SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 557
SIMULATION OF CONVOLUTIONAL ENCODER
Sneha Bawane1
, V.V.Gohokar2
1
M.E student, Dept of Electronics and Telecommunication, SSGMCE Shegaon, Maharashtra-444203, India
2
Professor, Dept of Electronics and Telecommunication, SSGMCE Shegaon, Maharashtra-444203, India
Abstract
Convolutional encoding is a Forward Error Correction (FEC) technique used in continuous one-way and real time communication
links. Wireless devices such as hand phones and broadband modems rely heavily on forward error correction techniques for their
proper functioning, thus sending and receiving information with minimal or no error, while utilizing the available bandwidth. Major
requirements for modern digital wireless communication systems include high throughput, low power consumption and physical size.
This paper presents the simulation of convolutional encoder using MATLAB. The performance and analysis has done by changing
rates of convolutional encoder and error of binary symmetric channel.
Keywords: Constraint Length, Convolutional Encoder, Data rates, Generator polynomials, Poly2trellis structure.
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Convolutional encoding is a method of adding redundancy to a
data stream in a controlled manner to give the destination the
ability to correct bit errors without asking the source to
retransmit. Convolutional codes, and other codes which can
correct bit errors at the receiver, are called forward error
correcting (FEC). The ever increasing use of wireless digital
communication has led to a lot of effort invested in FEC
(Forward Error Correction).Convolutional codes are
introduced in 1955 by Elias. Convolutional codes are one of
the powerful and widely used class of codes, These codes are
having many applications, that are used in deep-space
communications, voice band modems, wireless standards(such
as 802.11) and in satellite communications. Convolutional
codes are plays a role in low-latency applications such as
speech transmission.
1.1 Convolutional Encoder
The convolutional encoder maps a continuous information bit
stream into a continuous bit stream of encoder output. The
convolutional encoder is a finite state machine, which is a
machine having memory of past inputs and also having a finite
number of different states.
Convolutional codes are commonly specified by three
parameters; (n, k, m).
n = number of output bits
k = number of input bits
m = number of memory registers
Where, n>k
The quantity k/n is called as code rate. it is a measure of the
efficiency of the code . Commonly k and n parameters range
from 1 to 8, m from 2 to 10 and the code rate from 1/8 to 7/8
except for deep space applications where code rates as low as
1/100 or even longer have been employed. here The quantity L
is called the constraint length of the code and is defined by
Constraint Length, L = k (m-1)
The constraint length L represents the number of bits in the
encoder memory that affect the generation of the n output bits.
The constraint length L is also referred to by the capital letter
K, which can be confusing with the lower case k, which
represents the number of input bits. In some books K is
defined as equal to product the of k and m. Often in
commercial specifications, the codes are specified by (r, K),
where r = the code rate k/n and K is the constraint length.
1.2 Generator Polynomials
Generator Polynomial is defined by-
g(i)
(D)=g0
(i)
+g1
(i)
(D)+ g2
(i)
(D2
)+……..+gM
(i)
(DM
)
Where, D = unit delay variable
M = number of stages of shift registers.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 558
Example:-
Fig-1: Convolutional Encoder
From above the generator polynomials codes are-
G1=133(OCT) and G2=171(OCT)
G1=x0+x2+x3+x5+x6
=1011011=133(OCT)
G2=x0+x1+x2+x3+x6
=1111001=171(OCT)
1.3. Poly2trellis
Syntax:
trellis=poly2trellis( ConstraintLength, CodeGenerator)
The poly2trellis function accepts a polynomial description of a
convolutional encoder and returns the corresponding trellis
structure description. The output of poly2trellis is suitable as
an input to the convenc and vitdec functions, and as a mask
parameter for the Convolutional Encoder, Viterbi Decoder in
the Communications Blockset.
