SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 3, June 2020, pp. 3200~3207
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i3.pp3200-3207  3200
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Study of the operational SNR while constructing polar codes
Reda Benkhouya1
, Idriss Chana2
, Youssef Hadi3
1,3
MISC, Faculty of Sciences, Ibn Tofail University, Morocco
2
ISIC EST-LMMI ENSAM, Moulay Ismail University, Morocco
Article Info ABSTRACT
Article history:
Received May 30, 2019
Revised Dec 14, 2019
Accepted Jan 8, 2020
Channel coding is commonly based on protecting information to be
communicated across an unreliable medium, by adding patterns of
redundancy into the transmission path. Also referred to as forward error
control coding (FECC), the technique is widely used to enable correcting or
at least detecting bit errors in digital communication systems. In this paper
we study an original FECC known as polar coding which has proven to meet
the typical use cases of the next generation mobile standard. This work is
motivated by the suitability of polar codes for the new coming wireless era.
Hence, we investigate the performance of polar codes in terms of bit error
rate (BER) for several codeword lengths and code rates. We first perform a
discrete search to find the best operational signal-to-noise ratio (SNR) at two
different code rates, while varying the blocklength. We find in our extensive
simulations that the BER becomes more sensitive to operational SNR
(OSNR) as long as we increase the blocklength and code rate. Finally,
we note that increasing blocklength achieves an SNR gain, while increasing
code rate changes the OSNR domain. This trade-off sorted out must be taken
into consideration while designing polar codes for high-throughput
application.
Keywords:
Bhattacharyya parameter
Polar codes
SNR
Successive cancellation
decoding
Copyright © 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Reda Benkhouya,
MISC, Faculty of Sciences,
Ibn Tofail University,
Av. de L'Université, Kénitra, Morocco.
Email: reda.benkhouya@gmail.com
1. INTRODUCTION
Over last years, wireless applications have been growing fast and requiring more challenging coding
schemes. Recently, polar codes were proven to be capacity achieving for binary discrete memoryless channel
(B-DMC). Combined with high order modulation, polar code is powerful candidate for the next generation
mobile standard, where high transmission power efficiency and bandwidth efficiency are required [1].
Fortunately, both polar encoding and decoding are of low complexity, so need minimum time and space, and
this match green energy requirement [2]. The performance of polar codes enables their application in varying
channels, which tackles the universal coverage requirement. On the other side, complex use scenarios result
in heterogeneous networks where polar codes can find their suitable applications. Therefore, these codes have
become one popular topic and drawn intensive attentions from both academia and industry. Recent research
progresses on polar codes can be mainly categorized into two trends: 1) advanced decoding algorithms for
polar codes, and 2) efficient hardware implementation methods for polar codes [2].
Polar codes are linear block codes that rely on a polarization phenomenon. The advent of polar
codes is based on the channel polarization theory. The core idea of polar coding is to split a given vector
channel into multiple correlated bit channels and to use only the good ones, in the sense that they are either
extremely noisy or noiseless. Then, one can employ a separate sequential decoder on each sub-channel.
Polar codes have performed state-of-the-art codes of larger block lengths and code rates. Polar codes can also
Int J Elec & Comp Eng ISSN: 2088-8708 
Study of the operational SNR while constructing polar codes (Reda Benkhouya)
3201
be used for source coding, but this use will not be discussed in this paper. In the level of theoretical analysis
and development, substantial recent research progress has been achieved and reported. A by no means
complete list of references is [3, 4], see also [5] and the references therein. The aim of this paper is to
demonstrate how the code changes with the OSNR and the block length as well as the code rate for
the additive white Gaussian noise (AWGN) channel. Since it is not known what impact has the OSNR on
the BER performance of polar codes, this paper aims to open the related discussion. As concluded in [6] all
polar code constructions are equally good in AWGN if the OSNR is optimized for the best performance.
Thus in our work we may use simple algorithm only, namely Bhattacharyya bounds based construction.
The readers wanting to go deeper into the current study may experiment separately the orthogonal frequency-
division multiplexing (OFDM) [7-24] and exploit our approach to get the effect of such modulation
technique on the performance of the code construction. Obviously, OFDM is still an ultimate candidate for
wireless applications, since it allows resolving the well-known problem of spectrum underutilization [25].
The remainder of this paper is outlined as follows. Section 2 describes polar codes that we study in this work.
In Section 3 we review a simplest construction to select the bit-channels over which the information bits are
transmitted. The decoder adopted is introduced in Section 4. Afterwards, simulation results are provided in
Section 5. Finally, conclusions and future works follow in Section 6.
2. POLAR CODING
Let ( , )N K be a linear bock code, where 2 n
N is the code length, n is an arbitrary integer, K is
the code dimension, the code rate of such coding scheme is defined by R K N , 0  K N . A binary
polar code is completely specified by a triple ( , , )FN K , where F ,  F N K is the set of the frozen
bit indices. The remaining K elements are called the information bits indices. Let
n fois

  n
F F F be
the n-fold Kronecker product of Arikan’s standard polarizing kernel
1 1
0 1
 
 
 
F . The matrix n
F denotes
the n-th tensor power of F and could be evaluated by applying the Kronecker product recursively according
to ( 1)  
 n n
F F F . Then for a vector of information bits u of length K , a codeword is generated as
 x G u (1)
where ( ) C
n
G F
is the generator matrix of polar code which picks a specific subset of K rows of
the N N matrix, and  0,1, , 1 F FC
N corresponds to the set of non-frozen bit indices. Implicitly,
with respect to classical N N matrix based encoding, the frozen bits F are set to zero and we follow this
convention throughout the paper. Consider a channel W is used for transmitting the information between
input and output. Let 1 2( , , , ) Nx x x x be the inputs vector and 1( , , ) Ny y y be the outputs vector.
Given a binary-input channel : W X Y with  0,1X  , the Bhattacharyya parameter ( )Z W can be used
to measure the error performance of the channel. In general, we can choose the positions of the information
bits and frozen bits by their Bhattacharyya parameter ( )Z W , which can be defined as the upper bound of
the decision error probability when the channel is used to transmit zero or one as follows:
( ) ( | 0) ( |1)y Y
Z W p y p y (2)
where ( | )p y s is the conditional probability of the received y provided that  0,1s is transmitted.
As the bit-channels start polarizing, they approach either noiseless good bit-channel or a pure-noise bad bit-
channel. The Bhattacharyya parameter indicates that the fraction of bit channels approaches the mutual
information ( )I W as  n . Even though systematic variants of polar encoding do exist, we construct
the original polar codes which are non-systematic, and being a linear code, the encoding simply needs
a matrix multiplication. Once the code size is larger, matrix multiplication becomes computationally
expensive as far as 2
( )O N . Thus, in our work we use an alternative implementation based on FFT’s butterfly
circuit model, which exhibits significantly reduced computational complexity of ( log ).O N N In our polar
code design, we use recursive estimation of the just introduced Bhattacharyya parameters of bit-channels,
which is going to be detailed in the next section.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3200 - 3207
3202
3. THE CODE CONSTRUCTION
Recall that polar code construction is ranking algorithm that selects K best among N possible
polar bit-channels, in terms of the bit error rate at a given initial value defined as the OSNR. The choice
of the set of frozen bit F is an important step in polar coding often referred to as polar code
construction. The original algorithm of polar codes is based on the evolution of simple bounds on
the Bhattacharyya parameters of bit channels. Due to its simplicity, this construction has been widely
used, and produced good polar codes. The basic idea is to create a coding system where one can access
each bit-channel individually and send data only through those for its Bhattacharyya parameter is close
to 0. The Bhattacharyya parameter ( )Z W is an upper bound on the error probability of transmission
over W with maximum likelihood (ML) decision when the channel is used only once to transmit
a 0 and 1. Intuitively, channels with ( ) Z W are almost noiseless, while channel with ( ) 1  Z W are
almost pure-noise channel for a given 0 1  . The Bhattacharyya parameter of channel plays
an important part in the construction of Polar codes. For a more detailed exposition, we confer
the following recursion for 0, , 1 j n with initial 0,0

