SlideShare a Scribd company logo
1 of 8
Download to read offline
TELKOMNIKA Telecommunication Computing Electronics and Control
Vol. 21, No. 1, February 2023, pp. 18~25
ISSN: 1693-6930, DOI: 10.12928/TELKOMNIKA.v21i1.23274  18
Journal homepage: http://telkomnika.uad.ac.id
A Simulink model for modified fountain codes
Nadhir Ibrahim Abdulkhaleq1
, Nahla Abdul Jalil Salih2
, Rajaa Salih Mohammed Hasan2
,
Ihsan Jabbar Hasan2
1
Department of Mobile Computing and Communication Engineering, College of Engineering, University of Information Technology and
Communication (UoITC), Baghdad, Iraq
2
Department of Electronics, Institute of Medical Technology, Middle Technical University, Baghdad, Iraq
Article Info ABSTRACT
Article history:
Received Feb 05, 2022
Revised Oct 19, 2022
Accepted Oct 29, 2022
This paper introduces a Simulink model design for a modified fountain code.
The code is a new version of the traditional Luby transform (LT) codes.
The design constructs the blocks required for generation of the generator
matrix of a limited-degree-hopping-segment Luby transform (LDHS-LT)
codes. This code is especially designed for short length data files which have
assigned a great interest for wireless sensor networks. It generates the
degrees in a predetermined sequence but random generation and partitioned
the data file in segments. The data packets selection has been made serialy
according to the integer generated from both degree and segment generators.
The code is tested using Monte Carlo simulation approach with the
conventional code generation using robust soliton distribution (RSD) for
degree generation, and the simulation results approve better performance
with all testing parameter.
Keywords:
Fountain codes
Generator matrix
LDHS-LT
Short length files
Simulink model
This is an open access article under the CC BY-SA license.
Corresponding Author:
Nadhir Ibrahim Abdulkhaleq
Department of Mobile Computing and Communication Engineering, College of Engineering
University of Information Technology and Communication (UoITC), Baghdad, Iraq
Email: nadhir.abdulkhaleq@uoitc.edu.iq
1. INTRODUCTION
Forward error correction codes represent the core of channel coding techniques [1]. Usually, the code
is generated in a length (𝑁) greater than the actual data length (π‘˜). For the conventional block codes (𝑁) is
decided to be able to face the worst channel conditions. In the end of nineties [2], [3] invents the principles of
fountain codes. The idea is simple, instead of predetermined the code length, they decide to have a code with
variable length. By flooding the channel continuously with coded symbols and wait for the receiver to
acknowledge the sender of collecting the sufficient number of coded symbols to recover the data file.
The brilliant design for fountain codes presented by Karp et al. [3] with the name of Luby transform (LT)
codes are the practical version of such type of codes.
Wireless networks are designed to send data files in packets, which in turn makes it more suitable
for many applications [4]-[11]. Following this fact, the LT encoder is first truncated the data file into packets
(𝑝𝑑1, 𝑝𝑑2, … … . , π‘π‘‘π‘˜) as π‘˜ represent the length of the data file. The encoding process summarized into three
main phases.
Phase 1: degree generation, the encoder follows certain distribution 𝛹(𝑑) to generate a set of
integers, called degrees. With the first version of LT code a well-known robust soliton distribution has been
used. Then several modifications are introduced to maintain the best distribution parameters which are (size
of degree 1, minimum number of edges, contribution of all data packets, ability to break the decoding stuck).
So, this phase is so important in the design of the fountain codes because it’s affected the ability of fast data
recovery in the receiver part. In this paper, we introduce a deterministic degree generation with limited set of
TELKOMNIKA Telecommun Comput El Control 
A Simulink model for modified fountain codes (Nadhir Ibrahim Abdulkhaleq)
19
integers in which a high probability of breaking the decoder stuck is achieved using our previous sequential
decoding approach [12]-[14].
Phase 2: packets selection, the degree 𝑑 which generated from phase 1 means that 𝑑 packets have to
be selected and combined to form the coded packet. In the conventional LT code, the packets are selected
uniformly at random while in our proposed design, the selection is based on sequential progress. Which
impose a relation between encoded packets that could be used to regenerate degree one again.
Phase 3: encoded packets generation, the combination of the selected packets is done using binary
ex-or operations. Keep in mind that, each packet may have certain number of binary bits, the same ex-or
operations will be done and the main job of this phase is to combine these packets to create the coded
packets. These three main phases are theoretically repeated in endless loop till an acknowledgment has
been arrived to inform full reception of the file packets. Since 2002, fountain codes witnessed many
attempts to overcome performance limitations. Short length data files applications for such codes is a big
challenge. In [15]-[17], the digital fountain codes are designed with a generator matrix that could deal with
file length less than (103
) packets. The idea is based on presenting new degree distributions that mitigate the
limitations of the conventional robust soliton distribution (RSD) used for LT codes. Chang et al. [18], use a
non-equal selection probability for the data packets. The idea merge between the high degree output packets
with some low degree one to avoid decoding block. Belief propagation algorithm is modified to find a
solution for an empty ripple size for short length blocks is presented in [19]-[25]. From these previous works,
it is evident that the short length data files need an adjustment for the degrees of the encoded packets as well
as the way of selection to the data packets required to form the encoded one. This is the idea presented in our
work where we provide what we called limited-degree-hopping-segment Luby transform (LDHS-LT) to give
limited range of small degrees and with hopping selection for the data segment to ensure participation of all
data packets in the encoding process.
The paper is arranged to have the proposed LDHS-LT code generation in section 2. In section 3,
the Simulink model for the generator matrix is presented. Comparing our proposed code with the onventional
LT code is analyzed in section 4. The conclusion is reported in section 5.
2. GENRATOR MATRIX FOR LDHS-LT CODE
The LDHS-LT code is constructed in a very simple way and based on the well-known LT code.
The efficiency of such fountain codes depends on the quality of the generator matrix. The conventional LT
code has a generator matrix which constructed after fulfilling the above three main phases. Big consideration
appears for the conventional LT code with short data length and that’s why our LDHS-LT code try to
overcome it. Let’s try to construct this code in a similar way and present the steps of generation. The short
data files in our design is chosen to be 32 packets. So, to generate our encoded packets, we have to do the
following.
2.1. Segmentation
To ensure the contribution of all data packets in the encoding process and also provide certain kind
of randomly choice, the data file is sliced into several 𝑆 segments. The number of segments is determined:
𝑆𝑛 = π‘šπ‘œπ‘‘(π‘˜/𝑆𝑠) (1)
Where 𝑆𝑠 is the size of the data segment and it will be in the range of (3-5) packets. So, for 32 packets data
file and 𝑆𝑠 = 4 packets we shall have 𝑆𝑛 = 8.
2.2. Degree generation
As explained in phase 1 above, the degree generation follows certain random distribution Ξ¨(𝑑).
In this proposed code, the degree values are limited to follow the range of (1: 𝑆𝑠). Again for 𝑆𝑠 = 4 we have
the degrees of (1, 2, 3, π‘Žπ‘›π‘‘ 4). It is worth to mention that the generation of such degrees is random without
replacement.
2.3. Degree generation
Figure 1, illustrates the data packets selection. In this example we have a prototype data file of size
(π‘˜ = 9) and if (𝑆𝑠 = 3) which according to that we have (𝑑 =1, 2 and 3). The degrees are generated randomly,
like (3, 1, 2) and we have three segments ( 𝑆1, 𝑆2, and 𝑆3 ).