Trellis=poly2trellis (ConstraintLength, CodeGenerator)
Performs the conversion for a rate k/n feedforward encoder.
Constraint Length is a 1-by-k vector that specifies the delay
for the encoder's k input bit streams. Code Generator is a k-by-
n matrix of octal numbers that specifies the n output
connections for each of the encoder's k input bit streams.
2. PERFORMANCE ANALYSIS OF
CONVOLUTIONAL ENCODER
2.1 Rate 1/2 Convolutional Encoder
Fig-2(a): trellis= poly2trellis (3, [7 5])
From the above diagram it shows 3 shift-registers where the
first one takes the incoming data bit and the rest, form the
memory of the encoder. When we perform Exclusive ORing
we get the generator polynomials as-
G1=111=7 and G2=101=5, it shows
trellis =poly2trellis(3,[7 5])
If suppose input code is 11, we have-
First Step: Initially if S0=0 S1=0 and S2=0 then the coded
bits are-
First coded bit= 0 XOR 0 XOR 0 = 0
Second coded bit = 0 XOR 0 = 0
Thus, if input=0 then output=00 ,it shows output for rate ½
convolutional encoder.
Second Step: If input =1 , shift registers perform shifting and
we get S0=1 S1=0 and S2=0
First coded bit= 1 XOR 0 XOR 0 = 1
Second coded bit = 1 XOR 0 = 1
Thus, if input=1 then output=11
Third Step: Similarly if input=1, then S0=1 S1=1 and S2=0
First coded bit= 1 XOR 1 XOR 0 = 0
Second coded bit = 1 XOR 0 = 1
Thus, if input= 1 then output=01
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 559
Same performance has done by using different poly2trellis,
constraint length and data rates of convolutional encoder.
2.2 Rate 1/3 Convolutional Encoder
g1 = 111, g2 = 011, g3=101
Fig-2(b): trellis = poly2trellis (3, [7 3 5])
2.3. Rate 2/3 Convolutional Encoder
Fig-2(c): trellis=poly2trellis ([5 4], 23 35 0; 0 5 13)
The first paragraph under each heading or subheading should
be flush left, and subsequent paragraphs should have a five-
space indentation. A colon is inserted before an equation is
presented, but there is no punctuation following the equation.
All equations are numbered and referred to in the text solely
by a number enclosed in a round bracket (i.e., (3) reads as
"equation 3"). Ensure that any miscellaneous numbering
system you use in your paper cannot be confused with a
reference [4] or an equation (3) designation.
3. SIMULATION
Fig-3: Simulink Model
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 560
Fig-3(a): Simulation results by changing encoder with same BSC error
Fig-3(b): Simulation results by changing error of BSC with same encoder
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 561
4. CONCLUSIONS
Simulation has done by using MATLAB .When signal to
noise ratio changes the change in the output of convolutional
encoder occurs. From the above results,[3(a)] by keeping
signal to noise ratio constant and by changing data rates of
convolutional encoder it can be seen that rate 2/3 gives better
result than 1/2 and 1/3 and [3(b)] by keeping date rate 1/2 and
changing signal to noise ratio it shows that with the minimum
S/N ratio it gives better result.
REFERENCES
[1]. Yan Sun1, Zhizhong Ding2, “ FPGA Design and
Implementation of a Convolutional Encoder and a Viterbi
Decoder Based on 802.11a for OFDM”, Received March 5th,
2012; revised April 1st, 2012; accepted April 9th, 2012,
doi:10.4236/wet.2012.33019.
[2]. Zafar Iqbal, Saeid Nooshabadi, Heung-No Lee, “Analysis
and Design of Coding and Interleaving in a MIMO-OFDM
Communication System”, Vol. 58, No. 3, August 2012.
[3]. JOHN WILEY, “ERROR CONTROL CODING”, Peter
Sweeney, University of Surrey, Guildford, UK
[4]. A. Msir, F. Monteiro*, A. Dandache, B. Lepley, “Design
of a high speed parallel encoder for convolutional codes”,
Microelectronics Journal 35 (2004) 151–166.
BIOGRAPHIES
Sneha W. Bawane is a M.E student in
Digital Electronics in S.S.G.M.C.E.,
Shegaon, Maharashtra. She received the BE
degree in Electronics Engineering from
RTM Nagpur university. Her current
research interests include design of
convolutional encoder.
Vinaya V. Gohokar working as Professor
in department of Electronics and
Telecommunication Engineering,
S.S.G.M.C.E., Shegaon, Maharashtra She
received her PhD from Amaravati
University in the field of video processing.
Her areas of interest are image and video processing,
microwave communication and signal processing.