 RS
z e chosen to optimize the code
performance at a certain ( RS ), where S is the SNR value.
2
, ,
2 11,
, 2
2 0 2
2 2 

   
    j
j
j i j i
j jj i
j i
z z i
z
z i
(3)
The indices of the highest N K values in the set of N final stage values  , : 0, , 1 n iz i N
form the set F . The code rate R can be varied by adding or deleting subchannels from the good
subchannel set. With code length N increasing to infinity, bit-channels polarize to be nearly noiseless or
useless [1]. After performing channel polarization transform, the good subchannels are assigned
information bits and the bad ones are set frozen bits. Let such a channel be defined by the transition
probabilities ( | )W y x ,  0,1 x X and y Y . Based on (2), the definition of the Bhattacharyya parameter
of W extended from discrete to continuous channel is given by
( ) ( | 0) ( |1) Z W W y W y dy (4)
where ( | )W y s is the transition probability of receiving y when  0,1s has been sent. Then we
analyze the initial value of ( )Z W for Gaussian channel. At first, the initial value of Bhattacharyya
parameter is definitely difficult since channels are continuous. Suppose there is a communication link
with Gaussian noise with expectation zero and variance 2
 . At the same time, BPSK is used as
modulation. The recursive algorithm of construction requires an initial value, corresponding to the worst
BER and may be replaced with 0 bRE N
e , where bE the energy spent per each information bit and
2
0 2 N . Moreover, the initial value of Bhattacharyya parameter is not suitable for all
communication channels since polar codes are channel specific designs. By definition of polar codes,
the construction should be repeated at every time channel changes. Nevertheless, we wish to construct
a polar code at one OSNR and use it for a range of possible SNRs. This way, we use a unique code
created by running the code-construction at a single value of the channel-state and keeping the code
unchanged for all channel conditions. As we see later, it is crucial to properly select the adequate OSNR
given rate and blocklength for the performance in terms of bit error rate.
4. THE NATIVE DECODING
It is proven in [26] that for any ( , )N K polar code on any B-DMC, there exists an encoder and
a decoder known as successive cancellation (SC) decoder, each with the same order of complexity
( log ).O N N We assume that the decoder considered in the system is a SC decoder, for which polar codes
are tailored. SC algorithm, which decodes each bit in a successive manner, is usually employed and proposed
as sub-optimal approach. By taking advantage of the polarization effect, polar codes can achieve
the symmetric capacity of binary memoryless channels with low complexity SC decoding strategy [1].
Being fundamental for all the later advanced decoders that exhibit superior performance, one cannot avoid
Int J Elec & Comp Eng ISSN: 2088-8708 
Study of the operational SNR while constructing polar codes (Reda Benkhouya)
3203
having an SC decoder. The SC algorithm traverses the entire polar code tree depth first, visiting all leaf
nodes [27]. From decoding viewpoint, constructing a polar code of dimension K is equivalent to finding
the K best bit-channels that model the channel that the decoder sees when it recovers one by one
the information bits corresponding to the received codeword by the SC decoder [28]. According to
the construction of polar codes, two groups of bits are established from the many independent copies of
channels. The first group is the information bits  :1  FC iU u i K and the second one is the frozen bits
 :1   F jU u j N K that are made known to the decoder. The log-likelihood ratios (LLR) of
the channel are calculated as
( | 0)
( ) ln
( | 1)



i i
i
i i
p y x
LLR y
p y x
(5)
The SC applies the recursive calculations on the received LLRs from (5) and the decision function
for the SC decoder is defined by
1
1 1
1
1 1
0, ( , ) 0ˆ
1, ( , ) 0


 
 