Our data file consists of 9 packets denoted by (𝑝𝑑𝑖). Where the suffix (𝑖 ∈ (1: 9)). These data packets
are distributed into three segments ( S1, 𝑆2, and 𝑆3 ) in a sequential assigning. The distinguish between segments
has been done via the type of the line that forming the circles which illustrates the data packets in the figure.
For instance, the solid line circuits denoted the data packets in the second segment. Now, the random generator
produces two random numbers, one for the degree and the second for the segment. In our example of Figure 1,
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 1, February 2023: 18-25
20
the random generator produces the numbers (32, 23, 11, 21) to generates the three coded packets denoted by
(𝑃𝑐𝑖) which have a rectangular shape in the figure. According to such formation, the first coded packet is
generated from the result of (𝑃𝑐1 = 𝑝𝑑4 βŠ• 𝑝𝑑5 βŠ• 𝑝𝑑6). Consequently, (𝑃𝑐2 = 𝑝𝑑7 βŠ• 𝑝𝑑8), (𝑃𝑐3 = 𝑝𝑑1) and
(𝑃𝑐4 = 𝑝𝑑1 βŠ• 𝑝𝑑3).
It worths to note that, there is no random selection for the data packets in our design. The data
packets are selected in sequential manner. That’s means if the degree is 1, the first data packet is selected.
While for degree 2, the first two data packets are selected and so on for higher degrees. This sequential
selection has great effect in breaking the decoder halt when the coded packet of degree 1 is lost either in the
beginning of the decoder work or at any decoding step before full data file recovery. To illustrate this feature,
suppose that at any step in the decoding mission no degree one is found to proceed and we have two coded
packets of the form (𝑃𝑐𝑙 = 𝑝𝑑4 βŠ• 𝑝𝑑5 βŠ• 𝑝𝑑6) and (π‘ƒπ‘π‘š = 𝑝𝑑4 βŠ• 𝑝𝑑5) then by ex-or these two coded packets,
new degree 1 is generated and resume decoding process again.
Figure 1. Data packets selection for LDHS-LT code
3. LDHS-LT DECODER
The nature of the fountain codes enables the decoder to starts its job after collecting sufficient
number (𝑁) of coded packets. This number mainly characterized as (𝑁 = π‘˜(1+∈), where (∈) represent the
amount of overhead coded packets. The decoder has three stages to fully recover the data file packets. These
stages are described.
3.1. Copying of degree one
The decoder fetch for the most valuable coded packet which is the degree one. These coded packets
are stored in the ripple box. The size of this ripple is a compromise issue because getting large means that
encoding require large number of coded packets to cover all the data packets and this will increase the
overhead that required to recover the data file. On the other hand, decreasing the ripple size means facing
decoding stuck by loosing degree one coded packet quickly. So, in this step simply the value of degree one
coded packet will be copied to the connected data packet, for instance in our Figure 1, that’s mean:
𝑃𝑑1
Μ‚ = 𝑃𝑐3 (2)
3.2. Updating the adjacent coded packets
In this stage, the decoder updates the connected coded packets values by using the recovered data
packet value. Again, referring to Figure 1, we had estimated the value of 𝑃𝑑1 but this packet is connected to
𝑃𝑐4 also, so updating its value by:
𝑃𝑐4 = 𝑃𝑐4 βŠ• 𝑝𝑑1 (3)
3.3. Erasing all participated edges
All the edges that connected to the evolved coded packet in a single decoding step are removed. In our
Figure 1, two edges are erased one for connection between (𝑝𝑑1, 𝑃𝑐3) and the other that connect (𝑝𝑑1, 𝑃𝑐4).
After that, it is clear that 𝑃𝑐4 has single connection with 𝑝𝑑3 which would continue the decoding process for
the next round.
3.4. Breaking the decoding stuck
Sometimes, the ripple box is empty during the decoding process or even in the beginning of it.
The ripple box is the place that the decoder can find a degree-one coded packet in it. There are many reasons
that cause the ropple box to vanish. One of the main reasons is the bad channel conditions that causes to lost
some of the transmitted coded packets. Another possible reason is the bad generator matrix or degree
TELKOMNIKA Telecommun Comput El Control 
A Simulink model for modified fountain codes (Nadhir Ibrahim Abdulkhaleq)
21
generation that make a critical number for degree-one coded packts. In such cases, the decoder fetches for
certain patterns of coded packets that when ex-ored together this will produce new degree one coded packet
and the operation of the decoder resumes. Our LDHS-LT encoding offer many patterns of such coded
packets that prevents decoding stuck.
These four prementioned stages which represent the decoder job have to be continued till recovering
all the data packets. In many times, the decoder succeeded in its job which in turn an acknowledgment
message will be sent to the source that indicates a successful decoding. However, if the decoder stucks just as
mentioned in section 3.4, it means that the decoder needs to make further processing or collect more coded
packets to have new degree-one coded packet to start with and resume decoding.
4. SIMULINK MODEL FOR (LDHS-LT) ENCODER
The core idea of the Simulink design is shown in Figure 2. Two main random generators are used to
generate the degree (𝑑) and the data segment (𝑆), while the data packets are selected sequentially. That’s
mean, after having a number from degree generator and a number represents the assigned sgment it will be
determined for the encoder to take a serial number (degree) of data packets from the assigned segment to join
them using ex-or oprations.
Figure 2. Block diagram for LDHS-LT encoder
Figure 3. Simulink design for degree 1 coded packets
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 1, February 2023: 18-25
22
To demonestrate the idea of Figure 2, let’s return to our prototype case of the size (π‘˜ = 9), so the random
generation of the degree is (𝑑 ∈ {1,2,3}) and also the segments are generated randomly as (𝑆 ∈ {1,2,3}). Table 1,
lists some possible sets for these generators. For the first coded packet, it is generated from combining three
sequented data packets in the second segment. While for the coded packet no. 4, and according to the random
generation, it is created from combining the first two data packets in the second segment. The Simulink
model for generation of three coded packets for three different degrees and segments are illustrated in Figure 3,
Figure 4, and Figure 5.
Figure 4. Simulink design for degree 2 coded packets
Figure 5. Simulink design for degree 3 coded packets
TELKOMNIKA Telecommun Comput El Control 
A Simulink model for modified fountain codes (Nadhir Ibrahim Abdulkhaleq)
23
Table 1. Generation sets of LDHS-LT encoder
Degree generator Segment generator Selected data packets
3 2 4,5,6
1 1 1
3 1 1,2,3
2 3 7,8
5. RESULTS AND DISCUSSION
The performance of the proposed LDHS-LT encoder is tested with respect to the ability of data
recovery, the amount required overhead as well as the average packet operations. The performance
comparison is made with the conventional RSD-LT encoder by using a data file contains (40) packets, keep in
mind that each packet may has any number of bits according to the application, while in our simulation each
packet is represented by single bit. The test is made for (1000) run and the comparison is made to test several
parameters. The percent of file recovery (𝑃𝑆𝑒𝑐𝑐𝑒𝑠𝑠) which represent the average recovered data packet from the
total sent packlets. The amount of additional (overhead) packets required for full recovery success (𝑂𝑉𝐻𝐷𝑃).