More Related Content

What's hot

Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
eSAT Publishing House
 
Design and Analysis of High Performance Floating Point Arithmetic Unit
Design and Analysis of High Performance Floating Point Arithmetic UnitDesign and Analysis of High Performance Floating Point Arithmetic Unit
Design and Analysis of High Performance Floating Point Arithmetic Unit
ijtsrd
 

What's hot (18)

New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral Recognition
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Review and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computingReview and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computing
 
An odd even block cipher based cryptosystem through modulo arithmatic techniq...
An odd even block cipher based cryptosystem through modulo arithmatic techniq...An odd even block cipher based cryptosystem through modulo arithmatic techniq...
An odd even block cipher based cryptosystem through modulo arithmatic techniq...
 
An odd even block cipher based cryptosystem through
An odd even block cipher based cryptosystem throughAn odd even block cipher based cryptosystem through
An odd even block cipher based cryptosystem through
 
Inpainting scheme for text in video a survey
Inpainting scheme for text in video   a surveyInpainting scheme for text in video   a survey
Inpainting scheme for text in video a survey
 
Recognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsRecognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic Operations
 
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image Steganography
 
Design and Analysis of High Performance Floating Point Arithmetic Unit
Design and Analysis of High Performance Floating Point Arithmetic UnitDesign and Analysis of High Performance Floating Point Arithmetic Unit
Design and Analysis of High Performance Floating Point Arithmetic Unit
 
B280916
B280916B280916
B280916
 
20120140504016
2012014050401620120140504016
20120140504016
 
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
 
Performance bounds for unequally punctured
Performance bounds for unequally puncturedPerformance bounds for unequally punctured
Performance bounds for unequally punctured
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
 
Agent based intrusion detection system in manet
Agent based intrusion detection system in manetAgent based intrusion detection system in manet
Agent based intrusion detection system in manet
 

Viewers also liked

The solution of problem of parameterization of the proximity function in ace ...
The solution of problem of parameterization of the proximity function in ace ...The solution of problem of parameterization of the proximity function in ace ...
The solution of problem of parameterization of the proximity function in ace ...
eSAT Journals
 
Numerical investigation of winglet angles influence on vortex shedding
Numerical investigation of winglet angles influence on vortex sheddingNumerical investigation of winglet angles influence on vortex shedding
Numerical investigation of winglet angles influence on vortex shedding
eSAT Journals
 
Optimization of machining parameters on tool tip temperature by using vegetab...
Optimization of machining parameters on tool tip temperature by using vegetab...Optimization of machining parameters on tool tip temperature by using vegetab...
Optimization of machining parameters on tool tip temperature by using vegetab...
eSAT Journals
 
Development of improved pid controller for single effect evaporator
Development of improved pid controller for single effect evaporatorDevelopment of improved pid controller for single effect evaporator
Development of improved pid controller for single effect evaporator
eSAT Journals
 
Investigations on the performance of diesel in an air gap ceramic coated dies...
Investigations on the performance of diesel in an air gap ceramic coated dies...Investigations on the performance of diesel in an air gap ceramic coated dies...
Investigations on the performance of diesel in an air gap ceramic coated dies...
eSAT Journals
 
Determination of safe grade elevation by using hec ras case study mutha river
Determination of safe grade elevation by using hec ras case study mutha riverDetermination of safe grade elevation by using hec ras case study mutha river
Determination of safe grade elevation by using hec ras case study mutha river
eSAT Journals
 

Viewers also liked (20)

A BER Performance Analysis of Shift Keying Technique with MMSE/MLSE estimatio...
A BER Performance Analysis of Shift Keying Technique with MMSE/MLSE estimatio...A BER Performance Analysis of Shift Keying Technique with MMSE/MLSE estimatio...
A BER Performance Analysis of Shift Keying Technique with MMSE/MLSE estimatio...
 