N i
i N i
LLR y U
U
LLR y U
(6)
where 1
1 1( , )N i
LLR y U is equivalent to the likelihood ratio of iU given the channel output Y and 1
1
i
U which
are found previously by the decoder. It should be mentioned that, for the first bit 1
ˆU value, the decoder uses
only y for the decision. In our simulation we use an implementation of the basic successive cancellation
decoder, which we believe to be the simplest implementation possible.
5. NUMERCIAL RESULTS AND DISCUSSION
In this section we report the results of our simulations. We consider comparing the performance of
polar codes from various parameters. Even if the error performance of polar codes with short codeword
length is already described by [4] as mediocre under SC algorithm, we insist on considering blocklength
N=256 in addition to two new blocklengths, namely N=1024, N=4096. For each blocklength we consider
only high code rate R=5/6. The conditions of simulation are described in Table 1.
Table 1. Simulation parameters
Parameter name Value
Minimum block samples 1000
Minimum bit errors 100
Modulation BPSK
Channel AWGN
The transmission is supposed to be over an AWGN channel with zero mean. Without loss of
generality, we normalize the noise variance to be unity in the remainder of our simulation. Bits in codeword
are modulated using binary phase shift keying (BPSK). We ensure a practical values of BER (e.g. order of
10-3
and less), and guarantee a minimum of 1000 block samples. For each evaluated SNR, we achieve at least
100 bit errors. In order to study the impact of OSNR on BER performance, we use the discrete search of
OSNR over a finite interval. We carry out simulations and we plot the results in logarithmic domain.
The discrete search consists on spanning the whole interval starting from the OSNR -5dB as initial point
when necessary. The search is pursued further by incrementing OSNR as long as the BER improves. We stop
the discrete search once the BER performance degrades for at least one from the next OSNRs. By this way,
we retrieve the candidate OSNR whose BER curve is the first one, which crosses the uncoded curve.
We confirm the BER degradation by using some greater value of OSNR (e.g. 10dB). Note that in each figure,
the important portion of the BER curves is magnified, where curves of studied codes cross the curve of
the uncoded system.
Figure 1 illustrates SNR versus BER for N=256 at R=5/6. It can be noted that almost all OSNRs
offer the same performance. It is also shown that the uncoded case offers better performance in terms of BER
than the coded one since SNR is less than 3.77dB. According to our adopted method based on discrete
search, the candidate OSNR is 1dB. Increasing N to 1024 makes the performance weakly sensitive to
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3200 - 3207
3204
the OSNR, as depicted in Figure 2. It is shown once again that the uncoded case offers better performance
than the coded one since SNR is less than 3.65dB for R=5/6. From the zoom part, the candidate OSNR is 3dB
for R=5/6.
Figure 1. Impact of OSNR on BER performance for N=256 at R=5/6
Figure 2. BER sensitivity to OSNR for N=1024 at R=5/6
Figure 3 depicts the performance of polar codes produced for N=4096 at R=5/6. Unlike smaller
blocklength, it is shown that for N=4096 the BER becomes plainly sensitive to OSNR. The uncoded system
offers better performance than the coded one in terms of BER since SNR is less than 3.468dB. It can be noted
that the candidate OSNR is 5dB. For instance, the BER degradation starts at OSNR > 5dB and degrades
dramatically when OSNR reaches 10dB. As recapitulation, increasing blocklength makes BER performance
Int J Elec & Comp Eng ISSN: 2088-8708 
Study of the operational SNR while constructing polar codes (Reda Benkhouya)
3205
sensitive to OSNR. It is indeed critical to construct polar code with a good BER performance. This has been
already stated in [6] but only for blocklength N=2048 and code rate R=1/2. To avoid confusion and stress
the differences, let us summarize the results in Table 2. The candidate OSNR corresponds to a selected value
according to the discrete search method. Figure 4 illustrates the construction chart for code rate R=5/6.
Clearly for a given code rate R; the higher blocklength is, the earlier the coded system outperforms
the uncoded one.
The curves demonstrate the BER performance versus SNR for the code rate R=5/6. While
constructing polar code with rate R=5/6, increasing blocklength from N=256 to N=4096 achieves the SNR
gain of Gain=1.2dB at the BER of 10-4
. This trade-off sorted out must be taken into consideration while
constructing polar codes for high-throughput application.
Figure 3. Impact of OSNR on BER performance for N=4096 at R=5/6
Figure 4. Construction chart for code rate R=5/6
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3200 - 3207
3206
Table 2. Impact of OSNR on BER sensitivity for code rate R=5/6
Code length Sensibility Candidate OSNR
256 Low 1
1024 Medium 3
4096 High 5
6. CONCLUSION
We restudied in this paper the non-universality of polar codes. We performed a discrete search to
find the best OSNR for code construction. We then compared BER performances for three codeword lengths
and observed that for short one the effect of OSNR is meaningless even for higher code rate. It is also
observed that for long blocklength, OSNR have huge impact on BER performance. In this paper, the BER
performance analysis is summarized to clarify discussion on construction perspective. We assume that
the proposed chart contributes to pave the path towards this end. The results shown are preliminary and
the work needs to be extended further to prove that the study is indeed viable for Rayleigh fading channel,
or even Nakagami-m fading channel. We intend to investigate in a future work the performance analysis of
the considered construction under orthogonal frequency-division multiplexing (OFDM). Such system
authorizes division of the bandwidth into narrow orthogonal sub channel, and this is useful to optimize
the spectrum use. However, concerning polar codes, the decoding performance of SC algorithm is still not
satisfying. We may obtain better performance using an iterative decoder. There is also a need to study
the effect of initial value of Bhattacharyya parameter on system’s performance in a future work.
REFERENCES
[1] P. Chen, M. Xu, B. Bai and X. Ma, “Design of polar coded 64-QAM,” 2016 9th International Symposium on Turbo
Codes and Iterative Information Processing (ISTC), Brest, pp. 251-255, 2016.
[2] L. Liu and C. Zhang, “Circuits and systems for 5G network: Massive MIMO and advanced coding,” 2015 IEEE
11th International Conference on ASIC (ASICON), Chengdu, pp. 1-4, 2015.
[3] T. C. Gulcu, M. Ye and A. Barg, “Construction of polar codes for arbitrary discrete memoryless channels,” 2016
IEEE International Symposium on Information Theory (ISIT), Barcelona, pp. 51-55, 2016.
[4] T. Wang, D. Qu and T. Jiang, “Parity-Check-Concatenated Polar Codes,” in IEEE Communications Letters, vol. 20,
no. 12, pp. 2342-2345, Dec. 2016.
[5] E. Arikan, “On the Origin of Polar Coding,” IEEE Journal on Selected Areas in Communications, vol. 34, no. 2,
pp. 209-223, 2016.
[6] H. Vangala, E. Viterbo and Y. Hong, “A comparative study of Polar Code Constructions for the AWGN Channel,”
pp. 1-9, 2015.
[7] G. A. Hussain, L. Audah, “BCH codes for 5G wireless communication systems over multipath fading channel,”
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 17, no. 1, pp. 310-316, 2020.
[8] P. Manhas, M.K Soni, “OFDM System Performance Evaluation under Different Fading Channels and Channel
Coding using Matlab Simulink,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS),
vol. 5, no. 2, pp. 260-266, 2017
[9] P. S. Swapna, S. Pillai Sakuntala, “Resource Allocation Algorithm for Symmetrical Services in OFDMA Systems,”
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 18, no. 2, pp. 867-874, 2020.
[10] J. Shukla, A. Joshi, and R. Tyagi, “PAPR analysis of OFDM system using AI based multiple signal
representation methods,” TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 17, no. 2,
pp. 2983-2991, 2020.
[11] M. K. Husein, “Minimize MIMO OFDM interference and noise ratio using polynomial-time algorithm,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 1, pp. 900-907, 2020.
[12] B. Sabbar, M. Khalifa, “Performance Evaluation of High Mobility OFDM Channel Estimation Techniques,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 3, pp. 2562-2568, 2020.
[13] S. Razmi, N. Parhizgar, “Adaptive resources assignment in OFDM-based cognitive radio systems,” International
Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 3, pp. 1935-1943, 2019.
[14] S. Suyoto, I. Iskandar, and S. Sugihartono, Adit Kurniawan, “Improved Timing Estimation Using Iterative
Normalization Technique for OFDM Systems,” International Journal of Electrical and Computer Engineering
(IJECE), vol. 7, no. 2, pp. 905-911, 2017.
[15] H. Hamlili, S. Kameche, and A. Abdelmalek, “SαS noise suppression for OFDM wireless communication
in rayleight channel,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 2,
pp. 2003-2010, 2020.
[16] B. Archana B., and T. P. Surekha, “Integrated approach for efficient power consumption and resource allocation
in MIMO-OFDMA,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 2,
pp. 2069-2076, 2020.
[17] A.H. Ali, and A. A. Hussien, “Comprehensive Investigation of Coherent Optical OFDM-RoF Employing 16QAM
External Modulation for Long-Haul Optical Communication System,” International Journal of Electrical and
Computer Engineering (IJECE), vol. 10, no. 3, pp. 2607-2616, 2020.
Int J Elec & Comp Eng ISSN: 2088-8708 
Study of the operational SNR while constructing polar codes (Reda Benkhouya)
3207
[18] M.I. Youssif, A.E. Emam, M.A. ElGhany, “Image multiplexing using residue number system coding over MIMO-
OFDM communication system,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9,
no. 6, pp. 4815-4825, 2019.
[19] M. D. Rozaini, A. Idris, D. M. Ali, E. Abdullah, “Median codeword Shift (MCS) technique for PAPR reduction
with low complexity in OFDM system,” International Journal of Electrical and Computer Engineering (IJECE),
vol. 9, no. 6, pp. 4882-4888, 2019
[20] M. F. Ghanim, “Performance investigation of WOFDM for 5G wireless networks,” International Journal of
Electrical and Computer Engineering (IJECE), vol. 9, no. 4, pp. 3153-3158, 2019
[21] K. J. Thajeel, I. K. Abboud, L. A. Kunbar, “Design of encrypted transceiver Non-coherent OFDM with ability to
correct coding bits of information,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9,
no. 4, pp. 3212-3220, 2019.
[22] A. H. Ali, H. J. Alhamdane, Begared Salih Hassen, “Design analysis and performance evaluation of the WDM
integration with CO-OFDM system for radio over fiber System,” Indonesian Journal of Electrical Engineering and
Computer Science (IJEECS), vol. 15, no. 2, pp. 870-878, 2019.
[23] S. Atoui, N. Doghmane, S. Afifi, “Blind frequency offset estimator for OFDM systems,” TELKOMNIKA
(Telecommunication, Computing, Electronics and Control), vol. 17, no. 6, pp. 2722-2728, 2019.
[24] Rawaa J. Hasan, and Hikmat N. Abdullah, “Comparative study of selected subcarrier index modulation
OFDM schemes,” TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 17, no. 1,
pp. 15-22, 2019.
[25] Z. M Abid, A. A Jaffaar, S. Q Hadi, “PAPR reduction in OFDM system for DVB-S2,” Indonesian Journal of
Electrical Engineering and Computer Science (IJEECS), vol. 17, no. 1, pp. 317-323, 2020.
[26] A. Hadi, K. M. Rabie and E. Alsusa, “Polar codes based OFDM-PLC systems in the presence of middleton class-A
noise,” 2016 10th International Symposium on Communication Systems, Networks and Digital Signal Processing
(CSNDSP), Prague, pp. 1-6, 2016.
[27] P. Giard et al., “Hardware decoders for polar codes: An overview,” 2016 IEEE International Symposium on
Circuits and Systems (ISCAS), Montreal, QC, pp. 149-152, 2016.
[28] M. Bardet, V. Dragoi, A. Otmani and J. Tillich, “Algebraic properties of polar codes from anew polynomial
formalism,” IEEE International Symposium on Information Theory, pp. 230-234, 2016.
BIOGRAPHIES OF AUTHORS
Reda Benkhouya was invited as a visiting scholar at Toulouse institute of computer science
research (IRIT), France, in 2004. Since 2006 he has been with Etisalat where he is currently an
ITSM. He is now pursuing the Ph.D. degree at Ibn Tofail University. His research interest
includes channel coding, cognitive radio, artificial intelligence, IoT, cloud and big data.
Idriss Chana received the Ph.D. degree from Mohamed V University, Morocco in 2013.
He is currently a full professor at Moulay Ismail University, Morocco. He is member of IEEE.
His research interests include information and communication technologies. A large part of his
research projects are related to Error correction codes and Turbo codes. Idriss Chana published
more than 20 papers in major journals and conferences in Information Theory.
Youssef Hadi received his Ph.D. degree in Computer Sciences and Telecommunications from
the Faculty of Sciences of the Mohammed V University, Rabat, Morocco in 2008. From 2009 to
2015, he was an Assistant Professor at Ibn Tofail University, Faculty of Sciences with LARIT
laboratory. Currently he is an Associate Professor at the same university and he is the Vice
Director of MISC Laboratory (Modeling of Information and Communication Systems). Also,
he is a member of IEEE and he is Student Branch Member of Ibn Tofail University. Youssef
Hadi research interests include Software Engineering, Model Driven Engineering, Cloud
Computing and Signal Processing.