Let’s first define the RSD characteristics, this distribution is mainly made for large data files and is
given by:
πœ‡(𝑑) =
𝜏(𝑑)+ 𝜌(𝑑)
𝛽
(4)
Where the normalization factor 𝛽 = βˆ‘ ( 𝜌(𝑑) + 𝜏(𝑑))
π‘˜
𝑑=1 and 𝜏(𝑑) is given as:
𝜏(𝑑) =
{
𝑅
π‘‘π‘˜
, 𝑑 = 1,2, . . ,
π‘˜
𝑅
βˆ’ 1
𝑅
π‘˜
𝑙𝑛
𝑅
𝛿
, 𝑑 =
π‘˜
𝑅
0, 𝑑 =
π‘˜
𝑅
+ 1, … . . , π‘˜.
(5)
Where 𝑅 = 𝑐. 𝑙𝑛(π‘˜/𝛿)βˆšπ‘˜ ) is the average amount of the degree 1 coded packets. while 𝑐 represents a
constant has a positive quantity usually is less than 1. The letter 𝛿 is an indication for the probability of
decoder stuck and failure.
The test is made for very short data length of size (40 packets). The challenge of such length is
required especially for its application in the field of smart cities and their wireless sensor networks [13]-[20].
Table 2 shows the result for the simulation test of our LDHS-LT code with parameters (𝑑 = 1, 2, 3 or 4) and
(𝑆 = 10), compared with traditional RSD-LT code with parameters (𝑐 = 0.02, 𝑐 = 0.02, 𝛿 = 0.1). Table 2
shows the results for a scenario of erasure probability of (𝛼 = 0.5).
According to Table 2, for (1000) run each run afile of (π‘˜ = 40 packets) is sent. The decoder try to
recover the sent packets gradually starting from (𝑁 = 40 packets) ending with (𝑁 = 90 packets). The results
shown for best performance, LDHS-LT code succeeds to get all the packets for (960 run) and when it fails to do
so there is only (1 lost packet) in average, and this is done with an extra packet of the order of (20 packets).
On the other hand, the traditional RSD-LT did its best with total recovery of (907 run) and the remaining run
has an average of (2 lost packets) with an overhead of (26 packets).
Table 2. Data recovery performance
Code type Full recovery Unrecovered packets Average degree Overhead percent
LDHS-LT 960 1 2 20
RSD-LT 907 2 2 26
6. CONCLUSION
Fountain codes have an opportunity of being an adaptive channel codes for their property of variable
code length. LT codes are designed for large data files and due to thet the degree generation for the coded
packets are generated using certain random distribution. The new design for short length LDHS-LT code had
approved its superiority for file recovery performance with respect of full data recovery and average
unrecovered packets and amount of overhead. The Simulink design for such code is made for prototype one
and could represents the first step in hardware design. An FPGA design for our LDHS-LT is thye next step to
present the code for practical applications.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 1, February 2023: 18-25
24
REFERENCES
[1] F. Li and H. Imai, β€œAn overview of forward error-correction coding for spread spectrum,” Proceedings of ISSSTA'95
International Symposium on Spread Spectrum Techniques and Applications, 1996, pp. 1193-1197, vol. 3, doi:
10.1109/ISSSTA.1996.563494.
[2] J. W. Byers, M. Luby, and M. Mitzenmacher, β€œA digital fountain approach to asynchronous reliable multicast,” in IEEE Journal
on Selected Areas in Communications, vol. 20, no. 8, pp. 1528-1540, 2002, doi: 10.1109/JSAC.2002.803996.
[3] R. Karp, M. Luby, and A. Shokrollahi, β€œFinite length analysis of LT codes,” International Symposium on Information Theory,
2004. ISIT 2004. Proceedings., 2004, doi: 10.1109/ISIT.2004.1365074.
[4] J. Boiko, I. Pyatin, and O. Eromenko, β€œDesign and evaluation of the efficiency of channel coding LDPC codes for 5G information
technology,” Indonesian Journal of Electrical Engineering and Informatics (IJEEI), vol. 9, no. 4, 2021,
doi: 10.52549/ijeei.v9i4.3188.
[5] W. Alam, D. Sarma, R. J. Chakma, M. J. Alam, and S. Hossain, β€œInternet of things based smart vending machine using digital
payment system,” Indonesian Journal of Electrical Engineering and Informatics (IJEEI), vol. 9, no. 3, 2021,
doi: 10.52549/.v9i3.3133.
[6] E. Y. T. Adesta, D. Agusman, and Avicenna, β€œInternet of Things (IoT) in Agriculture Industries,” Indonesian Journal of
Electrical Engineering and Informatics (IJEEI), vol. 5, no. 4, 2017, doi: 10.52549/ijeei.v5i4.373.
[7] C. V. Nguyen et al., β€œZigBee based data collection in wireless sensor networks,” International Journal of Informatics and
Communication Technology (IJ-ICT), vol. 10, no. 3, pp. 211-224, 2021, doi: 10.11591/ijict.v10i3.pp212-224.
[8] S. A. Alabady, β€œAn efficient forward error correction code for wireless sensor networks,” International Journal of Informatics
and Communication Technology (IJ-ICT), vol. 10, no. 2, pp. 104-115, 2021, doi: 10.11591/ijict.v10i2.pp104-115.
[9] J. A. Aldhaibani, and N. A. Al-Shareefi, β€œFree Space Optics Backhaul Link For Small Cells Of 5G Cellular Networks,” Journal of
Engineering Science and Technology, vol. 15, no. 3, pp. 1685-1697, 2020. [Online]. Available:
https://jestec.taylors.edu.my/Vol%2015%20issue%203%20June%202020/15_3_15.pdf
[10] I. J. Hasan, B. M. Waheib, N. A. J. Salih, and N. I. Abdulkhaleq, β€œA global system for mobile communications-based electrical
power consumption for a non-contact smart billing system,” International Journal of Electrical and Computer Engineering
(IJECE), vol. 11, no. 6, pp. 4659-4666, 2021, doi: 10.11591/ijece.v11i6.pp4659-4666.
[11] S. A. Abdulhussein and R. A. Abdulhussein, β€œHandover evaluation of UMTS-WiMAX networks,” TELKOMNIKA
(Telecommunication, Computing, Electronics and Control), vol. 19, no. 5, pp. 1456-1465, 2021,
doi: 10.12928/telkomnika.v19i5.20411.
[12] N. I. Abdulkhaleq and O. Gazi, β€œDecoding of LT-like codes in the absence of degree-one code symbols,” ETRI Journal, vol. 38,
no. 5, pp. 896–902, 2016, doi: 10.4218/etrij.16.0116.0107.
[13] N. I. Abdulkhaleq and O. Gazi, β€œA sequential coding approach for short length LT codes over AWGN channel,” 2017 4th
International Conference on Electrical and Electronic Engineering (ICEEE), 2017, pp. 267-271,
doi: 10.1109/ICEEE2.2017.7935831.
[14] N. I. Abdulkhaleq, I. J. Hasan and N. A. J. Salih, β€œMitigation of Packet Erasure using New Fountain Code Design,” 2018 IEEE
International Multidisciplinary Conference on Engineering Technology (IMCET), 2018, pp. 1-7,
doi: 10.1109/IMCET.2018.8603036.
[15] J. K. Zao, M. Hornansky and P. -L. Diao, β€œDesign of optimal short-length LT codes using evolution strategies,” 2012 IEEE
Congress on Evolutionary Computation, 2012, pp. 1-9, doi: 10.1109/CEC.2012.6256147.
[16] Z. -K. Chong, B. -M. Goi, H. Ohsaki, C. -K. Bryan Ng, and H. -T. Ewe, β€œDesign of short-length message fountain code for
erasure channel transmission,” 2012 IEEE Conference on Sustainable Utilization and Development in Engineering and
Technology (STUDENT), 2012, pp. 239-241, doi: 10.1109/STUDENT.2012.6408411.
