELEC3028 Digital Transmission Overview & Information Theory. Example 1
Example. A source emits symbols i, i 6, in the BCD format with probabilities P( i ) as given in Table, at a rate R s = 9.6 kbaud (baud=symbol/second). State (i) the information rate and (ii) the data rate