More Related Content

What's hot

A new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityA new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityijwmn
 
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...cscpconf
 
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...inventy
 
The Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsThe Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsIJMER
 
IRJET- Synchronization Scheme of MIMO-OFDM using Monte Carlo Method
IRJET- Synchronization Scheme of MIMO-OFDM using Monte Carlo MethodIRJET- Synchronization Scheme of MIMO-OFDM using Monte Carlo Method
IRJET- Synchronization Scheme of MIMO-OFDM using Monte Carlo MethodIRJET Journal
 
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...IJECEIAES
 
A short introduction to Network coding
A short introduction to Network codingA short introduction to Network coding
A short introduction to Network codingArash Pourdamghani
 
Network coding
Network codingNetwork coding
Network codingLishi He
 
Hardware Architecture of Complex K-best MIMO Decoder
Hardware Architecture of Complex K-best MIMO DecoderHardware Architecture of Complex K-best MIMO Decoder
Hardware Architecture of Complex K-best MIMO DecoderCSCJournals
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy ChannelsChaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channelsiosrjce
 
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...ijcseit
 
Hamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderRSIS International
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...ijitjournal
 
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...TELKOMNIKA JOURNAL
 

What's hot (20)

A new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityA new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacity
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...
 
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...
 
Conference ECT 2010
Conference ECT 2010Conference ECT 2010
Conference ECT 2010
 
The Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsThe Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless Communications
 
Y25124127
Y25124127Y25124127
Y25124127
 
IRJET- Synchronization Scheme of MIMO-OFDM using Monte Carlo Method
IRJET- Synchronization Scheme of MIMO-OFDM using Monte Carlo MethodIRJET- Synchronization Scheme of MIMO-OFDM using Monte Carlo Method
IRJET- Synchronization Scheme of MIMO-OFDM using Monte Carlo Method
 
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
 
A short introduction to Network coding
A short introduction to Network codingA short introduction to Network coding
A short introduction to Network coding
 
Network coding
Network codingNetwork coding
Network coding
 
Co35503507
Co35503507Co35503507
Co35503507
 
Hardware Architecture of Complex K-best MIMO Decoder
Hardware Architecture of Complex K-best MIMO DecoderHardware Architecture of Complex K-best MIMO Decoder
Hardware Architecture of Complex K-best MIMO Decoder
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy ChannelsChaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channels
 
40120140505011
4012014050501140120140505011
40120140505011
 
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...
 