[17] Z. Huang, J. Jiao, K. Zhang, S. Wu, and Q. Zhang, β€œA Novel Weight Coefficient PEG Algorithm for Ultra-Reliable Short Length
Analog Fountain Codes,” in IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 125-128, 2019,
doi: 10.1109/LWC.2018.2863289.
[18] L. -J. Chang, C. -H. Wang, and J. K. Zao, β€œAn error-floor reduction technique for short-length LT codes,” 2014 International
Symposium on Information Theory and its Applications, 2014, pp. 279-283. [Online]. Available:
https://ieeexplore.ieee.org/document/6979848
[19] H. Cheong, J. Eun, H. Kim, and K. J. Kim, β€œBelief propagation decoding assisted on-the-fly Gaussian elimination for short LT
codes,” Cluster Computing, vol. 19, pp. 309–314, 2016, doi: 10.1007/s10586-015-0522-0.
[20] D. -D. Yan, X. -K. Fan, Z. -Y. Chen, and H. -Y. Ma, β€œLow-loss belief propagation decoder with Tanner graph in quantum error-
correction codes,” Chinese Physics B, vol. 31, no. 1, 2022, doi: 10.1088/1674-1056/ac11cf.
[21] A. A. Zamzami, K. -C. Chao, and S. -C. Lin, β€œStopping-Set Assisted Reinforced Belief Propagation for Decoding Short LDPC
Codes,” in IEEE Communications Letters, vol. 26, no. 3, pp. 505-508, 2022, doi: 10.1109/LCOMM.2021.3137222.
[22] F. Z. Zenkouar, M. E. Alaou, and S. Najah, β€œGF(q) LDPC encoder and decoder FPGA implementation using group shuffled belief
propagation algorithm,” International Journal of Electrical and Computer Engineering (IJECE), vol. 12, no. 3, pp. 2184-2193,
2022, doi: 10.11591/ijece.v12i3.pp2184-2193.
[23] S. -Y. Zhang and B. Shahrrava, β€œBelief propagation polar decoding for wireless communication systems with noisy channel
estimates,” Wireless Personal Communications, vol. 123, pp. 1365–1377, 2022, doi: 10.1007/s11277-021-09184-7.
[24] R. Sun, M. Zhao, J. Liu, J. Sun, H. Guan and Z. Zhao, β€œPiggybacking Belief Propagation Decoding for Rateless Codes Based on
RA Structure,” 2018 IEEE/CIC International Conference on Communications in China (ICCC), 2018, pp. 237-241,
doi: 10.1109/ICCChina.2018.8641154.
[25] P. Shi, Z. Wang, and D. Li, β€œLow overhead growth degree coding scheme for online fountain codes with limited feedback,” in
International Conference on Wireless and Satellite Systems, 2022, pp. 456–467, doi: 10.1007/978-3-030-93398-2_43.
TELKOMNIKA Telecommun Comput El Control 
A Simulink model for modified fountain codes (Nadhir Ibrahim Abdulkhaleq)
25
BIOGRAPHIES OF AUTHORS
Nadhir Ibrahim Abdulkhaleq had his BSC in Electrical Engineering from
Cairo-Egypt in 1990 and MSc. in Radar and Communication from the Technology University
in Baghdad-Iraq in 1995, the PhD in Electronic and Communication Engineering from
Cankaya University in Turkey in 2017. He currently works as an Asst. Prof. in Department of
Mobile Computing and Communications Engineering-College of EngineeringUniversity of
Information Technology&Communications (UoITC). He had published several papers in
coding theory and wireless sensor networks. He can be contacted at email:
nadhir.abdulkhaleq@uoitc.edu.iq.
Nahla Abdul Jalil Salih is a member of the department of Electronic Techniques
in the Institute of Technology in Middle Technical University in Iraq. she received his BSc in
control and systems Engineering from university of technology, Baghdad, Iraq in 1992, her
interests are control and systems, fractal coding technique, digital image coding. She can be
contacted at email: nahla.alchalaby@yahoo.com.
Rajaa Salih Mohammed Hasan is a member of department of forensic techniques
in the Institute of Technology at The Middle Technical University in Iraq. She received her BSC
in Statistics from University of Baghdad Iraq in 1997, she received her MSC in Information
Technology from University of Technology Bagdad Iraq in 2005 her interests is new trends in
Information Technology. She can be contacted at email: Raja.Salih14@yahoo.com.
Ihsan Jabbar Hasan was born in Baghdad in1966. He received BSc in electrical
engineering from Cairo, Egypt in 1990 and MSc in electrical power engineering from the
Foundation of Technical Education-College of Electrical and Electronic Techniques, Baghdad,
Iraq in 2007, the PhD degree from the Universiti Teknikal Malaysia Melaka (UTeM) in 2015.
He currently works as an Asst. Prof. in the Middle Technical College, Baghdad, Iraq. He had
published several papers in the field of power distribution network, demand response
techniques, power system planning, network planning and optimization. He can be contacted
at email: ihsan_hssn@yahoo.com.

More Related Content

Similar to A Simulink model for modified fountain codes

A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMA NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMVLSICS Design
Β 
Decoding of the extended Golay code by the simplified successive-cancellation...
Decoding of the extended Golay code by the simplified successive-cancellation...Decoding of the extended Golay code by the simplified successive-cancellation...
Decoding of the extended Golay code by the simplified successive-cancellation...TELKOMNIKA JOURNAL
Β 
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers  Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers IJECEIAES
Β 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
Β 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
Β 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...jpstudcorner
Β 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...jpstudcorner
Β 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniquesDhanashriNandre
Β 
D04561722
D04561722D04561722
D04561722IOSR-JEN
Β 
Performance evaluation of family of prime sequence codes in an ocdma system
Performance evaluation of family of prime sequence codes in an ocdma systemPerformance evaluation of family of prime sequence codes in an ocdma system
Performance evaluation of family of prime sequence codes in an ocdma systemIAEME Publication
Β 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.comIJERD Editor
Β 
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODELANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODELVLSICS Design
Β 
IEEE 802.11a Physical Layer Simulation
IEEE 802.11a Physical Layer SimulationIEEE 802.11a Physical Layer Simulation
IEEE 802.11a Physical Layer SimulationMichail Grigoropoulos
Β 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
Β 
Lb35189919904
Lb35189919904Lb35189919904
Lb35189919904IJERA Editor
Β 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionijasuc
Β 
GF(q) LDPC encoder and decoder FPGA implementation using group shuffled beli...
GF(q) LDPC encoder and decoder FPGA implementation using  group shuffled beli...GF(q) LDPC encoder and decoder FPGA implementation using  group shuffled beli...
GF(q) LDPC encoder and decoder FPGA implementation using group shuffled beli...IJECEIAES
Β 
Simulation of Turbo Convolutional Codes for Deep Space Mission
Simulation of Turbo Convolutional Codes for Deep Space MissionSimulation of Turbo Convolutional Codes for Deep Space Mission
Simulation of Turbo Convolutional Codes for Deep Space MissionIJERA Editor
Β 
Combating Bit Losses in Computer Networks using Modified Luby Transform Code
Combating Bit Losses in Computer Networks using Modified Luby Transform CodeCombating Bit Losses in Computer Networks using Modified Luby Transform Code
Combating Bit Losses in Computer Networks using Modified Luby Transform CodeIJMER
Β 
LDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming EncodingLDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming EncodingBhagwat Singh Rathore
Β 

Similar to A Simulink model for modified fountain codes (20)

A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMA NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
Β 
Decoding of the extended Golay code by the simplified successive-cancellation...