Ijetcas14 378
Ijetcas14 378Ijetcas14 378
Ijetcas14 378
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
The solution of problem of parameterization of the proximity function in ace ...
The solution of problem of parameterization of the proximity function in ace ...The solution of problem of parameterization of the proximity function in ace ...
The solution of problem of parameterization of the proximity function in ace ...
 
Effect of potato powder supplementation and spices addition on physical and s...
Effect of potato powder supplementation and spices addition on physical and s...Effect of potato powder supplementation and spices addition on physical and s...
Effect of potato powder supplementation and spices addition on physical and s...
 
Designing multi agent based linked state machine
Designing multi agent based linked state machineDesigning multi agent based linked state machine
Designing multi agent based linked state machine
 
Numerical investigation of winglet angles influence on vortex shedding
Numerical investigation of winglet angles influence on vortex sheddingNumerical investigation of winglet angles influence on vortex shedding
Numerical investigation of winglet angles influence on vortex shedding
 
Optimization of machining parameters on tool tip temperature by using vegetab...
Optimization of machining parameters on tool tip temperature by using vegetab...Optimization of machining parameters on tool tip temperature by using vegetab...
Optimization of machining parameters on tool tip temperature by using vegetab...
 
Necessity of integrated transport system to namma metro at byapanahalli – a s...
Necessity of integrated transport system to namma metro at byapanahalli – a s...Necessity of integrated transport system to namma metro at byapanahalli – a s...
Necessity of integrated transport system to namma metro at byapanahalli – a s...
 
Development of improved pid controller for single effect evaporator
Development of improved pid controller for single effect evaporatorDevelopment of improved pid controller for single effect evaporator
Development of improved pid controller for single effect evaporator
 
Semantic approach utilizing data mining and case based reasoning for it suppo...
Semantic approach utilizing data mining and case based reasoning for it suppo...Semantic approach utilizing data mining and case based reasoning for it suppo...
Semantic approach utilizing data mining and case based reasoning for it suppo...
 
Review of various adaptive modulation and coding techniques in wireless network
Review of various adaptive modulation and coding techniques in wireless networkReview of various adaptive modulation and coding techniques in wireless network
Review of various adaptive modulation and coding techniques in wireless network
 
Stone texture classification and discrimination by edge direction movement
Stone texture classification and discrimination by edge direction movementStone texture classification and discrimination by edge direction movement
Stone texture classification and discrimination by edge direction movement
 
Investigations on the performance of diesel in an air gap ceramic coated dies...
Investigations on the performance of diesel in an air gap ceramic coated dies...Investigations on the performance of diesel in an air gap ceramic coated dies...
Investigations on the performance of diesel in an air gap ceramic coated dies...
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Elements of legacy program complexity
Elements of legacy program complexityElements of legacy program complexity
Elements of legacy program complexity
 
Tidal current energy an overview
Tidal current energy an overviewTidal current energy an overview
Tidal current energy an overview
 
Determination of safe grade elevation by using hec ras case study mutha river
Determination of safe grade elevation by using hec ras case study mutha riverDetermination of safe grade elevation by using hec ras case study mutha river
Determination of safe grade elevation by using hec ras case study mutha river
 
Soft Decision Scheme for Multiple Descriptions Coding over Rician Fading Chan...
Soft Decision Scheme for Multiple Descriptions Coding over Rician Fading Chan...Soft Decision Scheme for Multiple Descriptions Coding over Rician Fading Chan...
Soft Decision Scheme for Multiple Descriptions Coding over Rician Fading Chan...
 