Network Coding
Network CodingNetwork Coding
Network Coding
 
Hamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar Decoder
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
 
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
 

Similar to Study of the operational SNR while constructing polar codes

Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner ijcisjournal
 
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNER
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNERNOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNER
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNERIJCI JOURNAL
 
Paper id 2720144
Paper id 2720144Paper id 2720144
Paper id 2720144IJRAT
 
Prediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsPrediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsIAEME Publication
 
Prediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsPrediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsiaemedu
 
Prediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsPrediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsiaemedu
 
IEEE 802.11a Physical Layer Simulation
IEEE 802.11a Physical Layer SimulationIEEE 802.11a Physical Layer Simulation
IEEE 802.11a Physical Layer SimulationMichail Grigoropoulos
 
Decoding of the extended Golay code by the simplified successive-cancellation...
Decoding of the extended Golay code by the simplified successive-cancellation...Decoding of the extended Golay code by the simplified successive-cancellation...
Decoding of the extended Golay code by the simplified successive-cancellation...TELKOMNIKA JOURNAL
 
BER Performance for Convalutional Code with Soft & Hard Viterbi Decoding
BER Performance for Convalutional Code with Soft & Hard  Viterbi DecodingBER Performance for Convalutional Code with Soft & Hard  Viterbi Decoding
BER Performance for Convalutional Code with Soft & Hard Viterbi DecodingIJMER
 
Performance of OFDM System under Different Fading Channels and Channel Coding
Performance of OFDM System under Different Fading Channels and Channel CodingPerformance of OFDM System under Different Fading Channels and Channel Coding
Performance of OFDM System under Different Fading Channels and Channel CodingjournalBEEI
 
BER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingBER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingIJEEE
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IRJET-Study of Performance analysis of Wind Tunnel Simulation of Pollutant Di...
IRJET-Study of Performance analysis of Wind Tunnel Simulation of Pollutant Di...IRJET-Study of Performance analysis of Wind Tunnel Simulation of Pollutant Di...
IRJET-Study of Performance analysis of Wind Tunnel Simulation of Pollutant Di...IRJET Journal
 
Simulation of Wimax 802.16E Physical Layermodel
Simulation of Wimax 802.16E Physical LayermodelSimulation of Wimax 802.16E Physical Layermodel
Simulation of Wimax 802.16E Physical LayermodelIOSR Journals
 
Generation and Implementation of Barker and Nested Binary codes
Generation and Implementation of Barker and Nested Binary codesGeneration and Implementation of Barker and Nested Binary codes
Generation and Implementation of Barker and Nested Binary codesIOSR Journals
 
BLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxBLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxFAIZAN SHAFI
 
Performance analysis of negative group delay network using MIMO technique
Performance analysis of negative group delay network using MIMO techniquePerformance analysis of negative group delay network using MIMO technique
Performance analysis of negative group delay network using MIMO techniqueTELKOMNIKA JOURNAL
 

Similar to Study of the operational SNR while constructing polar codes (20)

abcd
abcdabcd
abcd
 
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
 
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNER
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNERNOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNER
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNER
 
Paper id 2720144
Paper id 2720144Paper id 2720144
Paper id 2720144
 
Prediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsPrediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systems
 
Prediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsPrediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systems
 
Prediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsPrediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systems
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
 
IEEE 802.11a Physical Layer Simulation
IEEE 802.11a Physical Layer SimulationIEEE 802.11a Physical Layer Simulation
IEEE 802.11a Physical Layer Simulation
 
Decoding of the extended Golay code by the simplified successive-cancellation...
Decoding of the extended Golay code by the simplified successive-cancellation...Decoding of the extended Golay code by the simplified successive-cancellation...
Decoding of the extended Golay code by the simplified successive-cancellation...
 
BER Performance for Convalutional Code with Soft & Hard Viterbi Decoding
BER Performance for Convalutional Code with Soft & Hard  Viterbi DecodingBER Performance for Convalutional Code with Soft & Hard  Viterbi Decoding
BER Performance for Convalutional Code with Soft & Hard Viterbi Decoding
 
Performance of OFDM System under Different Fading Channels and Channel Coding
Performance of OFDM System under Different Fading Channels and Channel CodingPerformance of OFDM System under Different Fading Channels and Channel Coding
Performance of OFDM System under Different Fading Channels and Channel Coding
 
BER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingBER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper Coding
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET-Study of Performance analysis of Wind Tunnel Simulation of Pollutant Di...
IRJET-Study of Performance analysis of Wind Tunnel Simulation of Pollutant Di...IRJET-Study of Performance analysis of Wind Tunnel Simulation of Pollutant Di...
IRJET-Study of Performance analysis of Wind Tunnel Simulation of Pollutant Di...
 
Simulation of Wimax 802.16E Physical Layermodel
Simulation of Wimax 802.16E Physical LayermodelSimulation of Wimax 802.16E Physical Layermodel
Simulation of Wimax 802.16E Physical Layermodel
 
B0510916
B0510916B0510916
B0510916
 
Generation and Implementation of Barker and Nested Binary codes
Generation and Implementation of Barker and Nested Binary codesGeneration and Implementation of Barker and Nested Binary codes
Generation and Implementation of Barker and Nested Binary codes
 
BLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxBLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptx
 
Performance analysis of negative group delay network using MIMO technique
Performance analysis of negative group delay network using MIMO techniquePerformance analysis of negative group delay network using MIMO technique
Performance analysis of negative group delay network using MIMO technique
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 