Decoding of the extended Golay code by the simplified successive-cancellation...Decoding of the extended Golay code by the simplified successive-cancellation...
Decoding of the extended Golay code by the simplified successive-cancellation...
Β 
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers  Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Β 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
Β 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
Β 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...
Β 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...
Β 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
Β 
D04561722
D04561722D04561722
D04561722
Β 
Performance evaluation of family of prime sequence codes in an ocdma system
Performance evaluation of family of prime sequence codes in an ocdma systemPerformance evaluation of family of prime sequence codes in an ocdma system
Performance evaluation of family of prime sequence codes in an ocdma system
Β 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
Β 
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODELANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
Β 
IEEE 802.11a Physical Layer Simulation
IEEE 802.11a Physical Layer SimulationIEEE 802.11a Physical Layer Simulation
IEEE 802.11a Physical Layer Simulation
Β 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
Β 
Lb35189919904
Lb35189919904Lb35189919904
Lb35189919904
Β 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmission
Β 
GF(q) LDPC encoder and decoder FPGA implementation using group shuffled beli...
GF(q) LDPC encoder and decoder FPGA implementation using  group shuffled beli...GF(q) LDPC encoder and decoder FPGA implementation using  group shuffled beli...
GF(q) LDPC encoder and decoder FPGA implementation using group shuffled beli...
Β 
Simulation of Turbo Convolutional Codes for Deep Space Mission
Simulation of Turbo Convolutional Codes for Deep Space MissionSimulation of Turbo Convolutional Codes for Deep Space Mission
Simulation of Turbo Convolutional Codes for Deep Space Mission
Β 
Combating Bit Losses in Computer Networks using Modified Luby Transform Code
Combating Bit Losses in Computer Networks using Modified Luby Transform CodeCombating Bit Losses in Computer Networks using Modified Luby Transform Code
Combating Bit Losses in Computer Networks using Modified Luby Transform Code
Β 
LDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming EncodingLDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming Encoding
Β 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
Β 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
Β 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
Β 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Β 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Β 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
Β 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
Β 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Β 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
Β 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
Β 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
Β 
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...TELKOMNIKA JOURNAL
Β 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
Β 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
Β 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
Β 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
Β 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
Β 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
Β 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
Β 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Β 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
Β 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Β 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
Β 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Β 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
Β 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Β 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
Β 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
Β 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
Β 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
Β 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
Β 
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...
Β 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Β 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
Β 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
Β 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Β 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
Β 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
Β 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
Β 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Β 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
Β 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
Β 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
Β 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
Β 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
Β 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
Β 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
Β 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
Β 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
Β 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
Β 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
Β 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
Β 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
Β 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
Β 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
Β 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
Β 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
Β 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
Β 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
Β 

Recently uploaded (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Β 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
Β 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Β 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
Β 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Β 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Β 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Β 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
Β 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
Β 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
Β 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Β 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
Β 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
Β 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
Β 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Β 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Β 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
Β 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Β 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
Β 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Β 

A Simulink model for modified fountain codes

  • 1. TELKOMNIKA Telecommunication Computing Electronics and Control Vol. 21, No. 1, February 2023, pp. 18~25 ISSN: 1693-6930, DOI: 10.12928/TELKOMNIKA.v21i1.23274  18 Journal homepage: http://telkomnika.uad.ac.id A Simulink model for modified fountain codes Nadhir Ibrahim Abdulkhaleq1 , Nahla Abdul Jalil Salih2 , Rajaa Salih Mohammed Hasan2 , Ihsan Jabbar Hasan2 1 Department of Mobile Computing and Communication Engineering, College of Engineering, University of Information Technology and Communication (UoITC), Baghdad, Iraq 2 Department of Electronics, Institute of Medical Technology, Middle Technical University, Baghdad, Iraq Article Info ABSTRACT Article history: Received Feb 05, 2022 Revised Oct 19, 2022 Accepted Oct 29, 2022 This paper introduces a Simulink model design for a modified fountain code. The code is a new version of the traditional Luby transform (LT) codes. The design constructs the blocks required for generation of the generator matrix of a limited-degree-hopping-segment Luby transform (LDHS-LT) codes. This code is especially designed for short length data files which have assigned a great interest for wireless sensor networks. It generates the degrees in a predetermined sequence but random generation and partitioned the data file in segments. The data packets selection has been made serialy according to the integer generated from both degree and segment generators. The