Rna secondary structure prediction, a cuckoo search approach
Rna secondary structure prediction, a cuckoo search approachRna secondary structure prediction, a cuckoo search approach
Rna secondary structure prediction, a cuckoo search approach
 

Similar to Simulation of convolutional encoder

Effect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniquesEffect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniques
eSAT Journals
 

Similar to Simulation of convolutional encoder (20)

Denoising of heart sound signal using wavelet transform
Denoising of heart sound signal using wavelet transformDenoising of heart sound signal using wavelet transform
Denoising of heart sound signal using wavelet transform
 
Design of all digital phase locked loop (d pll) with fast acquisition time
Design of all digital phase locked loop (d pll) with fast acquisition timeDesign of all digital phase locked loop (d pll) with fast acquisition time
Design of all digital phase locked loop (d pll) with fast acquisition time
 
Low cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pcLow cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pc
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdm
 
Low cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pcLow cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pc
 
Fpga implementation of various lines coding technique for efficient transmiss...
Fpga implementation of various lines coding technique for efficient transmiss...Fpga implementation of various lines coding technique for efficient transmiss...
Fpga implementation of various lines coding technique for efficient transmiss...
 
Design of all digital phase locked loop
Design of all digital phase locked loopDesign of all digital phase locked loop
Design of all digital phase locked loop
 
Normalization Cross Correlation Value of Rotational Attack on Digital Image W...
Normalization Cross Correlation Value of Rotational Attack on Digital Image W...Normalization Cross Correlation Value of Rotational Attack on Digital Image W...
Normalization Cross Correlation Value of Rotational Attack on Digital Image W...
 
Effect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniquesEffect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniques
 
Effect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniquesEffect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniques
 
Application of ann for ultimate shear strength of fly ash concrete beams
Application of ann for ultimate shear strength of fly ash concrete beamsApplication of ann for ultimate shear strength of fly ash concrete beams
Application of ann for ultimate shear strength of fly ash concrete beams
 
Application of ann for ultimate shear strength of fly
Application of ann for ultimate shear strength of flyApplication of ann for ultimate shear strength of fly
Application of ann for ultimate shear strength of fly
 
Application of ann for ultimate shear strength of fly ash concrete beams
Application of ann for ultimate shear strength of fly ash concrete beamsApplication of ann for ultimate shear strength of fly ash concrete beams
Application of ann for ultimate shear strength of fly ash concrete beams
 
Td ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decoderTd ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decoder
 
Td ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decoderTd ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decoder
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
 
Design of area and power efficient half adder using transmission gate
Design of area and power efficient half adder using transmission gateDesign of area and power efficient half adder using transmission gate
Design of area and power efficient half adder using transmission gate
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...
 
Feature extraction from asthma patient’s voice using mel frequency cepstral c...
Feature extraction from asthma patient’s voice using mel frequency cepstral c...Feature extraction from asthma patient’s voice using mel frequency cepstral c...
Feature extraction from asthma patient’s voice using mel frequency cepstral c...
 
Design and simulation of passive uhf rfid temperature sensor tag using 3 d em...
Design and simulation of passive uhf rfid temperature sensor tag using 3 d em...Design and simulation of passive uhf rfid temperature sensor tag using 3 d em...
Design and simulation of passive uhf rfid temperature sensor tag using 3 d em...
 