Study of the operational SNR while constructing polar codes

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 3, June 2020, pp. 3200~3207 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i3.pp3200-3207  3200 Journal homepage: http://ijece.iaescore.com/index.php/IJECE Study of the operational SNR while constructing polar codes Reda Benkhouya1 , Idriss Chana2 , Youssef Hadi3 1,3 MISC, Faculty of Sciences, Ibn Tofail University, Morocco 2 ISIC EST-LMMI ENSAM, Moulay Ismail University, Morocco Article Info ABSTRACT Article history: Received May 30, 2019 Revised Dec 14, 2019 Accepted Jan 8, 2020 Channel coding is commonly based on protecting information to be communicated across an unreliable medium, by adding patterns of redundancy into the transmission path. Also referred to as forward error control coding (FECC), the technique is widely used to enable correcting or at least detecting bit errors in digital communication systems. In this paper we study an original FECC known as polar coding which has proven to meet the typical use cases of the next generation mobile standard. This work is motivated by the suitability of polar codes for the new coming wireless era. Hence, we investigate the performance of polar codes in terms of bit error rate (BER) for several codeword lengths and code rates. We first perform a discrete search to find the best operational signal-to-noise ratio (SNR) at two different code rates, while varying the blocklength. We find in our extensive simulations that the BER becomes more sensitive to operational SNR (OSNR) as long as we increase the blocklength and code rate. Finally, we note that increasing blocklength achieves an SNR gain, while increasing code rate changes the OSNR domain. This trade-off sorted out must be taken into consideration while designing polar codes for high-throughput application. Keywords: Bhattacharyya parameter Polar codes SNR Successive cancellation decoding Copyright © 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Reda Benkhouya, MISC, Faculty of Sciences, Ibn Tofail University, Av. de L'Université, Kénitra, Morocco. Email: reda.benkhouya@gmail.com 1. INTRODUCTION Over last years, wireless applications have been growing fast and requiring more challenging coding schemes. Recently, polar codes were proven to be capacity achieving for binary discrete memoryless channel (B-DMC). Combined with high order modulation, polar code is powerful candidate for the next generation mobile standard, where high transmission power efficiency and bandwidth efficiency are required [1]. Fortunately, both polar encoding and decoding are of low complexity, so need minimum time and space, and this match green energy requirement [2]. The performance of polar codes enables their application in varying channels, which tackles the universal coverage requirement. On the other side, complex use scenarios result in heterogeneous networks where polar codes can find their suitable applications. Therefore, these codes have become one popular topic and drawn intensive attentions from both academia and industry. Recent research progresses on polar codes can be mainly categorized into two trends: 1) advanced decoding algorithms for polar codes, and 2) efficient hardware implementation methods for polar codes [2]. Polar codes are linear block codes that rely on a polarization phenomenon. The advent of polar codes is based on the channel polarization theory. The core idea of polar coding is to split a given vector channel into multiple correlated bit channels and to use only the good ones, in the sense that they are either extremely noisy or noiseless. Then, one can employ a separate sequential decoder on each sub-channel. Polar codes have performed state-of-the-art codes of larger block lengths and code rates. Polar codes can also
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  Study of the operational SNR while constructing polar codes (Reda Benkhouya) 3201 be used for source coding, but this use will not be discussed in this paper. In the level of theoretical analysis and development, substantial recent research progress has been achieved and reported. A by no means complete list of references is [3, 4], see also [5] and the references therein. The aim of this paper is to demonstrate how the code changes with the OSNR and the block length as well as the code rate for the additive white Gaussian noise (AWGN) channel. Since it is not known what impact has the OSNR on the BER performance of polar codes, this paper aims to open the related discussion. As concluded in [6] all polar code constructions are equally good in AWGN if the OSNR is optimized for the best performance. Thus in our work we may use simple algorithm only, namely Bhattacharyya bounds based construction. The readers wanting to go deeper into the current study may experiment separately the orthogonal frequency- division multiplexing (OFDM) [7-24] and exploit our approach to get the effect of such modulation technique on the performance of the code construction. Obviously, OFDM is still an ultimate candidate for wireless applications, since it allows resolving the well-known problem of spectrum underutilization [25]. The remainder of this paper is outlined as follows. Section 2 describes polar codes that we study in this work. In Section 3 we review a simplest construction to select the bit-channels over which the information bits are transmitted. The decoder adopted is introduced in Section 4. Afterwards, simulation results are provided in Section 5. Finally, conclusions and future works follow in Section 6. 2. POLAR CODING Let ( , )N K be a linear bock code, where 2 n N is the code length, n is an arbitrary integer, K is the code dimension, the code rate of such coding scheme is defined by R K N , 0  K N . A binary polar code is completely specified by a triple ( , , )FN K , where F ,  F N K is the set of the frozen bit indices. The remaining K elements are called the information bits indices. Let n fois    n F F F be the n-fold Kronecker product of Arikan’s standard polarizing kernel 1 1 0 1       F . The matrix n F denotes the n-th tensor power of F and could be evaluated by applying the Kronecker product recursively according to ( 1)    n n F F F . Then for a vector of information bits u of length K , a codeword is generated as  x G u (1) where ( ) C n G F is the generator matrix of polar code which picks a specific subset of K rows of the N N matrix, and  0,1, , 1 F FC N corresponds to the set of non-frozen bit indices. Implicitly, with respect to classical N N matrix based encoding, the frozen bits F are set to zero and we follow this convention throughout the paper. Consider a channel W is used for transmitting the information between input and output. Let 1 2( , , , ) Nx x x x be the inputs vector and 1( , , ) Ny y y be the outputs vector. Given a binary-input channel : W X Y with  0,1X  , the Bhattacharyya parameter ( )Z W can be used to measure the error performance of the channel. In general, we can choose the positions of the information bits and frozen bits by their Bhattacharyya parameter ( )Z W , which can be defined as the upper bound of the decision error probability when the channel is used to transmit zero or one as follows: ( ) ( | 0) ( |1)y Y Z W p y p y (2) where ( | )p y s is the conditional probability of the received y provided that  0,1s is transmitted. As the bit-channels start polarizing, they approach either noiseless good bit-channel or a pure-noise bad bit- channel. The Bhattacharyya parameter indicates that the fraction of bit channels approaches the mutual information ( )I W as  n . Even though systematic variants of polar encoding do exist, we construct the original polar codes which are non-systematic, and being a linear code, the encoding simply needs a matrix multiplication. Once the code size is larger, matrix multiplication becomes computationally expensive as far as 2 ( )O N . Thus, in our work we use an alternative implementation based on FFT’s butterfly circuit model, which exhibits significantly reduced computational complexity of ( log ).O N N In our polar code design, we use recursive estimation of the just introduced Bhattacharyya parameters of bit-channels, which is going to be detailed in the next section.