code is tested using Monte Carlo simulation approach with the conventional code generation using robust soliton distribution (RSD) for degree generation, and the simulation results approve better performance with all testing parameter. Keywords: Fountain codes Generator matrix LDHS-LT Short length files Simulink model This is an open access article under the CC BY-SA license. Corresponding Author: Nadhir Ibrahim Abdulkhaleq Department of Mobile Computing and Communication Engineering, College of Engineering University of Information Technology and Communication (UoITC), Baghdad, Iraq Email: nadhir.abdulkhaleq@uoitc.edu.iq 1. INTRODUCTION Forward error correction codes represent the core of channel coding techniques [1]. Usually, the code is generated in a length (𝑁) greater than the actual data length (π‘˜). For the conventional block codes (𝑁) is decided to be able to face the worst channel conditions. In the end of nineties [2], [3] invents the principles of fountain codes. The idea is simple, instead of predetermined the code length, they decide to have a code with variable length. By flooding the channel continuously with coded symbols and wait for the receiver to acknowledge the sender of collecting the sufficient number of coded symbols to recover the data file. The brilliant design for fountain codes presented by Karp et al. [3] with the name of Luby transform (LT) codes are the practical version of such type of codes. Wireless networks are designed to send data files in packets, which in turn makes it more suitable for many applications [4]-[11]. Following this fact, the LT encoder is first truncated the data file into packets (𝑝𝑑1, 𝑝𝑑2, … … . , π‘π‘‘π‘˜) as π‘˜ represent the length of the data file. The encoding process summarized into three main phases. Phase 1: degree generation, the encoder follows certain distribution 𝛹(𝑑) to generate a set of integers, called degrees. With the first version of LT code a well-known robust soliton distribution has been used. Then several modifications are introduced to maintain the best distribution parameters which are (size of degree 1, minimum number of edges, contribution of all data packets, ability to break the decoding stuck). So, this phase is so important in the design of the fountain codes because it’s affected the ability of fast data recovery in the receiver part. In this paper, we introduce a deterministic degree generation with limited set of
  • 2. TELKOMNIKA Telecommun Comput El Control  A Simulink model for modified fountain codes (Nadhir Ibrahim Abdulkhaleq) 19 integers in which a high probability of breaking the decoder stuck is achieved using our previous sequential decoding approach [12]-[14]. Phase 2: packets selection, the degree 𝑑 which generated from phase 1 means that 𝑑 packets have to be selected and combined to form the coded packet. In the conventional LT code, the packets are selected uniformly at random while in our proposed design, the selection is based on sequential progress. Which impose a relation between encoded packets that could be used to regenerate degree one again. Phase 3: encoded packets generation, the combination of the selected packets is done using binary ex-or operations. Keep in mind that, each packet may have certain number of binary bits, the same ex-or operations will be done and the main job of this phase is to combine these packets to create the coded packets. These three main phases are theoretically repeated in endless loop till an acknowledgment has been arrived to inform full reception of the file packets. Since 2002, fountain codes witnessed many attempts to overcome performance limitations. Short length data files applications for such codes is a big challenge. In [15]-[17], the digital fountain codes are designed with a generator matrix that could deal with file length less than (103 ) packets. The idea is based on presenting new degree distributions that mitigate the limitations of the conventional robust soliton distribution (RSD) used for LT codes. Chang et al. [18], use a non-equal selection probability for the data packets. The idea merge between the high degree output packets with some low degree one to avoid decoding block. Belief propagation algorithm is modified to find a solution for an empty ripple size for short length blocks is presented in [19]-[25]. From these previous works, it is evident that the short length data files need an adjustment for the degrees of the encoded packets as well as the way of selection to the data packets required to form the encoded one. This is the idea presented in our work where we provide what we called limited-degree-hopping-segment Luby transform (LDHS-LT) to give limited range of small degrees and with hopping selection for the data segment to ensure participation of all data packets in the encoding process. The paper is arranged to have the proposed LDHS-LT code generation in section 2. In section 3, the Simulink model for the generator matrix is presented. Comparing our proposed code with the onventional LT code is analyzed in section 4. The conclusion is reported in section 5. 2. GENRATOR MATRIX FOR LDHS-LT CODE The LDHS-LT code is constructed in a very simple way and based on the well-known LT code. The efficiency of such fountain codes depends on the quality of the generator matrix. The conventional LT code has a generator matrix which constructed after fulfilling the above three main phases. Big consideration appears for the conventional LT code with short data length and that’s why our LDHS-LT code try to overcome it. Let’s try to construct this code in a similar way and present the steps of generation. The short data files in our design is chosen to be 32 packets. So, to generate our encoded packets, we have to do the following. 2.1. Segmentation To ensure the contribution of all data packets in the encoding process and also provide certain kind of randomly choice, the data file is sliced into several 𝑆 segments. The number of segments is determined: 𝑆𝑛 = π‘šπ‘œπ‘‘(π‘˜/𝑆𝑠) (1) Where 𝑆𝑠 is the size of the data segment and it will be in the range of (3-5) packets. So, for 32 packets data file and 𝑆𝑠 = 4 packets we shall have 𝑆𝑛 = 8. 2.2. Degree generation As explained in phase 1 above, the degree generation follows certain random distribution Ξ¨(𝑑). In this proposed code, the degree values are limited to follow the range of (1: 𝑆𝑠). Again for 𝑆𝑠 = 4 we have the degrees of (1, 2, 3, π‘Žπ‘›π‘‘ 4). It is worth to mention that the generation of such degrees is random without replacement. 2.3. Degree generation Figure 1, illustrates the data packets selection. In this example we have a prototype data file of size (π‘˜ = 9) and if (𝑆𝑠 = 3) which according to that we have (𝑑 =1, 2 and 3). The degrees are generated randomly, like (3, 1, 2) and we have three segments ( 𝑆1, 𝑆2, and 𝑆3 ). Our data file consists of 9 packets denoted by (𝑝𝑑𝑖). Where the suffix (𝑖 ∈ (1: 9)). These data packets are distributed into three segments ( S1, 𝑆2, and 𝑆3 ) in a sequential assigning. The distinguish between segments has been done via the type of the line that forming the circles which illustrates the data packets in the figure. For instance, the solid line circuits denoted the data packets in the second segment. Now, the random generator produces two random numbers, one for the degree and the second for the segment. In our example of Figure 1,