More from eSAT Journals

Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Recently uploaded (20)

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 

Simulation of convolutional encoder

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 557 SIMULATION OF CONVOLUTIONAL ENCODER Sneha Bawane1 , V.V.Gohokar2 1 M.E student, Dept of Electronics and Telecommunication, SSGMCE Shegaon, Maharashtra-444203, India 2 Professor, Dept of Electronics and Telecommunication, SSGMCE Shegaon, Maharashtra-444203, India Abstract Convolutional encoding is a Forward Error Correction (FEC) technique used in continuous one-way and real time communication links. Wireless devices such as hand phones and broadband modems rely heavily on forward error correction techniques for their proper functioning, thus sending and receiving information with minimal or no error, while utilizing the available bandwidth. Major requirements for modern digital wireless communication systems include high throughput, low power consumption and physical size. This paper presents the simulation of convolutional encoder using MATLAB. The performance and analysis has done by changing rates of convolutional encoder and error of binary symmetric channel. Keywords: Constraint Length, Convolutional Encoder, Data rates, Generator polynomials, Poly2trellis structure. -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Convolutional encoding is a method of adding redundancy to a data stream in a controlled manner to give the destination the ability to correct bit errors without asking the source to retransmit. Convolutional codes, and other codes which can correct bit errors at the receiver, are called forward error correcting (FEC). The ever increasing use of wireless digital communication has led to a lot of effort invested in FEC (Forward Error Correction).Convolutional codes are introduced in 1955 by Elias. Convolutional codes are one of the powerful and widely used class of codes, These codes are having many applications, that are used in deep-space communications, voice band modems, wireless standards(such as 802.11) and in satellite communications. Convolutional codes are plays a role in low-latency applications such as speech transmission. 1.1 Convolutional Encoder The convolutional encoder maps a continuous information bit stream into a continuous bit stream of encoder output. The convolutional encoder is a finite state machine, which is a machine having memory of past inputs and also having a finite number of different states. Convolutional codes are commonly specified by three parameters; (n, k, m). n = number of output bits k = number of input bits m = number of memory registers Where, n>k The quantity k/n is called as code rate. it is a measure of the efficiency of the code . Commonly k and n parameters range from 1 to 8, m from 2 to 10 and the code rate from 1/8 to 7/8 except for deep space applications where code rates as low as 1/100 or even longer have been employed. here The quantity L is called the constraint length of the code and is defined by Constraint Length, L = k (m-1) The constraint length L represents the number of bits in the encoder memory that affect the generation of the n output bits. The constraint length L is also referred to by the capital letter K, which can be confusing with the lower case k, which represents the number of input bits. In some books K is defined as equal to product the of k and m. Often in commercial specifications, the codes are specified by (r, K), where r = the code rate k/n and K is the constraint length. 1.2 Generator Polynomials Generator Polynomial is defined by- g(i) (D)=g0 (i) +g1 (i) (D)+ g2 (i) (D2 )+……..+gM (i) (DM ) Where, D = unit delay variable M = number of stages of shift registers.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 558 Example:- Fig-1: Convolutional Encoder From above the generator polynomials codes are- G1=133(OCT) and G2=171(OCT) G1=x0+x2+x3+x5+x6 =1011011=133(OCT) G2=x0+x1+x2+x3+x6 =1111001=171(OCT) 1.3. Poly2trellis Syntax: trellis=poly2trellis( ConstraintLength, CodeGenerator) The poly2trellis function accepts a polynomial description of a convolutional encoder and returns the corresponding trellis structure description. The output of poly2trellis is suitable as an input to the convenc and vitdec functions, and as a mask parameter for the Convolutional Encoder, Viterbi Decoder in the Communications Blockset. Trellis=poly2trellis (ConstraintLength, CodeGenerator) Performs the conversion for a rate k/n feedforward encoder. Constraint Length is a 1-by-k vector that specifies the delay for the encoder's k input bit streams. Code Generator is a k-by- n matrix of octal numbers that specifies the n output connections for each of the encoder's k input bit streams. 