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3200 - 3207 3202 3. THE CODE CONSTRUCTION Recall that polar code construction is ranking algorithm that selects K best among N possible polar bit-channels, in terms of the bit error rate at a given initial value defined as the OSNR. The choice of the set of frozen bit F is an important step in polar coding often referred to as polar code construction. The original algorithm of polar codes is based on the evolution of simple bounds on the Bhattacharyya parameters of bit channels. Due to its simplicity, this construction has been widely used, and produced good polar codes. The basic idea is to create a coding system where one can access each bit-channel individually and send data only through those for its Bhattacharyya parameter is close to 0. The Bhattacharyya parameter ( )Z W is an upper bound on the error probability of transmission over W with maximum likelihood (ML) decision when the channel is used only once to transmit a 0 and 1. Intuitively, channels with ( ) Z W are almost noiseless, while channel with ( ) 1  Z W are almost pure-noise channel for a given 0 1  . The Bhattacharyya parameter of channel plays an important part in the construction of Polar codes. For a more detailed exposition, we confer the following recursion for 0, , 1 j n with initial 0,0   RS z e chosen to optimize the code performance at a certain ( RS ), where S is the SNR value. 2 , , 2 11, , 2 2 0 2 2 2           j j j i j i j jj i j i z z i z z i (3) The indices of the highest N K values in the set of N final stage values  , : 0, , 1 n iz i N form the set F . The code rate R can be varied by adding or deleting subchannels from the good subchannel set. With code length N increasing to infinity, bit-channels polarize to be nearly noiseless or useless [1]. After performing channel polarization transform, the good subchannels are assigned information bits and the bad ones are set frozen bits. Let such a channel be defined by the transition probabilities ( | )W y x ,  0,1 x X and y Y . Based on (2), the definition of the Bhattacharyya parameter of W extended from discrete to continuous channel is given by ( ) ( | 0) ( |1) Z W W y W y dy (4) where ( | )W y s is the transition probability of receiving y when  0,1s has been sent. Then we analyze the initial value of ( )Z W for Gaussian channel. At first, the initial value of Bhattacharyya parameter is definitely difficult since channels are continuous. Suppose there is a communication link with Gaussian noise with expectation zero and variance 2  . At the same time, BPSK is used as modulation. The recursive algorithm of construction requires an initial value, corresponding to the worst BER and may be replaced with 0 bRE N e , where bE the energy spent per each information bit and 2 0 2 N . Moreover, the initial value of Bhattacharyya parameter is not suitable for all communication channels since polar codes are channel specific designs. By definition of polar codes, the construction should be repeated at every time channel changes. Nevertheless, we wish to construct a polar code at one OSNR and use it for a range of possible SNRs. This way, we use a unique code created by running the code-construction at a single value of the channel-state and keeping the code unchanged for all channel conditions. As we see later, it is crucial to properly select the adequate OSNR given rate and blocklength for the performance in terms of bit error rate. 4. THE NATIVE DECODING It is proven in [26] that for any ( , )N K polar code on any B-DMC, there exists an encoder and a decoder known as successive cancellation (SC) decoder, each with the same order of complexity ( log ).O N N We assume that the decoder considered in the system is a SC decoder, for which polar codes are tailored. SC algorithm, which decodes each bit in a successive manner, is usually employed and proposed as sub-optimal approach. By taking advantage of the polarization effect, polar codes can achieve the symmetric capacity of binary memoryless channels with low complexity SC decoding strategy [1]. Being fundamental for all the later advanced decoders that exhibit superior performance, one cannot avoid
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  Study of the operational SNR while constructing polar codes (Reda Benkhouya) 3203 having an SC decoder. The SC algorithm traverses the entire polar code tree depth first, visiting all leaf nodes [27]. From decoding viewpoint, constructing a polar code of dimension K is equivalent to finding the K best bit-channels that model the channel that the decoder sees when it recovers one by one the information bits corresponding to the received codeword by the SC decoder [28]. According to the construction of polar codes, two groups of bits are established from the many independent copies of channels. The first group is the information bits  :1  FC iU u i K and the second one is the frozen bits  :1   F jU u j N K that are made known to the decoder. The log-likelihood ratios (LLR) of the channel are calculated as ( | 0) ( ) ln ( | 1)    i i i i i p y x LLR y p y x (5) The SC applies the recursive calculations on the received LLRs from (5) and the decision function for the SC decoder is defined by 1 1 1 1 1 1 0, ( , ) 0ˆ 1, ( , ) 0        N i i N i LLR y U U LLR y U (6) where 1 1 1( , )N i LLR y U is equivalent to the likelihood ratio of iU given the channel output Y and 1 1 i U which are found previously by the decoder. It should be mentioned that, for the first bit 1 ˆU value, the decoder uses only y for the decision. In our simulation we use an implementation of the basic successive cancellation decoder, which we believe to be the simplest implementation possible. 5. NUMERCIAL RESULTS AND DISCUSSION In this section we report the results of our simulations. We consider comparing the performance of polar codes from various parameters. Even if the error performance of polar codes with short codeword length is already described by [4] as mediocre under SC algorithm, we insist on considering blocklength N=256 in addition to two new blocklengths, namely N=1024, N=4096. For each blocklength we consider only high code rate R=5/6. The conditions of simulation are described in Table 1. Table 1. Simulation parameters Parameter name Value Minimum block samples 1000 Minimum bit errors 100 Modulation BPSK Channel AWGN The transmission is supposed to be over an AWGN channel with zero mean. Without loss of generality, we normalize the noise variance to be unity in the remainder of our simulation. Bits in codeword are modulated using binary phase shift keying (BPSK). We ensure a practical values of BER (e.g. order of 10-3 and less), and guarantee a minimum of 1000 block samples. For each evaluated SNR, we achieve at least 100 bit errors. In order to study the impact of OSNR on BER performance, we use the discrete search of OSNR over a finite interval. We carry out simulations and we plot the results in logarithmic domain. The discrete search consists on spanning the whole interval starting from the OSNR -5dB as initial point when necessary. The search is pursued further by incrementing OSNR as long as the BER improves. We stop the discrete search once the BER performance degrades for at least one from the next OSNRs. By this way, we retrieve the candidate OSNR whose BER curve is the first one, which crosses the uncoded curve. We confirm the BER degradation by using some greater value of OSNR (e.g. 10dB). Note that in each figure, the important portion of the BER curves is magnified, where curves of studied codes cross the curve of the uncoded system. Figure 1 illustrates SNR versus BER for N=256 at R=5/6. It can be noted that almost all OSNRs offer the same performance. It is also shown that the uncoded case offers better performance in terms of BER than the coded one since SNR is less than 3.77dB. According to our adopted method based on discrete search, the candidate OSNR is 1dB. Increasing N to 1024 makes the performance weakly sensitive to
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3200 - 3207 3204 the OSNR, as depicted in Figure 2. It is shown once again that the uncoded case offers better performance than the coded one since SNR is less than 3.65dB for R=5/6. From the zoom part, the candidate OSNR is 3dB for R=5/6. Figure 1. Impact of OSNR on BER performance for N=256 at R=5/6 Figure 2. BER sensitivity to OSNR for N=1024 at R=5/6 Figure 3 depicts the performance of polar codes produced for N=4096 at R=5/6. Unlike smaller blocklength, it is shown that for N=4096 the BER becomes plainly sensitive to OSNR. The uncoded system offers better performance than the coded one in terms of BER since SNR is less than 3.468dB. It can be noted that the candidate OSNR is 5dB. For instance, the BER degradation starts at OSNR > 5dB and degrades dramatically when OSNR reaches 10dB. As recapitulation, increasing blocklength makes BER performance
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  Study of the operational SNR while constructing polar codes (Reda Benkhouya) 3205 sensitive to OSNR. It is indeed critical to construct polar code with a good BER performance. This has been already stated in [6] but only for blocklength N=2048 and code rate R=1/2. To avoid confusion and stress the differences, let us summarize the results in Table 2. The candidate OSNR corresponds to a selected value according to the discrete search method. Figure 4 illustrates the construction chart for code rate R=5/6. Clearly for a given code rate R; the higher blocklength is, the earlier the coded system outperforms the uncoded one. The curves demonstrate the BER performance versus SNR for the code rate R=5/6. While constructing polar code with rate R=5/6, increasing blocklength from N=256 to N=4096 achieves the SNR gain of Gain=1.2dB at the BER of 10-4 . This trade-off sorted out must be taken into consideration while constructing polar codes for high-throughput application. Figure 3. Impact of OSNR on BER performance for N=4096 at R=5/6 Figure 4. Construction chart for code rate R=5/6