  • 3.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 1, February 2023: 18-25 20 the random generator produces the numbers (32, 23, 11, 21) to generates the three coded packets denoted by (𝑃𝑐𝑖) which have a rectangular shape in the figure. According to such formation, the first coded packet is generated from the result of (𝑃𝑐1 = 𝑝𝑑4 βŠ• 𝑝𝑑5 βŠ• 𝑝𝑑6). Consequently, (𝑃𝑐2 = 𝑝𝑑7 βŠ• 𝑝𝑑8), (𝑃𝑐3 = 𝑝𝑑1) and (𝑃𝑐4 = 𝑝𝑑1 βŠ• 𝑝𝑑3). It worths to note that, there is no random selection for the data packets in our design. The data packets are selected in sequential manner. That’s means if the degree is 1, the first data packet is selected. While for degree 2, the first two data packets are selected and so on for higher degrees. This sequential selection has great effect in breaking the decoder halt when the coded packet of degree 1 is lost either in the beginning of the decoder work or at any decoding step before full data file recovery. To illustrate this feature, suppose that at any step in the decoding mission no degree one is found to proceed and we have two coded packets of the form (𝑃𝑐𝑙 = 𝑝𝑑4 βŠ• 𝑝𝑑5 βŠ• 𝑝𝑑6) and (π‘ƒπ‘π‘š = 𝑝𝑑4 βŠ• 𝑝𝑑5) then by ex-or these two coded packets, new degree 1 is generated and resume decoding process again. Figure 1. Data packets selection for LDHS-LT code 3. LDHS-LT DECODER The nature of the fountain codes enables the decoder to starts its job after collecting sufficient number (𝑁) of coded packets. This number mainly characterized as (𝑁 = π‘˜(1+∈), where (∈) represent the amount of overhead coded packets. The decoder has three stages to fully recover the data file packets. These stages are described. 3.1. Copying of degree one The decoder fetch for the most valuable coded packet which is the degree one. These coded packets are stored in the ripple box. The size of this ripple is a compromise issue because getting large means that encoding require large number of coded packets to cover all the data packets and this will increase the overhead that required to recover the data file. On the other hand, decreasing the ripple size means facing decoding stuck by loosing degree one coded packet quickly. So, in this step simply the value of degree one coded packet will be copied to the connected data packet, for instance in our Figure 1, that’s mean: 𝑃𝑑1 Μ‚ = 𝑃𝑐3 (2) 3.2. Updating the adjacent coded packets In this stage, the decoder updates the connected coded packets values by using the recovered data packet value. Again, referring to Figure 1, we had estimated the value of 𝑃𝑑1 but this packet is connected to 𝑃𝑐4 also, so updating its value by: 𝑃𝑐4 = 𝑃𝑐4 βŠ• 𝑝𝑑1 (3) 3.3. Erasing all participated edges All the edges that connected to the evolved coded packet in a single decoding step are removed. In our Figure 1, two edges are erased one for connection between (𝑝𝑑1, 𝑃𝑐3) and the other that connect (𝑝𝑑1, 𝑃𝑐4). After that, it is clear that 𝑃𝑐4 has single connection with 𝑝𝑑3 which would continue the decoding process for the next round. 3.4. Breaking the decoding stuck Sometimes, the ripple box is empty during the decoding process or even in the beginning of it. The ripple box is the place that the decoder can find a degree-one coded packet in it. There are many reasons that cause the ropple box to vanish. One of the main reasons is the bad channel conditions that causes to lost some of the transmitted coded packets. Another possible reason is the bad generator matrix or degree
  • 4. TELKOMNIKA Telecommun Comput El Control  A Simulink model for modified fountain codes (Nadhir Ibrahim Abdulkhaleq) 21 generation that make a critical number for degree-one coded packts. In such cases, the decoder fetches for certain patterns of coded packets that when ex-ored together this will produce new degree one coded packet and the operation of the decoder resumes. Our LDHS-LT encoding offer many patterns of such coded packets that prevents decoding stuck. These four prementioned stages which represent the decoder job have to be continued till recovering all the data packets. In many times, the decoder succeeded in its job which in turn an acknowledgment message will be sent to the source that indicates a successful decoding. However, if the decoder stucks just as mentioned in section 3.4, it means that the decoder needs to make further processing or collect more coded packets to have new degree-one coded packet to start with and resume decoding. 4. SIMULINK MODEL FOR (LDHS-LT) ENCODER The core idea of the Simulink design is shown in Figure 2. Two main random generators are used to generate the degree (𝑑) and the data segment (𝑆), while the data packets are selected sequentially. That’s mean, after having a number from degree generator and a number represents the assigned sgment it will be determined for the encoder to take a serial number (degree) of data packets from the assigned segment to join them using ex-or oprations. Figure 2. Block diagram for LDHS-LT encoder Figure 3. Simulink design for degree 1 coded packets
  • 5.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 1, February 2023: 18-25 22 To demonestrate the idea of Figure 2, let’s return to our prototype case of the size (π‘˜ = 9), so the random generation of the degree is (𝑑 ∈ {1,2,3}) and also the segments are generated randomly as (𝑆 ∈ {1,2,3}). Table 1, lists some possible sets for these generators. For the first coded packet, it is generated from combining three sequented data packets in the second segment. While for the coded packet no. 4, and according to the random generation, it is created from combining the first two data packets in the second segment. The Simulink model for generation of three coded packets for three different degrees and segments are illustrated in Figure 3, Figure 4, and Figure 5. Figure 4. Simulink design for degree 2 coded packets Figure 5. Simulink design for degree 3 coded packets
  • 6. TELKOMNIKA Telecommun Comput El Control  A Simulink model for modified fountain codes (Nadhir Ibrahim Abdulkhaleq) 23 Table 1. Generation sets of LDHS-LT encoder Degree generator Segment generator Selected data packets 3 2 4,5,6 1 1 1 3 1 1,2,3 2 3 7,8 5. RESULTS AND DISCUSSION The performance of the proposed LDHS-LT encoder is tested with respect to the ability of data recovery, the amount required overhead as well as the average packet operations. The performance comparison is made with the conventional RSD-LT encoder by using a data file contains (40) packets, keep in mind that each packet may has any number of bits according to the application, while in our simulation each packet is represented by single bit. The test is made for (1000) run and the comparison is made to test several parameters. The percent of file recovery (𝑃𝑆𝑒𝑐𝑐𝑒𝑠𝑠) which represent the average recovered data packet from the total sent packlets. The amount of additional (overhead) packets required for full recovery success (𝑂𝑉𝐻𝐷𝑃). Let’s first define the RSD characteristics, this distribution is mainly made for large data files and is given by: πœ‡(𝑑) = 𝜏(𝑑)+ 𝜌(𝑑) 𝛽 (4) Where the normalization factor 𝛽 = βˆ‘ ( 𝜌(𝑑) + 𝜏(𝑑)) π‘˜ 𝑑=1 and 𝜏(𝑑) is given as: 𝜏(𝑑) = { 𝑅 π‘‘π‘˜ , 𝑑 = 1,2, . . , π‘˜ 𝑅 βˆ’ 1 𝑅 π‘˜ 𝑙𝑛 𝑅 𝛿 , 𝑑 = π‘˜ 𝑅 0, 𝑑 = π‘˜ 𝑅 + 1, … . . , π‘˜. (5) Where 𝑅 = 𝑐. 𝑙𝑛(π‘˜/𝛿)βˆšπ‘˜ ) is the average amount of the degree 1 coded packets. while 𝑐 represents a constant has a positive quantity usually is less than 1. The letter 𝛿 is an indication for the probability of decoder stuck and failure. The test is made for very short data length of size (40 packets). The challenge of such length is required especially for its application in the field of smart cities and their wireless sensor networks [13]-[20]. Table 2 shows the result for the simulation test of our LDHS-LT code with parameters (𝑑 = 1, 2, 3 or 4) and (𝑆 = 10), compared with traditional RSD-LT code with parameters (𝑐 = 0.02, 𝑐 = 0.02, 𝛿 = 0.1). Table 2 shows the results for a scenario of erasure probability of (𝛼 = 0.5). According to Table 2, for (1000) run each run afile of (π‘˜ = 40 packets) is sent. The decoder try to recover the sent packets gradually starting from (𝑁 = 40 packets) ending with (𝑁 = 90 packets). The results shown for best performance, LDHS-LT code succeeds to get all the packets for (960 run) and when it fails to do so there is only (1 lost packet) in average, and this is done with an extra packet of the order of (20 packets). On the other hand, the traditional RSD-LT did its best with total recovery of (907 run) and the remaining run has an average of (2 lost packets) with an overhead of (26 packets). Table 2. Data recovery performance Code type Full recovery Unrecovered packets Average degree Overhead percent LDHS-LT 960 1 2 20 RSD-LT 907 2 2 26 6. CONCLUSION Fountain codes have an opportunity of being an adaptive channel codes for their property of variable code length. LT codes are designed for large data files and due to thet the degree generation for the coded packets are generated using certain random distribution. The new design for short length LDHS-LT code had approved its superiority for file recovery performance with respect of full data recovery and average unrecovered packets and amount of overhead. The Simulink design for such code is made for prototype one and could represents the first step in hardware design. An FPGA design for our LDHS-LT is thye next step to present the code for practical applications.