2. PERFORMANCE ANALYSIS OF CONVOLUTIONAL ENCODER 2.1 Rate 1/2 Convolutional Encoder Fig-2(a): trellis= poly2trellis (3, [7 5]) From the above diagram it shows 3 shift-registers where the first one takes the incoming data bit and the rest, form the memory of the encoder. When we perform Exclusive ORing we get the generator polynomials as- G1=111=7 and G2=101=5, it shows trellis =poly2trellis(3,[7 5]) If suppose input code is 11, we have- First Step: Initially if S0=0 S1=0 and S2=0 then the coded bits are- First coded bit= 0 XOR 0 XOR 0 = 0 Second coded bit = 0 XOR 0 = 0 Thus, if input=0 then output=00 ,it shows output for rate ½ convolutional encoder. Second Step: If input =1 , shift registers perform shifting and we get S0=1 S1=0 and S2=0 First coded bit= 1 XOR 0 XOR 0 = 1 Second coded bit = 1 XOR 0 = 1 Thus, if input=1 then output=11 Third Step: Similarly if input=1, then S0=1 S1=1 and S2=0 First coded bit= 1 XOR 1 XOR 0 = 0 Second coded bit = 1 XOR 0 = 1 Thus, if input= 1 then output=01
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 559 Same performance has done by using different poly2trellis, constraint length and data rates of convolutional encoder. 2.2 Rate 1/3 Convolutional Encoder g1 = 111, g2 = 011, g3=101 Fig-2(b): trellis = poly2trellis (3, [7 3 5]) 2.3. Rate 2/3 Convolutional Encoder Fig-2(c): trellis=poly2trellis ([5 4], 23 35 0; 0 5 13) The first paragraph under each heading or subheading should be flush left, and subsequent paragraphs should have a five- space indentation. A colon is inserted before an equation is presented, but there is no punctuation following the equation. All equations are numbered and referred to in the text solely by a number enclosed in a round bracket (i.e., (3) reads as "equation 3"). Ensure that any miscellaneous numbering system you use in your paper cannot be confused with a reference [4] or an equation (3) designation. 3. SIMULATION Fig-3: Simulink Model
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 560 Fig-3(a): Simulation results by changing encoder with same BSC error Fig-3(b): Simulation results by changing error of BSC with same encoder
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 561 4. CONCLUSIONS Simulation has done by using MATLAB .When signal to noise ratio changes the change in the output of convolutional encoder occurs. From the above results,[3(a)] by keeping signal to noise ratio constant and by changing data rates of convolutional encoder it can be seen that rate 2/3 gives better result than 1/2 and 1/3 and [3(b)] by keeping date rate 1/2 and changing signal to noise ratio it shows that with the minimum S/N ratio it gives better result. REFERENCES [1]. Yan Sun1, Zhizhong Ding2, “ FPGA Design and Implementation of a Convolutional Encoder and a Viterbi Decoder Based on 802.11a for OFDM”, Received March 5th, 2012; revised April 1st, 2012; accepted April 9th, 2012, doi:10.4236/wet.2012.33019. [2]. Zafar Iqbal, Saeid Nooshabadi, Heung-No Lee, “Analysis and Design of Coding and Interleaving in a MIMO-OFDM Communication System”, Vol. 58, No. 3, August 2012. [3]. JOHN WILEY, “ERROR CONTROL CODING”, Peter Sweeney, University of Surrey, Guildford, UK [4]. A. Msir, F. Monteiro*, A. Dandache, B. Lepley, “Design of a high speed parallel encoder for convolutional codes”, Microelectronics Journal 35 (2004) 151–166. BIOGRAPHIES Sneha W. Bawane is a M.E student in Digital Electronics in S.S.G.M.C.E., Shegaon, Maharashtra. She received the BE degree in Electronics Engineering from RTM Nagpur university. Her current research interests include design of convolutional encoder. Vinaya V. Gohokar working as Professor in department of Electronics and Telecommunication Engineering, S.S.G.M.C.E., Shegaon, Maharashtra She received her PhD from Amaravati University in the field of video processing. Her areas of interest are image and video processing, microwave communication and signal processing.