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3200 - 3207 3206 Table 2. Impact of OSNR on BER sensitivity for code rate R=5/6 Code length Sensibility Candidate OSNR 256 Low 1 1024 Medium 3 4096 High 5 6. CONCLUSION We restudied in this paper the non-universality of polar codes. We performed a discrete search to find the best OSNR for code construction. We then compared BER performances for three codeword lengths and observed that for short one the effect of OSNR is meaningless even for higher code rate. It is also observed that for long blocklength, OSNR have huge impact on BER performance. In this paper, the BER performance analysis is summarized to clarify discussion on construction perspective. We assume that the proposed chart contributes to pave the path towards this end. The results shown are preliminary and the work needs to be extended further to prove that the study is indeed viable for Rayleigh fading channel, or even Nakagami-m fading channel. We intend to investigate in a future work the performance analysis of the considered construction under orthogonal frequency-division multiplexing (OFDM). Such system authorizes division of the bandwidth into narrow orthogonal sub channel, and this is useful to optimize the spectrum use. However, concerning polar codes, the decoding performance of SC algorithm is still not satisfying. We may obtain better performance using an iterative decoder. There is also a need to study the effect of initial value of Bhattacharyya parameter on system’s performance in a future work. REFERENCES [1] P. Chen, M. Xu, B. Bai and X. Ma, “Design of polar coded 64-QAM,” 2016 9th International Symposium on Turbo Codes and Iterative Information Processing (ISTC), Brest, pp. 251-255, 2016. [2] L. Liu and C. Zhang, “Circuits and systems for 5G network: Massive MIMO and advanced coding,” 2015 IEEE 11th International Conference on ASIC (ASICON), Chengdu, pp. 1-4, 2015. [3] T. C. Gulcu, M. Ye and A. Barg, “Construction of polar codes for arbitrary discrete memoryless channels,” 2016 IEEE International Symposium on Information Theory (ISIT), Barcelona, pp. 51-55, 2016. [4] T. Wang, D. Qu and T. Jiang, “Parity-Check-Concatenated Polar Codes,” in IEEE Communications Letters, vol. 20, no. 12, pp. 2342-2345, Dec. 2016. [5] E. Arikan, “On the Origin of Polar Coding,” IEEE Journal on Selected Areas in Communications, vol. 34, no. 2, pp. 209-223, 2016. [6] H. Vangala, E. Viterbo and Y. Hong, “A comparative study of Polar Code Constructions for the AWGN Channel,” pp. 1-9, 2015. [7] G. A. Hussain, L. Audah, “BCH codes for 5G wireless communication systems over multipath fading channel,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 17, no. 1, pp. 310-316, 2020. [8] P. Manhas, M.K Soni, “OFDM System Performance Evaluation under Different Fading Channels and Channel Coding using Matlab Simulink,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 5, no. 2, pp. 260-266, 2017 [9] P. S. Swapna, S. Pillai Sakuntala, “Resource Allocation Algorithm for Symmetrical Services in OFDMA Systems,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 18, no. 2, pp. 867-874, 2020. [10] J. Shukla, A. Joshi, and R. Tyagi, “PAPR analysis of OFDM system using AI based multiple signal representation methods,” TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 17, no. 2, pp. 2983-2991, 2020. [11] M. K. Husein, “Minimize MIMO OFDM interference and noise ratio using polynomial-time algorithm,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 1, pp. 900-907, 2020. [12] B. Sabbar, M. Khalifa, “Performance Evaluation of High Mobility OFDM Channel Estimation Techniques,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 3, pp. 2562-2568, 2020. [13] S. Razmi, N. Parhizgar, “Adaptive resources assignment in OFDM-based cognitive radio systems,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 3, pp. 1935-1943, 2019. [14] S. Suyoto, I. Iskandar, and S. Sugihartono, Adit Kurniawan, “Improved Timing Estimation Using Iterative Normalization Technique for OFDM Systems,” International Journal of Electrical and Computer Engineering (IJECE), vol. 7, no. 2, pp. 905-911, 2017. [15] H. Hamlili, S. Kameche, and A. Abdelmalek, “SαS noise suppression for OFDM wireless communication in rayleight channel,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 2, pp. 2003-2010, 2020. [16] B. Archana B., and T. P. Surekha, “Integrated approach for efficient power consumption and resource allocation in MIMO-OFDMA,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 2, pp. 2069-2076, 2020. [17] A.H. Ali, and A. A. Hussien, “Comprehensive Investigation of Coherent Optical OFDM-RoF Employing 16QAM External Modulation for Long-Haul Optical Communication System,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 3, pp. 2607-2616, 2020.
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  Study of the operational SNR while constructing polar codes (Reda Benkhouya) 3207 [18] M.I. Youssif, A.E. Emam, M.A. ElGhany, “Image multiplexing using residue number system coding over MIMO- OFDM communication system,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 6, pp. 4815-4825, 2019. [19] M. D. Rozaini, A. Idris, D. M. Ali, E. Abdullah, “Median codeword Shift (MCS) technique for PAPR reduction with low complexity in OFDM system,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 6, pp. 4882-4888, 2019 [20] M. F. Ghanim, “Performance investigation of WOFDM for 5G wireless networks,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 4, pp. 3153-3158, 2019 [21] K. J. Thajeel, I. K. Abboud, L. A. Kunbar, “Design of encrypted transceiver Non-coherent OFDM with ability to correct coding bits of information,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 4, pp. 3212-3220, 2019. [22] A. H. Ali, H. J. Alhamdane, Begared Salih Hassen, “Design analysis and performance evaluation of the WDM integration with CO-OFDM system for radio over fiber System,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 15, no. 2, pp. 870-878, 2019. [23] S. Atoui, N. Doghmane, S. Afifi, “Blind frequency offset estimator for OFDM systems,” TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 17, no. 6, pp. 2722-2728, 2019. [24] Rawaa J. Hasan, and Hikmat N. Abdullah, “Comparative study of selected subcarrier index modulation OFDM schemes,” TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 17, no. 1, pp. 15-22, 2019. [25] Z. M Abid, A. A Jaffaar, S. Q Hadi, “PAPR reduction in OFDM system for DVB-S2,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 17, no. 1, pp. 317-323, 2020. [26] A. Hadi, K. M. Rabie and E. Alsusa, “Polar codes based OFDM-PLC systems in the presence of middleton class-A noise,” 2016 10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Prague, pp. 1-6, 2016. [27] P. Giard et al., “Hardware decoders for polar codes: An overview,” 2016 IEEE International Symposium on Circuits and Systems (ISCAS), Montreal, QC, pp. 149-152, 2016. [28] M. Bardet, V. Dragoi, A. Otmani and J. Tillich, “Algebraic properties of polar codes from anew polynomial formalism,” IEEE International Symposium on Information Theory, pp. 230-234, 2016. BIOGRAPHIES OF AUTHORS Reda Benkhouya was invited as a visiting scholar at Toulouse institute of computer science research (IRIT), France, in 2004. Since 2006 he has been with Etisalat where he is currently an ITSM. He is now pursuing the Ph.D. degree at Ibn Tofail University. His research interest includes channel coding, cognitive radio, artificial intelligence, IoT, cloud and big data. Idriss Chana received the Ph.D. degree from Mohamed V University, Morocco in 2013. He is currently a full professor at Moulay Ismail University, Morocco. He is member of IEEE. His research interests include information and communication technologies. A large part of his research projects are related to Error correction codes and Turbo codes. Idriss Chana published more than 20 papers in major journals and conferences in Information Theory. Youssef Hadi received his Ph.D. degree in Computer Sciences and Telecommunications from the Faculty of Sciences of the Mohammed V University, Rabat, Morocco in 2008. From 2009 to 2015, he was an Assistant Professor at Ibn Tofail University, Faculty of Sciences with LARIT laboratory. Currently he is an Associate Professor at the same university and he is the Vice Director of MISC Laboratory (Modeling of Information and Communication Systems). Also, he is a member of IEEE and he is Student Branch Member of Ibn Tofail University. Youssef Hadi research interests include Software Engineering, Model Driven Engineering, Cloud Computing and Signal Processing.