  • 7.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 1, February 2023: 18-25 24 REFERENCES [1] F. Li and H. Imai, β€œAn overview of forward error-correction coding for spread spectrum,” Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications, 1996, pp. 1193-1197, vol. 3, doi: 10.1109/ISSSTA.1996.563494. [2] J. W. Byers, M. Luby, and M. Mitzenmacher, β€œA digital fountain approach to asynchronous reliable multicast,” in IEEE Journal on Selected Areas in Communications, vol. 20, no. 8, pp. 1528-1540, 2002, doi: 10.1109/JSAC.2002.803996. [3] R. Karp, M. Luby, and A. Shokrollahi, β€œFinite length analysis of LT codes,” International Symposium on Information Theory, 2004. ISIT 2004. Proceedings., 2004, doi: 10.1109/ISIT.2004.1365074. [4] J. Boiko, I. Pyatin, and O. Eromenko, β€œDesign and evaluation of the efficiency of channel coding LDPC codes for 5G information technology,” Indonesian Journal of Electrical Engineering and Informatics (IJEEI), vol. 9, no. 4, 2021, doi: 10.52549/ijeei.v9i4.3188. [5] W. Alam, D. Sarma, R. J. Chakma, M. J. Alam, and S. Hossain, β€œInternet of things based smart vending machine using digital payment system,” Indonesian Journal of Electrical Engineering and Informatics (IJEEI), vol. 9, no. 3, 2021, doi: 10.52549/.v9i3.3133. [6] E. Y. T. Adesta, D. Agusman, and Avicenna, β€œInternet of Things (IoT) in Agriculture Industries,” Indonesian Journal of Electrical Engineering and Informatics (IJEEI), vol. 5, no. 4, 2017, doi: 10.52549/ijeei.v5i4.373. [7] C. V. Nguyen et al., β€œZigBee based data collection in wireless sensor networks,” International Journal of Informatics and Communication Technology (IJ-ICT), vol. 10, no. 3, pp. 211-224, 2021, doi: 10.11591/ijict.v10i3.pp212-224. [8] S. A. Alabady, β€œAn efficient forward error correction code for wireless sensor networks,” International Journal of Informatics and Communication Technology (IJ-ICT), vol. 10, no. 2, pp. 104-115, 2021, doi: 10.11591/ijict.v10i2.pp104-115. [9] J. A. Aldhaibani, and N. A. Al-Shareefi, β€œFree Space Optics Backhaul Link For Small Cells Of 5G Cellular Networks,” Journal of Engineering Science and Technology, vol. 15, no. 3, pp. 1685-1697, 2020. [Online]. Available: https://jestec.taylors.edu.my/Vol%2015%20issue%203%20June%202020/15_3_15.pdf [10] I. J. Hasan, B. M. Waheib, N. A. J. Salih, and N. I. Abdulkhaleq, β€œA global system for mobile communications-based electrical power consumption for a non-contact smart billing system,” International Journal of Electrical and Computer Engineering (IJECE), vol. 11, no. 6, pp. 4659-4666, 2021, doi: 10.11591/ijece.v11i6.pp4659-4666. [11] S. A. Abdulhussein and R. A. Abdulhussein, β€œHandover evaluation of UMTS-WiMAX networks,” TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 19, no. 5, pp. 1456-1465, 2021, doi: 10.12928/telkomnika.v19i5.20411. [12] N. I. Abdulkhaleq and O. Gazi, β€œDecoding of LT-like codes in the absence of degree-one code symbols,” ETRI Journal, vol. 38, no. 5, pp. 896–902, 2016, doi: 10.4218/etrij.16.0116.0107. [13] N. I. Abdulkhaleq and O. Gazi, β€œA sequential coding approach for short length LT codes over AWGN channel,” 2017 4th International Conference on Electrical and Electronic Engineering (ICEEE), 2017, pp. 267-271, doi: 10.1109/ICEEE2.2017.7935831. [14] N. I. Abdulkhaleq, I. J. Hasan and N. A. J. Salih, β€œMitigation of Packet Erasure using New Fountain Code Design,” 2018 IEEE International Multidisciplinary Conference on Engineering Technology (IMCET), 2018, pp. 1-7, doi: 10.1109/IMCET.2018.8603036. [15] J. K. Zao, M. Hornansky and P. -L. Diao, β€œDesign of optimal short-length LT codes using evolution strategies,” 2012 IEEE Congress on Evolutionary Computation, 2012, pp. 1-9, doi: 10.1109/CEC.2012.6256147. [16] Z. -K. Chong, B. -M. Goi, H. Ohsaki, C. -K. Bryan Ng, and H. -T. Ewe, β€œDesign of short-length message fountain code for erasure channel transmission,” 2012 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (STUDENT), 2012, pp. 239-241, doi: 10.1109/STUDENT.2012.6408411. [17] Z. Huang, J. Jiao, K. Zhang, S. Wu, and Q. Zhang, β€œA Novel Weight Coefficient PEG Algorithm for Ultra-Reliable Short Length Analog Fountain Codes,” in IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 125-128, 2019, doi: 10.1109/LWC.2018.2863289. [18] L. -J. Chang, C. -H. Wang, and J. K. Zao, β€œAn error-floor reduction technique for short-length LT codes,” 2014 International Symposium on Information Theory and its Applications, 2014, pp. 279-283. [Online]. Available: https://ieeexplore.ieee.org/document/6979848 [19] H. Cheong, J. Eun, H. Kim, and K. J. Kim, β€œBelief propagation decoding assisted on-the-fly Gaussian elimination for short LT codes,” Cluster Computing, vol. 19, pp. 309–314, 2016, doi: 10.1007/s10586-015-0522-0. [20] D. -D. Yan, X. -K. Fan, Z. -Y. Chen, and H. -Y. Ma, β€œLow-loss belief propagation decoder with Tanner graph in quantum error- correction codes,” Chinese Physics B, vol. 31, no. 1, 2022, doi: 10.1088/1674-1056/ac11cf. [21] A. A. Zamzami, K. -C. Chao, and S. -C. Lin, β€œStopping-Set Assisted Reinforced Belief Propagation for Decoding Short LDPC Codes,” in IEEE Communications Letters, vol. 26, no. 3, pp. 505-508, 2022, doi: 10.1109/LCOMM.2021.3137222. [22] F. Z. Zenkouar, M. E. Alaou, and S. Najah, β€œGF(q) LDPC encoder and decoder FPGA implementation using group shuffled belief propagation algorithm,” International Journal of Electrical and Computer Engineering (IJECE), vol. 12, no. 3, pp. 2184-2193, 2022, doi: 10.11591/ijece.v12i3.pp2184-2193. [23] S. -Y. Zhang and B. Shahrrava, β€œBelief propagation polar decoding for wireless communication systems with noisy channel estimates,” Wireless Personal Communications, vol. 123, pp. 1365–1377, 2022, doi: 10.1007/s11277-021-09184-7. [24] R. Sun, M. Zhao, J. Liu, J. Sun, H. Guan and Z. Zhao, β€œPiggybacking Belief Propagation Decoding for Rateless Codes Based on RA Structure,” 2018 IEEE/CIC International Conference on Communications in China (ICCC), 2018, pp. 237-241, doi: 10.1109/ICCChina.2018.8641154. [25] P. Shi, Z. Wang, and D. Li, β€œLow overhead growth degree coding scheme for online fountain codes with limited feedback,” in International Conference on Wireless and Satellite Systems, 2022, pp. 456–467, doi: 10.1007/978-3-030-93398-2_43.
  • 8. TELKOMNIKA Telecommun Comput El Control  A Simulink model for modified fountain codes (Nadhir Ibrahim Abdulkhaleq) 25 BIOGRAPHIES OF AUTHORS Nadhir Ibrahim Abdulkhaleq had his BSC in Electrical Engineering from Cairo-Egypt in 1990 and MSc. in Radar and Communication from the Technology University in Baghdad-Iraq in 1995, the PhD in Electronic and Communication Engineering from Cankaya University in Turkey in 2017. He currently works as an Asst. Prof. in Department of Mobile Computing and Communications Engineering-College of EngineeringUniversity of Information Technology&Communications (UoITC). He had published several papers in coding theory and wireless sensor networks. He can be contacted at email: nadhir.abdulkhaleq@uoitc.edu.iq. Nahla Abdul Jalil Salih is a member of the department of Electronic Techniques in the Institute of Technology in Middle Technical University in Iraq. she received his BSc in control and systems Engineering from university of technology, Baghdad, Iraq in 1992, her interests are control and systems, fractal coding technique, digital image coding. She can be contacted at email: nahla.alchalaby@yahoo.com. Rajaa Salih Mohammed Hasan is a member of department of forensic techniques in the Institute of Technology at The Middle Technical University in Iraq. She received her BSC in Statistics from University of Baghdad Iraq in 1997, she received her MSC in Information Technology from University of Technology Bagdad Iraq in 2005 her interests is new trends in Information Technology. She can be contacted at email: Raja.Salih14@yahoo.com. Ihsan Jabbar Hasan was born in Baghdad in1966. He received BSc in electrical engineering from Cairo, Egypt in 1990 and MSc in electrical power engineering from the Foundation of Technical Education-College of Electrical and Electronic Techniques, Baghdad, Iraq in 2007, the PhD degree from the Universiti Teknikal Malaysia Melaka (UTeM) in 2015. He currently works as an Asst. Prof. in the Middle Technical College, Baghdad, Iraq. He had published several papers in the field of power distribution network, demand response techniques, power system planning, network planning and optimization. He can be contacted at email: ihsan_hssn@yahoo.com.